diff options
author | Peter Dettman <peter.dettman@bouncycastle.org> | 2019-05-06 17:43:16 +0700 |
---|---|---|
committer | Peter Dettman <peter.dettman@bouncycastle.org> | 2019-05-06 17:43:16 +0700 |
commit | a0f190f93151a9b83194603ac56120337c1bdfbd (patch) | |
tree | 3d2ed0c831d6f98c18222ae03c04110838733d33 /crypto/Readme.html | |
parent | EdDSA verifiers now reject overly long signatures (diff) | |
download | BouncyCastle.NET-ed25519-a0f190f93151a9b83194603ac56120337c1bdfbd.tar.xz |
TLS: Clone in GetPsk since TlsPskKeyExchange will clear after use
- use not-all-zeroes test psk to ensure coverage
Diffstat (limited to 'crypto/Readme.html')
-rw-r--r-- | crypto/Readme.html | 4 |
1 files changed, 4 insertions, 0 deletions
diff --git a/crypto/Readme.html b/crypto/Readme.html index 01eddda7c..fc00814ad 100644 --- a/crypto/Readme.html +++ b/crypto/Readme.html @@ -306,6 +306,10 @@ We state, where EC MQV has not otherwise been disabled or removed: <ul> <li>EdDSA verifiers now reject overly long signatures.</li> </ul> + <h5>Additional Features and Functionality</h5> + <ul> + <li>TLS: BasicTlsPskIdentity now reusable (returns cloned array from GetPsk).</li> + </ul> <h4><a class="mozTocH4" name="mozTocId85319"></a>Release 1.8.5, Thursday January 31, 2019</h4> |