diff options
author | Jack Lloyd <[email protected]> | 2016-06-18 10:07:09 -0400 |
---|---|---|
committer | Jack Lloyd <[email protected]> | 2016-06-18 10:07:09 -0400 |
commit | 25a83f8a35f9a02de85b5d66474a92ab34a88c3b (patch) | |
tree | cdfa6dd6cdf2c137a0b892edd19505c372af3186 | |
parent | 924f2966a48c4dd94a45e1f58f0ef85c4f40c8d7 (diff) |
Update release notes
[ci skip]
-rw-r--r-- | doc/news.rst | 15 |
1 files changed, 12 insertions, 3 deletions
diff --git a/doc/news.rst b/doc/news.rst index 38c6c797b..eaf0c872b 100644 --- a/doc/news.rst +++ b/doc/news.rst @@ -42,14 +42,15 @@ Version 1.11.30, Not Yet Released * The Transform and Keyed_Transform interfaces has been removed. The two concrete implementations of these interfaces were Cipher_Mode - and the Compressor_tkk. The Cipher_Mode interface remains unchanged + and Compressor_Transform. The Cipher_Mode interface remains unchanged as the Transform and Keyed_Transform signatures have moved to it; no changes to Cipher_Mode usage should be necessary. Any uses of Transform& or Keyed_Transform& to refer to a cipher should be replaced by Cipher_Mode&. The compression algorithm interface has changed; the start function now takes the per-message compression ratio to use. Previously the compression level to use had to be set once, at creation time, and - the required `secure_vector` argument to start was required to be empty. + the required ``secure_vector`` argument to ``start`` was required to be empty. + The new API is documented in `compression.rst` in the manual. * Add IETF versions of the ChaCha20Poly1305 TLS ciphersuites from draft-ietf-tls-chacha20-poly1305-04. The previously implemented @@ -69,12 +70,20 @@ Version 1.11.30, Not Yet Released * X509_CRL previously had an option to cause it to ignore unknown critical extensions. This has been removed. -* Added support for ChaCha stream cipher with 12 rounds. +* Added StreamCipher::seek allowing seeking to arbitrary position + in the key stream. Currently only implemented for ChaCha. (GH #497) + +* Added support for ChaCha stream cipher with 8 or 12 rounds. * Add ECGDSA signature algorithm (GH #479) +* Add support for label argument to KDFs (GH #495) + * Add NIST SP800-108 and 56C KDFs (GH #481) +* Support for Card Verifiable Certificates and the obsolete EMSA1_BSI + signature padding scheme have been removed. (GH #487) + * A bug in the IETF version of ChaCha20Poly1305 (with 96 bit nonces) caused incorrect computation when the plaintext or AAD was exactly a multiple of 16 bytes. |