diff options
author | lloyd <[email protected]> | 2014-02-08 14:20:48 +0000 |
---|---|---|
committer | lloyd <[email protected]> | 2014-02-08 14:20:48 +0000 |
commit | fd9b6a6cd6ce791cf2593a23bde4174daeebb05a (patch) | |
tree | 3b96f3500d46642acc984e68759f2da047d9e9ae /doc | |
parent | c2915d84b213f3bba8fc68d1d2c035289f7c8d11 (diff) |
Have Skein call Threefish, rather than duplicating the code.
Diffstat (limited to 'doc')
-rw-r--r-- | doc/relnotes/1_11_8.rst | 10 |
1 files changed, 8 insertions, 2 deletions
diff --git a/doc/relnotes/1_11_8.rst b/doc/relnotes/1_11_8.rst index a2928f2e5..0c670a9a9 100644 --- a/doc/relnotes/1_11_8.rst +++ b/doc/relnotes/1_11_8.rst @@ -3,9 +3,15 @@ Version 1.11.8, Not Yet Released * The ChaCha20 cipher has been added +* CMAC now supports 256 and 512 bit block ciphers, which also allows + the use of larger block ciphers with EAX mode. In particular this + allows using Threefish in EAX mode. + * The antique PBES1 private key encryption scheme (which only supports DES or 64-bit RC2) has been removed. +* Skein-512 no longer supports output lengths greater than 512 bits. + * Skein did not reset its internal state properly if clear() was called, causing it to produce incorrect results for the following message. It was reset correctly in final() so most usages should not @@ -16,7 +22,7 @@ Version 1.11.8, Not Yet Released EMSA4 is now called PSSR. Aliases are set which should allow all current applications to continue to work unmodified. -* A bug in the CFB encryption caused a few bytes past the end of the - final block to be read, though the actual output was not affected. +* A bug in CFB encryption caused a few bytes past the end of the final + block to be read. The actual output was not affected. * Various portability fixes for Visual C++ 2013, OS X, and x86-32. |