Version 4.6.0
New Features:
- Added new "Socket" API to enable users' custom protocols without encryption. See examples.
- Added authenticated encryption and example.
- Added a "Reference" to HTTP POST/GET and Socket READ/WRITE so that requests can be matched with responses in events.
- Added "Get Peer Certificate Chain" to view the list of certificates sent by the peer (if any) and updated Example HTTP Certificate Inspector.vi.
- Added "SHAKE.vi" to HASH API. SHAKE.VI caters for variable length outputs. The standard SHAKE128 and SHAKE256 list in SHA output 16 and 32 bytes respectively to be backwards compatible.
- Added "Set XOF Length.vi" to Incremental Hash API. Allows variable length hashes for SHAKE algorithms. NOP for other algorithms.
- Added Encoder and decoder for Base64 URL.
- Added "Example En-Decrypt Events.vi" to demonstrate using events with symmetric encryption.
- Added RSA function Set Public Key[HEX].vi.
- Der2PEM, PEM2Der now supports X.509 certificate conversion.
- OpenSSL PEM to OpenSSH PEM conversion.
Bug Fixes:
- Fixed SFTP example not creating and deleting Symlinks.
- Fixed Get Session's Remote Connection IP address not being populated when using IPv6 address.
Changes:
- "Follow Redirects" in the HTTP API: The default value is now TRUE instead of FALSE.
- EC and ED Signatures now no longer hash the data before creating a signature to increase interoperability with other languages. To reproduce old behaviour, hash the data before signing.
- Follow Redirects for HTTP functions is now part of a cluster (with Reference) which will break backward compatability.
- Renamed "TLS version" to "Protocol Version" and made the control a typedef.
- Added ASCII Hex string indicator to RandBytes and set the default number of bytes to 16 (NIST target for secure number of bytes).
- Updated documentation to include Coordinated Vulnerability Disclosure statements.
- Updated OpenSSL binaries to 3.6.1.
- Updated OpenSSH binary to 11.3