diff options
author | Jack Lloyd <[email protected]> | 2015-11-24 17:46:07 -0500 |
---|---|---|
committer | Jack Lloyd <[email protected]> | 2015-11-24 17:46:07 -0500 |
commit | bf59ffc4de374d7b27b7ab400789ab2723131b7a (patch) | |
tree | ee0a64e937546cbe0528124d37dd9ffbaeaa788c /doc/news.rst | |
parent | b4f9ea55bf9cec36d3f3054c2da66a240f11b9c3 (diff) |
Updates for news, readme
[ci skip]
Diffstat (limited to 'doc/news.rst')
-rw-r--r-- | doc/news.rst | 17 |
1 files changed, 8 insertions, 9 deletions
diff --git a/doc/news.rst b/doc/news.rst index 2622c66bd..68a81f189 100644 --- a/doc/news.rst +++ b/doc/news.rst @@ -14,17 +14,16 @@ Version 1.11.25, Not Yet Released * The OpenSSL implementation of RC4 would return the wrong value from `name` if leading bytes of the keystream had been skipped in the output. -* Fixed the signature of botan_pubkey_destroy which took the wrong type and was - not usable. +* Fixed the signature of the FFI function botan_pubkey_destroy, which took the + wrong type and was not usable. -* The TLS client would erronously reject any server key exchange - packet smaller than 6 bytes. This prevented negotiating a plain PSK - TLS ciphersuite with an empty identity hint. ECDHE_PSK and DHE_PSK - suites were not affected. +* The TLS client would erronously reject any server key exchange packet smaller + than 6 bytes. This prevented negotiating a plain PSK TLS ciphersuite with an + empty identity hint. ECDHE_PSK and DHE_PSK suites were not affected. -* Fixed a bug that would cause the TLS client to occasionally reject a - valid server key exchange message as having an invalid signature. - This only affected DHE ciphersuites. +* Fixed a bug that would cause the TLS client to occasionally reject a valid + server key exchange message as having an invalid signature. This only affected + DHE and SRP ciphersuites. * Support for negotiating use of SHA-224 in TLS has been disabled in the default policy. |