diff options
author | Dr. Stephen Henson <steve@openssl.org> | 2016-02-28 22:43:30 +0000 |
---|---|---|
committer | Dr. Stephen Henson <steve@openssl.org> | 2016-02-28 22:54:54 +0000 |
commit | 71736242409da85aef5107167d44e601ee66841c (patch) | |
tree | 1b41356be8f48774ba0f68062539b2e191efa9db /CHANGES | |
parent | 5f7b0e1fdc2ba7971cf1817bae076ff55d4023d0 (diff) |
Add CHANGES entry for X25519
Reviewed-by: Rich Salz <rsalz@openssl.org>
Diffstat (limited to 'CHANGES')
-rw-r--r-- | CHANGES | 16 |
1 files changed, 16 insertions, 0 deletions
@@ -4,6 +4,22 @@ Changes between 1.0.2f and 1.1.0 [xx XXX xxxx] + *) Add X25519 support. + Integrate support for X25519 into EC library. This includes support + for public and private key encoding using the format documented in + draft-josefsson-pkix-newcurves-01: specifically X25519 uses the + OID from that draft, encodes public keys using little endian + format in the ECPoint structure and private keys using + little endian form in the privateKey field of the ECPrivateKey + structure. TLS support complies with draft-ietf-tls-rfc4492bis-06 + and uses X25519(29). + + Note: the current version supports key generation, public and + private key encoding and ECDH key agreement using the EC API. + Low level point operations such as EC_POINT_add(), EC_POINT_mul() + are NOT supported. + [Steve Henson] + *) Deprecate SRP_VBASE_get_by_user. SRP_VBASE_get_by_user had inconsistent memory management behaviour. In order to fix an unavoidable memory leak (CVE-2016-0798), |