aboutsummaryrefslogtreecommitdiffstats
path: root/doc
diff options
context:
space:
mode:
authorJack Lloyd <[email protected]>2016-05-06 11:44:36 -0400
committerJack Lloyd <[email protected]>2016-05-06 11:44:36 -0400
commitb4299d7901362879474d7b169b0376887cc5ecb3 (patch)
tree0ca574fedc0681dff596e5f064a57d109ec3cb9d /doc
parent97a2c18c6017be6c871c1fc673f2f100fa3e8794 (diff)
Update with changes since 1.11.29
Diffstat (limited to 'doc')
-rw-r--r--doc/news.rst31
1 files changed, 30 insertions, 1 deletions
diff --git a/doc/news.rst b/doc/news.rst
index 188f3db4d..2a9fe53a6 100644
--- a/doc/news.rst
+++ b/doc/news.rst
@@ -9,6 +9,17 @@ Version 1.11.30, Not Yet Released
a MAC failure. Records like this are used by OpenSSL in TLS 1.0
connections in order to randomize the IV.
+* The Transform and Keyed_Transform interfaces has been removed. The
+ two concrete implementations of these interfaces were Cipher_Mode
+ and the Compressor_tkk. The Cipher_Mode interface remains unchanged
+ as the Transform and Keyed_Transform signatures have moved to it;
+ no changes to Cipher_Mode usage should be necessary. Any uses of
+ Transform& or Keyed_Transform& to refer to a cipher should be replaced
+ by Cipher_Mode&. The compression algorithm interface has changed; the start
+ function now takes the per-message compression ratio to use. Previously the
+ compression level to use had to be set once, at creation time, and
+ the required `secure_vector` argument to start was required to be empty.
+
* Add IETF versions of the ChaCha20Poly1305 TLS ciphersuites from
draft-ietf-tls-chacha20-poly1305-04. The previously implemented
(non-standard) ChaCha20Poly1305 ciphersuites from
@@ -19,14 +30,32 @@ Version 1.11.30, Not Yet Released
previous versions of the draft, and the ciphersuite numbers used for
the (still experimental) OCB ciphersuites have changed.
+* Previously an unknown critical extension caused X.509 certificate
+ parsing to fail; such a cert could not be created at all. Now
+ parsing succeeds and the certificate validation fails with
+ an error indicating an unknown critical extension. GH #469
+
+* X509_CRL previously had an option to cause it to ignore unknown
+ critical extensions. This has been removed.
+
+* Added support for ChaCha stream cipher with 12 rounds.
+
* Add ECGDSA signature algorithm (GH #479)
-* Add NIST SP800-108 and 56C KDFs
+* Add NIST SP800-108 and 56C KDFs (GH #481)
* A bug in the IETF version of ChaCha20Poly1305 (with 96 bit nonces)
caused incorrect computation when the plaintext or AAD was exactly
a multiple of 16 bytes.
+* Fix return type of TLS_Reader::get_u32bit, which was truncated to
+ 16 bits. This only affected decoding of session ticket lifetimes.
+ GH #478
+
+* Fix OS X dylib naming problem (GH #468 #467)
+
+* Fix bcrypt function under Python 3 (GH #461)
+
Version 1.10.13, 2016-04-23
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^