summary refs log tree commit diff
path: root/crypto/Readme.html
diff options
context:
space:
mode:
authorPeter Dettman <peter.dettman@bouncycastle.org>2019-05-06 17:43:16 +0700
committerPeter Dettman <peter.dettman@bouncycastle.org>2019-05-06 17:43:16 +0700
commita0f190f93151a9b83194603ac56120337c1bdfbd (patch)
tree3d2ed0c831d6f98c18222ae03c04110838733d33 /crypto/Readme.html
parentEdDSA verifiers now reject overly long signatures (diff)
downloadBouncyCastle.NET-ed25519-a0f190f93151a9b83194603ac56120337c1bdfbd.tar.xz
TLS: Clone in GetPsk since TlsPskKeyExchange will clear after use
- use not-all-zeroes test psk to ensure coverage
Diffstat (limited to 'crypto/Readme.html')
-rw-r--r--crypto/Readme.html4
1 files changed, 4 insertions, 0 deletions
diff --git a/crypto/Readme.html b/crypto/Readme.html
index 01eddda7c..fc00814ad 100644
--- a/crypto/Readme.html
+++ b/crypto/Readme.html
@@ -306,6 +306,10 @@ We state, where EC MQV has not otherwise been disabled or removed:
         <ul>
             <li>EdDSA verifiers now reject overly long signatures.</li>
         </ul>
+        <h5>Additional Features and Functionality</h5>
+        <ul>
+            <li>TLS: BasicTlsPskIdentity now reusable (returns cloned array from GetPsk).</li>
+        </ul>
 
         <h4><a class="mozTocH4" name="mozTocId85319"></a>Release 1.8.5, Thursday January 31, 2019</h4>