aboutsummaryrefslogtreecommitdiffstats
path: root/doc
diff options
context:
space:
mode:
authorJack Lloyd <[email protected]>2015-11-24 17:46:07 -0500
committerJack Lloyd <[email protected]>2015-11-24 17:46:07 -0500
commitbf59ffc4de374d7b27b7ab400789ab2723131b7a (patch)
treeee0a64e937546cbe0528124d37dd9ffbaeaa788c /doc
parentb4f9ea55bf9cec36d3f3054c2da66a240f11b9c3 (diff)
Updates for news, readme
[ci skip]
Diffstat (limited to 'doc')
-rw-r--r--doc/news.rst17
1 files changed, 8 insertions, 9 deletions
diff --git a/doc/news.rst b/doc/news.rst
index 2622c66bd..68a81f189 100644
--- a/doc/news.rst
+++ b/doc/news.rst
@@ -14,17 +14,16 @@ Version 1.11.25, Not Yet Released
* The OpenSSL implementation of RC4 would return the wrong value from `name` if
leading bytes of the keystream had been skipped in the output.
-* Fixed the signature of botan_pubkey_destroy which took the wrong type and was
- not usable.
+* Fixed the signature of the FFI function botan_pubkey_destroy, which took the
+ wrong type and was not usable.
-* The TLS client would erronously reject any server key exchange
- packet smaller than 6 bytes. This prevented negotiating a plain PSK
- TLS ciphersuite with an empty identity hint. ECDHE_PSK and DHE_PSK
- suites were not affected.
+* The TLS client would erronously reject any server key exchange packet smaller
+ than 6 bytes. This prevented negotiating a plain PSK TLS ciphersuite with an
+ empty identity hint. ECDHE_PSK and DHE_PSK suites were not affected.
-* Fixed a bug that would cause the TLS client to occasionally reject a
- valid server key exchange message as having an invalid signature.
- This only affected DHE ciphersuites.
+* Fixed a bug that would cause the TLS client to occasionally reject a valid
+ server key exchange message as having an invalid signature. This only affected
+ DHE and SRP ciphersuites.
* Support for negotiating use of SHA-224 in TLS has been disabled in the
default policy.