From 77da984614ae462912a1896ba1bb73c798ffd4f8 Mon Sep 17 00:00:00 2001 From: Erlang/OTP Date: Thu, 19 Jun 2014 13:47:21 +0200 Subject: Prepare release --- lib/ssl/doc/src/notes.xml | 114 +++++++++++++++++++++++++++++++++++++++++++++- 1 file changed, 113 insertions(+), 1 deletion(-) (limited to 'lib/ssl/doc') diff --git a/lib/ssl/doc/src/notes.xml b/lib/ssl/doc/src/notes.xml index c61b2a9c2f..1b37a2baa2 100644 --- a/lib/ssl/doc/src/notes.xml +++ b/lib/ssl/doc/src/notes.xml @@ -25,7 +25,119 @@ notes.xml

This document describes the changes made to the SSL application.

-
SSL 5.3.4 +
SSL 5.3.5 + +
Fixed Bugs and Malfunctions + + +

+ ssl:recv now returns {error, einval} if applied to a non + passive socket, the same as gen_tcp:recv.

+

+ Thanks to Danil Zagoskin for reporting this issue

+

+ Own Id: OTP-11878

+
+ +

+ Corrected handling of default values for + signature_algorithms extension in TLS-1.2 and + corresponding values used in previous versions that does + not support this extension.

+

+ Thanks to Danil Zagoskin

+

+ Own Id: OTP-11886

+
+ +

+ Handle socket option inheritance when pooling of accept + sockets is used

+

+ Own Id: OTP-11897

+
+ +

+ Make sure that the list of versions, possibly supplied in + the versions option, is not order dependent.

+

+ Thanks to Ransom Richardson for reporting this issue

+

+ Own Id: OTP-11912

+
+ +

+ Reject connection if the next_protocol message is sent + twice.

+

+ Own Id: OTP-11926

+
+ +

+ Correct options handling when ssl:ssl_accept/3 is called + with new ssl options after calling ssl:listen/2

+

+ Own Id: OTP-11950

+
+
+
+ + +
Improvements and New Features + + +

+ Gracefully handle unknown alerts

+

+ Thanks to Atul Atri for reporting this issue

+

+ Own Id: OTP-11874

+
+ +

+ Gracefully ignore cipher suites sent by client not + supported by the SSL/TLS version that the client has + negotiated.

+

+ Thanks to Danil Zagoskin for reporting this issue

+

+ Own Id: OTP-11875

+
+ +

+ Gracefully handle structured garbage, i.e a client sends + some garbage in a ssl record instead of a valid fragment.

+

+ Thanks to Danil Zagoskin

+

+ Own Id: OTP-11880

+
+ +

+ Gracefully handle invalid alerts

+

+ Own Id: OTP-11890

+
+ +

+ Generalize handling of default ciphers

+

+ Thanks to Andreas Schultz

+

+ Own Id: OTP-11966

+
+ +

+ Make sure change cipher spec is correctly handled

+

+ Own Id: OTP-11975

+
+
+
+ +
+ +
SSL 5.3.4
Fixed Bugs and Malfunctions -- cgit v1.2.3