Feb 2 2024
Verified in ntbtls-0.3.2.
Jan 31 2024
Jan 26 2024
Fixed in 0.3.2.
Fixed in NtbTLS 0.3.2.
Jan 12 2024
Noteworthy changes in version 0.3.2 (2024-01-12)
Jan 8 2024
Yeah we should do an ntbtls release. As a core library it does no matter much which workboard we use. Let's remove it the vsd tag.
Nov 15 2023
So the last thing to do here would be an NTBTLS release? Then we should make sure not to forget to do that?
Sep 18 2023
Well, even out new versions.gnupg.org uses a shorter hash. Better get that released asap.
Apr 10 2023
Oct 28 2022
I can't see what we shall do here.
Sep 22 2022
Jul 22 2022
@gniibe Thanks!
In the repo, for all related software, it's done.
Note that versions since 2020-11-07 to 2021-07-03 have major problem with non-POSIX shell, which doesn't support $(..) construct.
Jul 18 2022
Thank you.
Jul 12 2022
Jul 8 2022
Pushed the change.
There is a description: https://datatracker.ietf.org/doc/html/rfc8422#section-5.10
Jul 6 2022
Jun 16 2022
Jun 14 2022
ntbtls support only 1.2. We can't disable cipher suites for interop reasons. It is not the client's job trying to force a server 's admin to offer only decent ciphersuites.
Jun 13 2022
May 23 2022
ntbltls does not implement compression:
Apr 14 2022
We have not seen this problem anymore in recent versions. Thus closing.
Feb 28 2022
In TLS 1.2, it refers RFC5116. In RFC5116, it says:
My reading was wrong; Indeed we use memcpy from out_ctr. But it increments in network byte order.
So, for AES-GCM, it works well.
Nov 23 2021
Might be a TOR Thing?
Nov 10 2021
Also applied to gpgme.
Since there is no problem with libgpg-error 1.43, I applied it to other libraries: npth, libassuan, libksba, and ntbtls.
Nov 3 2021
Sep 27 2021
These are great news. Thank you!
Pushed the change to libgpg-error and libgcrypt (1.9 and master).
Let us see if there are any problem(s) for that, I will apply it to other libraries when it will be found no problem.
Thank you for the information.
For the record, I put the link to the email submitted:
https://lists.gnu.org/archive/html/libtool-patches/2020-06/msg00001.html
Sep 22 2021
Oh, you are right, it's not upstream. It's actually applied to Homebrew (https://brew.sh/) libtool formula which is where I originally got libtool.m4, see:
I see your point. I'd like to locate/identify where the change comes from.
I think that what you refer by "new libtool.m4" is actually macOS local change (I mean, not from libtool upstream, AFAIK).
Could you please point out the source of the change?
Sep 21 2021
That would work, however we might hit this issue with a new macOS release. Would it make more sense to update to what the new libtool.m4 is doing? Linker flags are the same, it only changes the way they detect macOS versions:
That does indeed not look like something which could introduce a regression.