summary refs log tree commit diff
path: root/crypto
diff options
context:
space:
mode:
authorPeter Dettman <peter.dettman@bouncycastle.org>2020-02-12 13:34:38 +0700
committerPeter Dettman <peter.dettman@bouncycastle.org>2020-02-12 13:34:38 +0700
commita0c333b5359fae28297f825433a12703d397a06e (patch)
tree54a845b920ea47f37809554fecd6ec1a2c522559 /crypto
parentUpdate copyrights to 2020 (diff)
downloadBouncyCastle.NET-ed25519-a0c333b5359fae28297f825433a12703d397a06e.tar.xz
Update release notes
Diffstat (limited to 'crypto')
-rw-r--r--crypto/Readme.html4
1 files changed, 4 insertions, 0 deletions
diff --git a/crypto/Readme.html b/crypto/Readme.html
index fc00814ad..430387fff 100644
--- a/crypto/Readme.html
+++ b/crypto/Readme.html
@@ -305,10 +305,14 @@ We state, where EC MQV has not otherwise been disabled or removed:
         <h5>Defects Fixed</h5>
         <ul>
             <li>EdDSA verifiers now reject overly long signatures.</li>
+            <li>Fixed field reduction for custom secp128r1 curve.</li>
+            <li>ASN.1: Enforce no leading zeroes in OID branches (longer than 1 character).</li>
         </ul>
         <h5>Additional Features and Functionality</h5>
         <ul>
             <li>TLS: BasicTlsPskIdentity now reusable (returns cloned array from GetPsk).</li>
+            <li>Improved performance for multiple ECDSA verifications using same public key.</li>
+            <li>Support has been added for ChaCha20-Poly1305 AEAD mode from RFC 7539.</li>
         </ul>
 
         <h4><a class="mozTocH4" name="mozTocId85319"></a>Release 1.8.5, Thursday January 31, 2019</h4>