Changes:
* Fixed segfault when clicking on auto-hide toolbar preference
* Fixed segfault when changing the first toolbar button
* Added Irish translation (by Kevin Patrick Scannell)
* Updated documentation for MP3::Tag, MP3::Tag::ID3v1, MP3::Tag::ID3v2 and MP3::Tag::ID3v2-Data
* Renamed some functions. The old names will still work, but try to use the new names.
The following names were changed:
- MP3::Tag::getTags() to MP3::Tag::get_tags()
- MP3::Tag::newTag() to MP3::Tag::new_tag()
- MP3::Tag::ID3v1::removeTag() to MP3::Tag::ID3v1::remove_tag()
- MP3::Tag::ID3v1::writeTag() to MP3::Tag::ID3v1::write_tag()
- MP3::Tag::ID2v2::getFrameIDs() to MP3::Tag::ID3v2::get_frame_ids()
- MP3::Tag::ID2v2::getFrame() to MP3::Tag::ID3v2::get_frame()
* Bugfix for ID3v2.pm:
- getFrame() returned "undef" as a string instead of simple undef
- artist() produced an error when TPE1 is missing in TAG
* Bugfix for Tag.pm:
- DESTROY() checked only if $mp3->obj{filename} exists and not if it is defined before trying to
close it
- autoinfo() returns now a hash ref or an array as noted in the documentation
* Bugfix for ID3v1.pm:
- genres() expected an id3v1-object as first parameter and a genre
only as second parameter. Now the object can be omitted as in a call like
MP3::Tag::ID3v1->genres($genre) used by Tag.pm and ID3v2.pm
* bugfix for File.pm:
- Filenames may contain surrounding whitespaces now
Add optimisations for specific Athlon models (recht@)
Avoid setting flags if DBG is set to -Os (to reduce size impact
when building contents of distrib on at least 1.6.x i386)
Add optimisations for specific Athlon models (recht@)
Avoid setting flags if DBG is set to -Os (to reduce size impact
when building contents of distrib on at least 1.6.x i386)
XXX I updated configure.ac, but I can't actually patch that without running
into severe automake lossage, so that patch is not named patch-?? right now.
the ususal: new features and fixes
notably:
New Thread Locking
Zoltan removed the big locks we had in the runtime, and now we have a
finely grained lock system in the runtime. Runtime hackers can read the
included lock matrix document which describes the requirements to use
the new fine grained locks in their code.
Ahead of Time Compiler Optimizations
Zoltan has worked extensively on the Mono ahead-of-time compilation
feature (AOT). The AOT code is now considered to be production quality,
and also for the first time precompiled code runs faster than JITed
code. This resulted in a 13% compilation speed up for the Mono C#
compiler, reducing the compile time to 3.185 seconds. A clear goal of
the team for the next release is to reach 3.1416 seconds.
for a complete list see: http://www.go-mono.com/archive/mono-0.28.html
* Fixed bug #972: The total value in the tooltip is now displayed with
fractional portion
* Fixed bug #962: Any errors about wrong configuration are now only
displayed in a dialog after changing configuration and not after
startup. This should help users whose network device is created after
dialing-in.
but I'm not sure what they are, and the freenet6 site does not
appear to have an easy way to get older versions of the files.
This is an INTERACTIVE_STAGES= fetch package also, so people might
have some difficulty without this update.
Changes between 0.9.6j and 0.9.6k [30 Sep 2003]
*) Fix various bugs revealed by running the NISCC test suite:
Stop out of bounds reads in the ASN1 code when presented with
invalid tags (CAN-2003-0543 and CAN-2003-0544).
If verify callback ignores invalid public key errors don't try to check
certificate signature with the NULL public key.
[Steve Henson]
*) In ssl3_accept() (ssl/s3_srvr.c) only accept a client certificate
if the server requested one: as stated in TLS 1.0 and SSL 3.0
specifications.
[Steve Henson]
*) In ssl3_get_client_hello() (ssl/s3_srvr.c), tolerate additional
extra data after the compression methods not only for TLS 1.0
but also for SSL 3.0 (as required by the specification).
[Bodo Moeller; problem pointed out by Matthias Loepfe]
*) Change X509_certificate_type() to mark the key as exported/exportable
when it's 512 *bits* long, not 512 bytes.
[Richard Levitte]
Changes between 0.9.6i and 0.9.6j [10 Apr 2003]
*) Countermeasure against the Klima-Pokorny-Rosa extension of
Bleichbacher's attack on PKCS #1 v1.5 padding: treat
a protocol version number mismatch like a decryption error
in ssl3_get_client_key_exchange (ssl/s3_srvr.c).
[Bodo Moeller]
*) Turn on RSA blinding by default in the default implementation
to avoid a timing attack. Applications that don't want it can call
RSA_blinding_off() or use the new flag RSA_FLAG_NO_BLINDING.
