aboutsummaryrefslogtreecommitdiffstats
path: root/lib/public_key/doc/src/notes.xml
diff options
context:
space:
mode:
authorErlang/OTP <[email protected]>2010-09-29 08:44:11 +0200
committerErlang/OTP <[email protected]>2010-09-29 08:44:11 +0200
commit9c6842dbbe45bdf1568f165cc135257c4addbe0e (patch)
treecf36939b5fad9fad9a17e3883acf9787d057bdc5 /lib/public_key/doc/src/notes.xml
parent2d4a7d86f97aec54b8d0544bfd25d833e4d7420a (diff)
downloadotp-9c6842dbbe45bdf1568f165cc135257c4addbe0e.tar.gz
otp-9c6842dbbe45bdf1568f165cc135257c4addbe0e.tar.bz2
otp-9c6842dbbe45bdf1568f165cc135257c4addbe0e.zip
Prepare release
Diffstat (limited to 'lib/public_key/doc/src/notes.xml')
-rw-r--r--lib/public_key/doc/src/notes.xml49
1 files changed, 49 insertions, 0 deletions
diff --git a/lib/public_key/doc/src/notes.xml b/lib/public_key/doc/src/notes.xml
index baa0e6c464..ca32063624 100644
--- a/lib/public_key/doc/src/notes.xml
+++ b/lib/public_key/doc/src/notes.xml
@@ -34,6 +34,55 @@
<file>notes.xml</file>
</header>
+<section><title>Public_Key 0.9</title>
+
+ <section><title>Improvements and New Features</title>
+ <list>
+ <item>
+ <p>
+ Updated ssl to ignore CA certs that violate the asn1-spec
+ for a certificate, and updated public key asn1 spec to
+ handle inherited DSS-params.</p>
+ <p>
+ Own Id: OTP-7884</p>
+ </item>
+ <item>
+ <p>
+ Changed ssl implementation to retain backwards
+ compatibility for old option {verify, 0} that shall be
+ equivalent to {verify, verify_none}, also separate the
+ cases unknown ca and selfsigned peer cert, and restored
+ return value of deprecated function
+ public_key:pem_to_der/1.</p>
+ <p>
+ Own Id: OTP-8858</p>
+ </item>
+ <item>
+ <p>
+ Better handling of v1 and v2 certificates. V1 and v2
+ certificates does not have any extensions so then
+ validate_extensions should just accept that there are
+ none and not end up in missing_basic_constraints clause.</p>
+ <p>
+ Own Id: OTP-8867</p>
+ </item>
+ <item>
+ <p>
+ Changed the verify fun so that it differentiate between
+ the peer certificate and CA certificates by using
+ valid_peer or valid as the second argument to the verify
+ fun. It may not always be trivial or even possible to
+ know when the peer certificate is reached otherwise.</p>
+ <p>
+ *** POTENTIAL INCOMPATIBILITY ***</p>
+ <p>
+ Own Id: OTP-8873</p>
+ </item>
+ </list>
+ </section>
+
+</section>
+
<section><title>Public_Key 0.8</title>
<section><title>Fixed Bugs and Malfunctions</title>