==============================================
Release notes for current version of Sofia-SIP
==============================================
Changes since last release
--------------------------
Bugs in blaa and foo have been fixed. The stack now supports
use of foobar...
API/ABI changes and versioning
------------------------------
**template**: New features in API are marked with Doxytag macro @VERSION_1_XX_X.
libsofia-sip-ua:
- **template**: Added foobar() function (sofia-sip/foobar.h).
- The mp_len type was changed from usize_t to unsigned.
The change is binary-incompatible on 64-bit platforms when compiled with
the configure opetion --disable-size-compat
- This release is ABI/API compatible with applications linked against
any 1.12.x release. However, applications built against this release won't
work against an older library. The ABI has been tested with the nua module
unit test (test_nua) built against original 1.12.0 release.
Removed globals which should have been static in first place:
- su_t64_to_time()
- mutex_trylocker()
- su_port_set_system_preferences()
- t_null_next(), t_null_move(), t_null_dup(), t_null_copy(), t_null_find()
- t_skip_next(), t_skip_move(), t_skip_len(), t_skip_dup(), t_skip_filter()
- t_next_next(), t_next_move(), t_next_len(), t_next_dup(), t_next_filter()
- t_filter_with(), t_any_filter()
- sres_record_class()
libsofia-sip-ua-glib:
- No ABI/API changes, compatible with 1.12.0. Note, libsofia-sip-ua-glib
interface is not considered stable and may change in a future 1.12.x
release.
Contributors to this release
----------------------------
Jarod Neuner
Michael Jerris
- **template**: First Surname (patch to nua/soa/msg)
See the AUTHORS file in the distribution package.
Notes on new features
---------------------
Jarod Neuner has improved certificate validation facilities of TLS
transport. Significant changes include:
1) The TLS handshake is no longer handled via transparent negotiation.
Certain static methods from tport.c were exposed to make this possible.
2) Certificate subjects are copied out of the peer certificate before
the first message is sent. The next patch will include code that allows
the stack to reject messages sent to a untrusted peer.
3) The tport module can now report whether a secondary has a verified
certificate chain and the subjects of the peer certificate.
Bugs fixed in this release
--------------------------
< notable bugs fixed in this release
- check the sf.net bug tracker; see closed bugs,
sorted by closing date
- other bugs as fixed in CVS/darcs
/>
- **template**: #9499652 sf.net bug item title
- Accept multiple WWW-Authenticate and Authorization headers.
Bug reported by Andrew Rechenberg.