They would be ill-advised to do so in most cases.
[Ben Laurie, Steve Henson, Geoff Thorpe, Bodo Moeller]
*) Change RSA blinding code so that it works when the PRNG is not
seeded (in this case, the secret RSA exponent is abused as
an unpredictable seed -- if it is not unpredictable, there
is no point in blinding anyway). Make RSA blinding thread-safe
by remembering the creator's thread ID in rsa->blinding and
having all other threads use local one-time blinding factors
(this requires more computation than sharing rsa->blinding, but
avoids excessive locking; and if an RSA object is not shared
between threads, blinding will still be very fast).
[Bodo Moeller]
Changes between 0.9.6h and 0.9.6i [19 Feb 2003]
*) In ssl3_get_record (ssl/s3_pkt.c), minimize information leaked
via timing by performing a MAC computation even if incorrrect
block cipher padding has been found. This is a countermeasure
against active attacks where the attacker has to distinguish
between bad padding and a MAC verification error. (CAN-2003-0078)
[Bodo Moeller; problem pointed out by Brice Canvel (EPFL),
Alain Hiltgen (UBS), Serge Vaudenay (EPFL), and
Martin Vuagnoux (EPFL, Ilion)]
Changes between 0.9.6g and 0.9.6h [5 Dec 2002]
*) New function OPENSSL_cleanse(), which is used to cleanse a section of
memory from it's contents. This is done with a counter that will
place alternating values in each byte. This can be used to solve
two issues: 1) the removal of calls to memset() by highly optimizing
compilers, and 2) cleansing with other values than 0, since those can
be read through on certain media, for example a swap space on disk.
[Geoff Thorpe]
*) Bugfix: client side session caching did not work with external caching,
because the session->cipher setting was not restored when reloading
from the external cache. This problem was masked, when
SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG (part of SSL_OP_ALL) was set.
(Found by Steve Haslam <steve@araqnid.ddts.net>.)
[Lutz Jaenicke]
*) Fix client_certificate (ssl/s2_clnt.c): The permissible total
length of the REQUEST-CERTIFICATE message is 18 .. 34, not 17 .. 33.
[Zeev Lieber <zeev-l@yahoo.com>]
*) Undo an undocumented change introduced in 0.9.6e which caused
repeated calls to OpenSSL_add_all_ciphers() and
OpenSSL_add_all_digests() to be ignored, even after calling
EVP_cleanup().
[Richard Levitte]
*) Change the default configuration reader to deal with last line not
being properly terminated.
[Richard Levitte]
*) Change X509_NAME_cmp() so it applies the special rules on handling
DN values that are of type PrintableString, as well as RDNs of type
emailAddress where the value has the type ia5String.
[stefank@valicert.com via Richard Levitte]
*) Add a SSL_SESS_CACHE_NO_INTERNAL_STORE flag to take over half
the job SSL_SESS_CACHE_NO_INTERNAL_LOOKUP was inconsistently
doing, define a new flag (SSL_SESS_CACHE_NO_INTERNAL) to be
the bitwise-OR of the two for use by the majority of applications
wanting this behaviour, and update the docs. The documented
behaviour and actual behaviour were inconsistent and had been
changing anyway, so this is more a bug-fix than a behavioural
change.
[Geoff Thorpe, diagnosed by Nadav Har'El]
*) Don't impose a 16-byte length minimum on session IDs in ssl/s3_clnt.c
(the SSL 3.0 and TLS 1.0 specifications allow any length up to 32 bytes).
[Bodo Moeller]
*) Fix initialization code race conditions in
SSLv23_method(), SSLv23_client_method(), SSLv23_server_method(),
SSLv2_method(), SSLv2_client_method(), SSLv2_server_method(),
SSLv3_method(), SSLv3_client_method(), SSLv3_server_method(),
TLSv1_method(), TLSv1_client_method(), TLSv1_server_method(),
ssl2_get_cipher_by_char(),
ssl3_get_cipher_by_char().
[Patrick McCormick <patrick@tellme.com>, Bodo Moeller]
*) Reorder cleanup sequence in SSL_CTX_free(): only remove the ex_data after
the cached sessions are flushed, as the remove_cb() might use ex_data
contents. Bug found by Sam Varshavchik <mrsam@courier-mta.com>
(see [openssl.org #212]).
[Geoff Thorpe, Lutz Jaenicke]
*) Fix typo in OBJ_txt2obj which incorrectly passed the content
length, instead of the encoding length to d2i_ASN1_OBJECT.
[Steve Henson]
* play.samples is in bytes, not frames. (XXX I wonder if we can fix this or
it's too late??)
* Set blocksize much smaller so that xine thinks the pointer is "real-time".