aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorlloyd <[email protected]>2014-12-10 05:07:20 +0000
committerlloyd <[email protected]>2014-12-10 05:07:20 +0000
commit746844ba82d7c1b8e80dcda3da779fcc1bb495a3 (patch)
treec7dbea8c3c81a8299a6546e0780896dfb5abd744
parente4d923cb4efc69b4e058d6f79b7e2139deb1eb02 (diff)
Update for 1.11.10 release1.11.10
-rw-r--r--doc/relnotes/1_11_10.rst28
-rw-r--r--doc/website/download.rst6
2 files changed, 18 insertions, 16 deletions
diff --git a/doc/relnotes/1_11_10.rst b/doc/relnotes/1_11_10.rst
index fdc7500a1..9297a2278 100644
--- a/doc/relnotes/1_11_10.rst
+++ b/doc/relnotes/1_11_10.rst
@@ -1,4 +1,4 @@
-Version 1.11.10, Not Yet Released
+Version 1.11.10, 2014-12-10
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
* An implementation of McEliece code-based public key encryption based
@@ -15,30 +15,32 @@ Version 1.11.10, Not Yet Released
* Add support for TLS fallback signaling (draft-ietf-tls-downgrade-scsv-00).
Clients will send a fallback SCSV if the version passed to the Client
- constructor is less than the latest version supported by local policy,
- so applications implementing fallback are protected. Servers always check
- the SCSV.
+ constructor is less than the latest version supported by local policy, so
+ applications implementing fallback are protected. Servers always check the
+ SCSV.
* In previous versions a TLS::Server could service either TLS or DTLS
connections depending on policy settings and what type of client hello it
- received. This has changed and now a Server object is initialized for either
- TLS or DTLS operation. The default policy previously prohibited DTLS,
- precisely to prevent a TCP server from being surprised by a DTLS connection.
- This has changed and the default policy now allows TLS v1.0 or higher or DTLS
- v1.2.
+ received. This has changed and now a Server object is initialized for
+ either TLS or DTLS operation. The default policy previously prohibited
+ DTLS, precisely to prevent a TCP server from being surprised by a DTLS
+ connection. The default policy now allows TLS v1.0 or higher or DTLS v1.2.
* Fixed a bug in CCM mode which caused it to produce incorrect tags when used
- with a value of L other than 2. This affected CCM TLS ciphersuites, which use
- L=3. Thanks to Manuel Pégourié-Gonnard for the anaylsis and
- patch. Bugzilla 270.
+ with a value of L other than 2. This affected CCM TLS ciphersuites, which
+ use L=3. Thanks to Manuel Pégourié-Gonnard for the anaylsis and patch.
+ Bugzilla 270.
-* DTLS now supports timeouts and handshake retransmits.
+* DTLS now supports timeouts and handshake retransmits. Timeout checking
+ is triggered by the application calling the new TLS::Channel::timeout_check.
* Add a TLS policy hook to disable putting the value of the local clock in hello
random fields.
* All compression operations previously available as Filters are now
performed via the Transformation API, which minimizes memory copies.
+ Compression operations are still available through the Filter API
+ using new general compression/decompression filters in comp_filter.h
* The zlib module now also supports gzip compression and decompression.
diff --git a/doc/website/download.rst b/doc/website/download.rst
index a28cef268..72da3e181 100644
--- a/doc/website/download.rst
+++ b/doc/website/download.rst
@@ -14,9 +14,9 @@ Unsure which release you want? Check the :ref:`FAQ <devel_vs_stable>`.
Current Development Series (1.11)
----------------------------------------
-The latest development release is :doc:`relnotes/1_11_9`:
-:tgz:`1.11.9` (:tgz_sig:`sig <1.11.9>`),
-:tbz:`1.11.9` (:tbz_sig:`sig <1.11.9>`)
+The latest development release is :doc:`relnotes/1_11_10`:
+:tgz:`1.11.10` (:tgz_sig:`sig <1.11.10>`),
+:tbz:`1.11.10` (:tbz_sig:`sig <1.11.10>`)
To access the latest unreleased sources, see :doc:`vcs`. A script also
creates regular snapshots of trunk, which are available `here