diff options
author | Jack Lloyd <[email protected]> | 2016-10-25 19:54:58 -0400 |
---|---|---|
committer | Jack Lloyd <[email protected]> | 2016-10-25 19:54:58 -0400 |
commit | ced8e0d6dbabce688b8e3b2ee366e9e71232f35e (patch) | |
tree | a4dce5f4b9f4f884d51d1f15a81bf3d669745f23 /doc | |
parent | 7fbd31f31f5ec58792ab08a1950f63e75a4ba30b (diff) |
Fix some formatting issues in 1.11.33 notes
[ci skip]
Diffstat (limited to 'doc')
-rw-r--r-- | doc/news.rst | 24 |
1 files changed, 12 insertions, 12 deletions
diff --git a/doc/news.rst b/doc/news.rst index 308157709..58e4723d0 100644 --- a/doc/news.rst +++ b/doc/news.rst @@ -13,20 +13,20 @@ Version 1.11.33, Not Yet Released revocation information in a SQL database. Subclass Certificate_Store_In_SQLite specializes with support for SQLite3 databases. (GH #631) -* The Certificate_Store interface has been changed to deal with std::shared_ptrs - instead of raw pointers (GH #471 #631) +* The Certificate_Store interface has been changed to deal with + ``std::shared_ptrs`` instead of raw pointers (GH #471 #631) * Add support for official SHA-3. Keccak-1600 was already supported but used different padding from FIPS 202. (GH #669) * Add SHAKE-128 based stream cipher. (GH #669) -* NewHope now supports the AES-128/CTR + SHA-256 parameters used by - BoringSSL in addition to the SHA-3/SHAKE-128 parameters used by the - reference implementation. (GH #669) +* NewHope key exchange now supports the SHA-256/AES-128-CTR scheme + used by BoringSSL in addition to the SHA-3/SHAKE-128 parameters used + by the reference implementation. (GH #669) * Add support for the TLS Supported Point Formats Extension from RFC 4492. Adds - TLS::Policy::use_ecc_point_compression policy option. If supported on both + ``TLS::Policy::use_ecc_point_compression`` policy option. If supported on both sides, ECC points can be sent in compressed format which saves a few bytes during the handshake. (GH #645) @@ -34,19 +34,19 @@ Version 1.11.33, Not Yet Released entropy source to be not available under its normal name "win32_cryptoapi" but instead "dev_random". GH #644 -* Accept read-only access to /dev/urandom. System_RNG previously required +* Accept read-only access to ``/dev/urandom``. System_RNG previously required read-write access, to allow applications to provide inputs to the system PRNG. But local security policies might only allow read-only access, as is the case with Ubuntu's AppArmor profile for applications in the Snappy binary format. If opening read/write fails, System_RNG silently backs down to - read-only, in which case calls to `add_entropy` on that object will fail. + read-only, in which case calls to ``add_entropy`` on that object will fail. (GH #647 #648) * Fix use of Win32 CryptoAPI RNG as an entropy source, which was accidentally disabled due to empty list of acceptable providers being specified. Typically the library would fall back to gathering entropy from OS functions returning statistical information, but if this functionality was disabled in the build a - PRNG_Unseeded exception would result. (GH #655) + ``PRNG_Unseeded`` exception would result. (GH #655) * Add support for building the library as part of the IncludeOS unikernel. This included making filesystem and threading support optional. (GH #665) @@ -58,10 +58,10 @@ Version 1.11.33, Not Yet Released * Internal cleanups to TLS CBC record handling. TLS CBC ciphersuites can now be disabled by disabling `tls_cbc` module. (GH #642 #659) -* Internal cleanups to the name->object mapping code eliminates most - global locks and all use of static initializers (GH #668 #465) +* Internal cleanups to the object lookup code eliminates most global locks and + all use of static initializers (GH #668 #465) -* Avoid static_assert triggering under MSVC debug builds (GH #646) +* Avoid ``static_assert`` triggering under MSVC debug builds (GH #646) * The antique PBKDF1 password hashing scheme is deprecated and will be removed in a future release. It was only used to support the equally |