Note: Your user name is not your email address.
Your account is locked out! Please click here to unlock your account.
Your account is not activated yet. Please check your email and click on the activation link that was sent to you when you registered to our site. Did not received the activation email? Please click here to contact us.
Login failed, username or password is incorrect.
2.1. Software Identification. 2.2. Compatibility.
3. KNOWN RESTRICTIONS. 4. INTERFACE MODIFICATIONS. 5. CORRECTIONS & IMPROVEMENTS.
HTML Documentation: As well as PDF, the SSL and Jamming User Guides are available in HTML format. By installing the Security plug-in package with the Software Installer (e.g. Sierra Wireless Software Suite v2.34 Full Installer.exe) or with the Developer Studio, you can use the Developer Studio to surf dynamically into the documentation. Press “F1” to display the dynamic contextual help to launch research or to directly access to our SSL and jamming function indexation tables
Threshold Tuning: New API has been provided to tune the Mean Threshold value used by the Jamming Algorithm. This feature is available in beta stage. Please refer to the Interface modifications section below for the new APIs.
Software Identification
Security 1.04
Libraries compliant with
Open AT® OS 6.20
Internet plug-in 5.30
Id
Description (What / When)
Impacted Domain
Impacted Sub Domain
Submitted Date
ANO47945
The following options of the GetOpts function don't work correctly or provide unintelligible results: WIP_COPT_PUB_KEY, WIP_COPT_EXT_CRITICAL, WIP_COPT_PUB_KEY_ALGO and WIP_COPT_SIG_ALGO.It is recommended not to use these options.
06/05/2008 16:43:23
ANO48185
TLS Ciphers are being used while SSLV3 version is used during channel creation. Though, the channel is created successfully as the client is able to handshake properly with the server but the underlying protocol used is not correct.
21/05/2008 11:05:59
ANO50375
In case of big transfer, customer should use smaller buffers or increase the internal SSL write buffer size to send its data
11/09/2008 13:57:41
Fixed in
CUS54456
SSL library does not forward PEER CLOSE event to user application. As a consequence, SSL resources are not released (even when forcing closure with wip_SSLClose()). Subsequent SSL socket opening could fail with backtrace "ADL get memory" leading to a reset.
Security 1.03
CUS51825ANO50428
Data corruption is possible in first data exchanged between client and server using SSL channel
Security 1.02
CUS44486
If you are using an SSL socket and if an event WIP_CEV_ERROR is generated, the memory resources used by the SSL socket are not released even if a wip_close() is called.If there is not enough available memory, the trace "ADL Get memory error" and RESET is sent, when a try to open another SSL session is made. To avoid the RESET, use the adl_errSubscribe function to trap the error (however a reset is necessary to reopen an SSL session).
Security 1.01
ANO48105
When you are getting an HTTPS page through the GPRS bearer, It is possible to receive two WIP_CEV_PEER_CLOSE events instead of one.
DEV48633
Customer cannot create their own WIP channel classes
ANO48115
It is impossible to connect to a SSL server if WIP_COPT_ENCRYPTION and/or WIP_COPT_AUTHENTICATION are/is set to WIP_SSL_NULL.