Should we move up to this new version?

Regards,
Tim

-------- Original Message --------
Subject: [announce-crypto] Bouncy Castle Crypto Provider Package version
1.32 now available
Date: Wed, 29 Mar 2006 12:56:18 +1100
From: Jon Eaves <[EMAIL PROTECTED]>
To: dev-crypto <[EMAIL PROTECTED]>,
[EMAIL PROTECTED],  [EMAIL PROTECTED],  KVM
Interest <[EMAIL PROTECTED]>

Hi all,

The latest relase of BC is now ready after a couple of false starts in
the beta process.
Thanks always to our tireless reporters of issues, one day maybe all
vendors will create
certificates in the same way.

New features in this release include support for elliptic curves over
F2m, suport for
ECDSA with CMS and S/MIME, and support for a wider range of PSS
signature types in CRL and
certificate verification. In addition further work has been done on
improving path
validation compliance with RFC 3280, OpenPGP text signatures now work
correctly in
environments with '\r' as a line separator, a typo in the header for
OpenPGP clear text
SHA256 signatures has been fixed, several encoding compatability issue
with the streaming
CMS and S/MIME APIs have been fixed and it should now be possible to
stop the S/MIME
parsers from leaving temporary files around in all operating system
environments.

As usual, the latest releases can be found at :

http://www.bouncycastle.org/

And for those who like living on the bleeding edge, the betas can be
downloaded from:

http://www.bouncycastle.org/betas/

Please note, make sure that beta feedback is sent to the
[EMAIL PROTECTED]
address, and not the general mailing list (dev-crypto)

-- 
Jon Eaves <[EMAIL PROTECTED]>
http://www.eaves.org/blog/
Co-Author of "Apache Tomcat Bible", "Professional Tomcat 5", "Beginning
JavaServer Pages"



-- 

Tim Ellison ([EMAIL PROTECTED])
IBM Java technology centre, UK.

Reply via email to