aboutsummaryrefslogtreecommitdiffstats
path: root/news.rst
Commit message (Collapse)AuthorAgeFilesLines
* Update newsJack Lloyd2017-08-291-0/+5
|
* Update docsJack Lloyd2017-08-231-0/+2
|
* Fix bug affecting AltiVec on ppc64le processorsJack Lloyd2017-08-231-0/+3
|
* Fix Altivec detectionJack Lloyd2017-08-221-0/+2
| | | | Broken in c3ae43c04c
* Add support for ECDHE_PSK AEAD ciphersuitesJack Lloyd2017-08-221-0/+3
| | | | From draft-ietf-tls-ecdhe-psk-aead-05, now with official codepoints.
* Update newsJack Lloyd2017-08-221-0/+5
|
* Update newsJack Lloyd2017-08-161-7/+19
|
* Update FFI versionJack Lloyd2017-08-151-0/+3
| | | | | | | Also fix botan_ffi_supports_api to return true for any supported version (2.0, 2.1/2.2, and 2.3). Really 2.2 should have had its own FFI version code since there were already many FFI API additions in that release.
* Update version to 2.3.0, add release notesJack Lloyd2017-08-151-0/+16
|
* Update for 2.2.0 release2.2.0Jack Lloyd2017-08-071-1/+1
|
* Update newsJack Lloyd2017-08-071-2/+14
|
* Update news and todoJack Lloyd2017-08-041-0/+6
| | | | [ci skip]
* Additional news entriesJack Lloyd2017-07-311-0/+4
|
* Fix failure to fully zero memory before freeJack Lloyd2017-07-161-0/+3
| | | | | | Introduced in 455bd2557cbb1343e59eefd97cb449f06a702c28 Found and reported by Roman Pozlevich
* Update newsJack Lloyd2017-07-031-0/+7
|
* Update newsJack Lloyd2017-06-301-0/+4
|
* Update newsJack Lloyd2017-06-211-0/+5
|
* Update newsJack Lloyd2017-06-091-6/+8
|
* Update newsJack Lloyd2017-05-221-1/+23
| | | | [ci skip]
* Update 2.2.0 news entryJack Lloyd2017-05-181-2/+21
| | | | [ci skip]
* Merge GH #1000 Support seeking in CTR modeJack Lloyd2017-04-271-0/+2
|\
| * add a line to news.rstRené Meusel2017-04-131-0/+2
| |
* | Remove bogus news entryJack Lloyd2017-04-131-2/+0
| | | | | | | | The bug mentioned never affected any released version.
* | Update 2.2 release notesJack Lloyd2017-04-131-1/+15
|/
* fix missing flush in DataSink_Stream::end_msgPhilippe Lieser2017-04-101-0/+2
|
* Tick version on master to 2.2-preJack Lloyd2017-04-051-4/+8
| | | | Create new release note block
* Merge GH #966 Add SM3 hash functionJack Lloyd2017-04-051-0/+2
|\
| * Add SM3 hash functionDaniel Wyatt2017-04-031-0/+2
| |
* | Update for 2.1.0 and 1.10.16 releasesJack Lloyd2017-04-041-1/+1
| |
* | More news updatesJack Lloyd2017-04-041-2/+11
| |
* | Update release notesJack Lloyd2017-04-041-15/+38
|/ | | | [ci skip]
* Update releases notes for 2.1.0Daniel Neus2017-03-291-0/+14
|
* Update release notesJack Lloyd2017-03-281-0/+15
| | | | [ci skip]
* Add relnotes and CVEJack Lloyd2017-03-241-0/+4
|
* Release notes for Botan 2.1Jack Lloyd2017-03-231-0/+50
| | | | | | GH #866 [ci skip]
* Update news for 1.10.15 releaseJack Lloyd2017-01-121-0/+9
| | | | [ci skip]
* Update news for 2.0.1 release2.0.1Jack Lloyd2017-01-091-0/+19
|
* Update for 2.0.0 release2.0.0Jack Lloyd2017-01-061-1/+1
|
* Update release notesJack Lloyd2017-01-061-0/+22
| | | | [ci skip]
* Update roadmap, add support and versioning infoJack Lloyd2017-01-031-1/+1
| | | | [ci skip]
* Remove SRP6 file supportJack Lloyd2016-12-311-0/+6
| | | | | | | | | | | | | It turns out SRP6 files use a different base64 alphabet than standard, and additionally Botan's decoding of the group id seems wrong though I haven't verified this second was a bug. In any case this code couldn't parse anything it was supposed to and never could. I had already planned on adding a database backed SRP store and removing this code but the fact that it's actually not functional for purpose suggests it's best to remove this now rather than let someone chance upon it and be endlessly frustrated that it doesn't seem to work because all the verifiers are garbled.
* Increase default TLS DH min to 2048 bits, and add BSI policy class.Jack Lloyd2016-12-301-0/+4
| | | | | Moves BSI policy file to test data dir where it can be compared with what the hardcoded class outputs.
* Increase Path_Validation_Restrictions default min strength to 110Jack Lloyd2016-12-271-0/+6
| | | | | Effectively disables 1024 bit RSA as well as SHA-1. Edit the tests where required to enable it again.
* Add DL_Group testsJack Lloyd2016-12-231-11/+16
| | | | | | | | | Fix a bug in how the 6144 and 8192 IETF MODP groups were encoded; they have g and q values switched. Fixed by just switching the PEM header to match the actual encoded format. Rename DL_Group::X942_DH_PARAMETERS to ANSI_X9_42_DH_PARAMETERS to avoid a macro conflict with Windows cryptography headers (GH #482)
* Update release notesJack Lloyd2016-12-141-0/+8
| | | | [ci skip]
* Update 1.11.35 relnotes [ci skip]Jack Lloyd2016-12-111-2/+6
|
* Public_Key derived class ctors take an std::vector<byte>René Korthaus2016-12-111-0/+4
| | | | | | | Changes all the Public_Key derived classes ctors to take a std::vector instead of a secure_vector for the DER encoded public key bits. There is no point in transporting a public key in secure storage. (GH #768)
* Update news [ci skip]Jack Lloyd2016-12-081-1/+7
|
* Remove duplicate relnote item [ci skip]Jack Lloyd2016-12-051-2/+0
|
* Update relnotesJack Lloyd2016-12-051-3/+12
|