diff options
Diffstat (limited to 'doc')
-rw-r--r-- | doc/news.rst | 28 | ||||
-rw-r--r-- | doc/os.rst | 1 | ||||
-rw-r--r-- | doc/todo.rst | 1 |
3 files changed, 19 insertions, 11 deletions
diff --git a/doc/news.rst b/doc/news.rst index 2622c66bd..cce298ffd 100644 --- a/doc/news.rst +++ b/doc/news.rst @@ -9,28 +9,36 @@ Version 1.11.25, Not Yet Released adopted over time, each of which was insufficient on its own for testing the entire library. These have been fully converged on a new framework which suffices for all of the tests. There should be no user-visible change as a - result of this. + result of this, except that the output format of `botan-test` has changed. + +* Improved side channel countermeasures for the table based AES implementation, + by ensuring the table is loaded into memory at start and computing the table + at runtime to avoid flush+reload based attacks due to shared VMM mappings. + +* Support for the insecure ECC groups secp112r1, secp112r2, secp128r1, and + secp128r2 has been removed. * The OpenSSL implementation of RC4 would return the wrong value from `name` if leading bytes of the keystream had been skipped in the output. -* Fixed the signature of botan_pubkey_destroy which took the wrong type and was - not usable. +* Fixed the signature of the FFI function botan_pubkey_destroy, which took the + wrong type and was not usable. -* The TLS client would erronously reject any server key exchange - packet smaller than 6 bytes. This prevented negotiating a plain PSK - TLS ciphersuite with an empty identity hint. ECDHE_PSK and DHE_PSK - suites were not affected. +* The TLS client would erronously reject any server key exchange packet smaller + than 6 bytes. This prevented negotiating a plain PSK TLS ciphersuite with an + empty identity hint. ECDHE_PSK and DHE_PSK suites were not affected. -* Fixed a bug that would cause the TLS client to occasionally reject a - valid server key exchange message as having an invalid signature. - This only affected DHE ciphersuites. +* Fixed a bug that would cause the TLS client to occasionally reject a valid + server key exchange message as having an invalid signature. This only affected + DHE and SRP ciphersuites. * Support for negotiating use of SHA-224 in TLS has been disabled in the default policy. * Added `remove_all` function to the `TLS::Session_Manager` interface +* Avoid GCC warning in pedantic mode when including bigint.h GH #330 + Version 1.11.24, 2015-11-04 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ diff --git a/doc/os.rst b/doc/os.rst index 9e1ee641e..83fee9351 100644 --- a/doc/os.rst +++ b/doc/os.rst @@ -33,7 +33,6 @@ A summary of OS features as defined in ``src/build-data/os``. "clock_gettime", " ", "X", " ", " ", "X", "X", " ", " ", " ", " ", "X", " ", " ", "X", "X", "X", " ", " " "cryptgenrandom", " ", " ", " ", " ", " ", " ", " ", " ", " ", " ", " ", "X", " ", " ", " ", " ", " ", "X" "dlopen", " ", "X", " ", "X", " ", "X", " ", " ", " ", " ", "X", " ", " ", "X", "X", "X", " ", " " - "getsid", "X", " ", "X", "X", " ", "X", "X", "X", " ", "X", "X", " ", " ", "X", " ", "X", "X", " " "gettimeofday", "X", "X", "X", "X", "X", "X", "X", "X", " ", "X", "X", " ", "X", "X", "X", "X", "X", " " "gmtime_r", " ", "X", " ", "X", " ", "X", "X", " ", " ", " ", "X", " ", " ", "X", "X", "X", " ", " " "gmtime_s", " ", " ", " ", " ", " ", " ", " ", " ", " ", " ", " ", " ", " ", " ", " ", " ", " ", "X" diff --git a/doc/todo.rst b/doc/todo.rst index 11bfc8836..5ea142464 100644 --- a/doc/todo.rst +++ b/doc/todo.rst @@ -57,6 +57,7 @@ Symmetric Algorithms, Hashes, ... ---------------------------------------- * Bitsliced AES or Camellia +* Compressed tables for AES * Camellia with AES-NI * Serpent using AVX2 * Serpent using SSSE3 pshufb for sboxes |