Security Library 1.03 Release note

Feb 01, 2010 - Author: Sierra Wireless - Version 1.03 - 2155 Views

2.1. Software Identification.
2.2. Compatibility.


1. New Features

No new feature has been added from Security plug-in 1.02.

2. Software Release Description

2.1. Software Identification

Software Identification Security 1.03


Libraries compliant with
Open AT® OS 6.20
Internet plug-in 5.30

3. Known restrictions

Id Description (What / When) Impacted Domain Impacted Sub Domain Submitted Date
47945 The following options of the GetOpts function don't work correctly or provide unintelligible results: WIP_COPT_PUB_KEY, WIP_COPT_EXT_CRITICAL, WIP_COPT_PUB_KEY_ALGO and WIP_COPT_SIG_ALGO.
It is recommended not to use these options.
06/05/2008 16:43:23
48185 TLS Ciphers are being used while SSLV3 version is used during channel creation. Though, the channel is created successfully as the client is able to handshake properly with the server but the underlying protocol used is not correct. 21/05/2008 11:05:59
50375 In case of big transfer, customer should use smaller buffers or increase the internal SSL write buffer size to send its data 11/09/2008 13:57:41

4. Interface modifications

This section lists the interfaces that have been modified from the Security 1.02.

API Comment

5. Corrections & Improvements

Id Description (What / When) Impacted Domain Impacted Sub Domain Fixed in
54456 SSL library does not forward PEER CLOSE event to user application.
As a consequence, SSL resources are not released (even when forcing closure with wip_SSLClose()).
Subsequent SSL socket opening could fail with backtrace "ADL get memory" leading to a reset.
Security 1.03
Data corruption is possible in first data exchanged between client and server using SSL channel Security 1.02
44486 If you are using an SSL socket and if an event WIP_CEV_ERROR is generated, the memory resources used by the SSL socket are not released even if a wip_close() is called.
If there is not enough available memory, the trace "ADL Get memory error" and RESET is sent, when a try to open another SSL session is made. To avoid the RESET, use the adl_errSubscribe function to trap the error (however a reset is necessary to reopen an SSL session).
Security 1.01
48105 When you are getting an HTTPS page through the GPRS bearer, It is possible to receive two WIP_CEV_PEER_CLOSE events instead of one. Security 1.01
48633 Customer cannot create their own WIP channel classes Security 1.01
48115 It is impossible to connect to a SSL server if WIP_COPT_ENCRYPTION and/or WIP_COPT_AUTHENTICATION are/is set to WIP_SSL_NULL. Security 1.01



©2023 Sierra Wireless. All rights reserved.
You have been successfully unsubscribed to this product. To access your subscription click here.