Security Library 1.05 Release note

Jan 01, 2011 - Author: Sierra Wireless - Version 1.05 - 3170 Views
  1. NEW FEATURES
  2. SOFTWARE RELEASE DESCRIPTION
    2.1 Software Identification
    2.2 Compatibility
  3. KNOWN RESTRICTIONS
  4. INTERFACE MODIFICATIONS
  5. CORRECTIONS & IMPROVEMENTS

1. New Features

No new features have been introduced in this release.

2. Software Release Description

2.1. Software Identification

Software Identification 1.05

2.2. Compatibility

Libraries compliant with
Open AT OS 6.20 or higher
Internet Plug-in 5.30 or higher

3. Known restrictions


IDDescription (What / When)Impacted DomainImpacted Sub Domain
47945 The following options of the GetOpts function don't work correctly or provide unintelligible results: WIP_COPT_PUB_KEY, WIP_COPT_EXT_CRITICAL, WIP_COPT_PUB_KEY_ALGO and WIP_COPT_SIG_ALGO.
It is recommended not to use these options.
OTHER OTHER
48185 TLS Ciphers are being used while SSLV3 version is used during channel creation. Though, the channel is created successfully as the client is able to handshake properly with the server but the underlying protocol used is not correct. OTHER OTHER
50375 In case of big transfer, customer should use smaller buffers or increase the internal SSL write buffer size to send its data OTHER OTHER

4. Interface modifications

Security 1.05 does not introduce any new interface modifications

5. Corrections & Improvements

IDDescription (What / When)Impacted DomainImpacted Sub DomainFixed in
58747 Encryption failure is observed if a GCC compiled Open AT application is used in AES CBC mode. OTHER OTHER 1.05
59671 When compared against IDE v1, stack size allocated in Security Samples (compiled in RVDS and ADS) has increased when built using Developer Studio.
Note: This will not affect current customer applications.
OTHER OTHER 1.05
59786 Due to incorrect alignment of char array, u8* inputs parameters in AES cryptographic APIs (ngcAES_Init() and ngcAES_Crypt()) may not work correctly. OTHER OTHER 1.05
54456 SSL library does not forward PEER CLOSE event to user application.
As a consequence, SSL resources are not released (even when forcing closure with wip_SSLClose()).
Subsequent SSL socket opening could fail with backtrace "ADL get memory" leading to a reset.
OTHER OTHER 1.03
51825
50428
Data corruption is possible in first data exchanged between client and server using SSL channel OTHER OTHER 1.02
44486 If you are using an SSL socket and if an event WIP_CEV_ERROR is generated, the memory resources used by the SSL socket are not released even if a wip_close() is called.
If there is not enough available memory, the trace "ADL Get memory error" and RESET is sent, when a try to open another SSL session is made. To avoid the RESET, use the adl_errSubscribe function to trap the error (however a reset is necessary to reopen an SSL session).
OTHER OTHER 1.01
48105 When you are getting an HTTPS page through the GPRS bearer, It is possible to receive two WIP_CEV_PEER_CLOSE events instead of one. OTHER OTHER 1.01
48633 Customer cannot create their own WIP channel classes OTHER OTHER 1.01
48115 It is impossible to connect to a SSL server if WIP_COPT_ENCRYPTION and/or WIP_COPT_AUTHENTICATION are/is set to WIP_SSL_NULL. OTHER OTHER 1.01

Documentation

Comment

©2024 All rights reserved
×
You have been successfully unsubscribed to this product. To access your subscription click here.