forked from freeswitch/sofia-sip
-
Notifications
You must be signed in to change notification settings - Fork 0
/
RELEASE
108 lines (87 loc) · 4.28 KB
/
RELEASE
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
==============================================
Release notes for current version of Sofia-SIP
==============================================
Changes since last release
--------------------------
<changes since last written in freshmeat.net "Changes:" style;
and in less than 10 lines, written in 3rd person English, with
complete sentences />
Bugs in blaa and foo have been fixed. The stack now supports
use of foobar...
API/ABI changes and versioning
------------------------------
<see previous release notes at
http://sofia-sip.sourceforge.net/relnotes/ for examples ;
- should include all changes to public headers, and
other important information to developers;
- and should be updated _continuously_! />
**template**: New features in API are marked with Doxytag macro @VERSION_1_XX_X.
libsofia-sip-ua:
- **template**: Added foobar() function (sofia-sip/foobar.h).
- Timing out CANCELed INVITE client transactions is now done with timer D.
Previously, the INVITE client transactions were restarted instead of
timing out under certain circumstances.
- An INVITE transaction that has been timed out with stack timer C is now
CANCELed automatically. Previously, such the INVITE client transactions
were restarted instead of timing out under certain circumstances.
- Timing out forked INVITE client transactions is now done by stack.
The stack generates a 408 response to each INVITE transaction fork that
has not received a final response within 32 seconds (or 64 times SIP T1)
after first final response to the INVITE was received.
- The mp_len type was changed from usize_t to unsigned.
The change is binary-incompatible on 64-bit platforms when compiled with
the configure opetion --disable-size-compat
- This release is ABI/API compatible with applications linked against
any 1.12.x release. However, applications built against this release won't
work against an older library. The ABI has been tested with the nua module
unit test (test_nua) built against original 1.12.0 release.
Removed globals which should have been static in first place:
- su_t64_to_time()
- mutex_trylocker()
- su_port_set_system_preferences()
- t_null_next(), t_null_move(), t_null_dup(), t_null_copy(), t_null_find()
- t_skip_next(), t_skip_move(), t_skip_len(), t_skip_dup(), t_skip_filter()
- t_next_next(), t_next_move(), t_next_len(), t_next_dup(), t_next_filter()
- t_filter_with(), t_any_filter()
- sres_record_class(), urandom
- u2s_alloc()
libsofia-sip-ua-glib:
- No ABI/API changes, compatible with 1.12.0. Note, libsofia-sip-ua-glib
interface is not considered stable and may change in a future 1.12.x
release.
Contributors to this release
----------------------------
Jarod Neuner <j dot neuner at networkharbor dot com>
Michael Jerris <mike at jerris dot com>
<list of people who contributed to _this_ release
- update as people's patches are added, or when you commit stuff
- current development team members (see AUTHORS) may be omitted,
or listed at the end of the contribur list (depending on the scope
of the work done since the last release)
- name of the contributor should be enough (email addresses in AUTHORS),
plus a _brief_ description of what was contributed
- roughly sorted by number of patches accepted
/>
- **template**: First Surname (patch to nua/soa/msg)
See the AUTHORS file in the distribution package.
Notes on new features
---------------------
Jarod Neuner has improved certificate validation facilities of TLS
transport. Significant changes include:
1) The TLS handshake is no longer handled via transparent negotiation.
Certain static methods from tport.c were exposed to make this possible.
2) Certificate subjects are copied out of the peer certificate before
the first message is sent. The next patch will include code that allows
the stack to reject messages sent to a untrusted peer.
3) The tport module can now report whether a secondary has a verified
certificate chain and the subjects of the peer certificate.
Bugs fixed in this release
--------------------------
< notable bugs fixed in this release
- check the sf.net bug tracker; see closed bugs,
sorted by closing date
- other bugs as fixed in CVS/darcs
/>
- **template**: #9499652 sf.net bug item title
- Accept multiple WWW-Authenticate and Authorization headers.
Bug reported by Andrew Rechenberg.