mirror of
https://github.com/yuzu-emu/mbedtls
synced 2024-11-24 14:28:31 +00:00
Fix language and formatting in ChangeLog
Changed the formatting and language in the ChangeLog to the house-style.
This commit is contained in:
parent
06d80cf172
commit
681edee803
1 changed files with 21 additions and 22 deletions
43
ChangeLog
43
ChangeLog
|
@ -3,13 +3,12 @@ mbed TLS ChangeLog (Sorted per branch, date)
|
||||||
= mbed TLS x.x.x branch released xxxx-xx-xx
|
= mbed TLS x.x.x branch released xxxx-xx-xx
|
||||||
|
|
||||||
Security
|
Security
|
||||||
* Fix overly strict DN comparison when looking for CRLs
|
* Fix overly strict DN comparison when looking for CRLs belonging to a
|
||||||
belonging to a particular CA. This previously lead to
|
particular CA. This previously lead to ignoring CRLs when the CRL's issuer
|
||||||
ignoring CRLs when the CRL's issuer name and the CA's
|
name and the CA's subject name differed in their string encoding (e.g.,
|
||||||
subject name differed in their string encoding (e.g.,
|
one using PrintableString and the other UTF8String) or in the choice of
|
||||||
one using PrintableString and the other UTF8String) or
|
upper and lower case. Reported by Henrik Andersson of Bosch GmbH in issue
|
||||||
in the choice of upper and lower case. Reported by
|
#1784.
|
||||||
HenrikRosenquistAndersson in #1784.
|
|
||||||
* Fix a flawed bounds check in server PSK hint parsing. In case the
|
* Fix a flawed bounds check in server PSK hint parsing. In case the
|
||||||
incoming message buffer was placed within the first 64KB of address
|
incoming message buffer was placed within the first 64KB of address
|
||||||
space and a PSK-(EC)DHE ciphersuite was used, this allowed an attacker
|
space and a PSK-(EC)DHE ciphersuite was used, this allowed an attacker
|
||||||
|
@ -19,8 +18,8 @@ Security
|
||||||
previous settings for the number of rounds made it practical for an
|
previous settings for the number of rounds made it practical for an
|
||||||
adversary to construct non-primes that would be erroneously accepted as
|
adversary to construct non-primes that would be erroneously accepted as
|
||||||
primes with high probability. This does not have an impact on the
|
primes with high probability. This does not have an impact on the
|
||||||
security of TLS, but can matter in other contexts with potentially
|
security of TLS, but can matter in other contexts with numbers chosen
|
||||||
adversarially-chosen numbers that should be prime and can be validated.
|
potentially by an adversary that should be prime and can be validated.
|
||||||
For example, the number of rounds was enough to securely generate RSA key
|
For example, the number of rounds was enough to securely generate RSA key
|
||||||
pairs or Diffie-Hellman parameters, but was insufficient to validate
|
pairs or Diffie-Hellman parameters, but was insufficient to validate
|
||||||
Diffie-Hellman parameters properly.
|
Diffie-Hellman parameters properly.
|
||||||
|
@ -62,7 +61,7 @@ New deprecations
|
||||||
MBEDTLS_ERR_XXX_FEATURE_UNAVAILABLE that indicate a feature is not
|
MBEDTLS_ERR_XXX_FEATURE_UNAVAILABLE that indicate a feature is not
|
||||||
supported are deprecated and are now replaced by the new equivalent
|
supported are deprecated and are now replaced by the new equivalent
|
||||||
platform error.
|
platform error.
|
||||||
* All module specific generic hardware accelaration errors following the
|
* All module specific generic hardware acceleration errors following the
|
||||||
form MBEDTLS_ERR_XXX_HW_ACCEL_FAILED that are deprecated and are replaced
|
form MBEDTLS_ERR_XXX_HW_ACCEL_FAILED that are deprecated and are replaced
|
||||||
by the equivalent plaform error.
|
by the equivalent plaform error.
|
||||||
* Deprecate the function mbedtls_mpi_is_prime() in favor of
|
* Deprecate the function mbedtls_mpi_is_prime() in favor of
|
||||||
|
@ -83,8 +82,8 @@ Bugfix
|
||||||
padded records in case of CBC ciphersuites using Encrypt-then-MAC.
|
padded records in case of CBC ciphersuites using Encrypt-then-MAC.
|
||||||
* Fix memory leak and freeing without initialization in the example
|
* Fix memory leak and freeing without initialization in the example
|
||||||
program programs/x509/cert_write. Fixes #1422.
|
program programs/x509/cert_write. Fixes #1422.
|
||||||
* Ignore IV in mbedtls_cipher_set_iv() when the cipher mode is MBEDTLS_MODE_ECB
|
* Ignore IV in mbedtls_cipher_set_iv() when the cipher mode is
|
||||||
Fix for #1091 raised by ezdevelop
|
MBEDTLS_MODE_ECB. Found by ezdevelop. Fixes #1091.
|
||||||
* Zeroize memory used for buffering or reassembling handshake messages
|
* Zeroize memory used for buffering or reassembling handshake messages
|
||||||
after use.
|
after use.
|
||||||
* Use `mbedtls_platform_zeroize()` instead of `memset()` for zeroization
|
* Use `mbedtls_platform_zeroize()` instead of `memset()` for zeroization
|
||||||
|
@ -92,8 +91,8 @@ Bugfix
|
||||||
* Change the default string format used for various X.509 DN attributes to
|
* Change the default string format used for various X.509 DN attributes to
|
||||||
UTF8String. Previously, the use of the PrintableString format led to
|
UTF8String. Previously, the use of the PrintableString format led to
|
||||||
wildcards and non-ASCII characters being unusable in some DN attributes.
|
wildcards and non-ASCII characters being unusable in some DN attributes.
|
||||||
Reported by raprepo in #1860 and by kevinpt in #468.
|
Reported by raprepo in #1860 and by kevinpt in #468. Fix contributed by
|
||||||
Fix contributed by Thomas-Dee in #1641.
|
Thomas-Dee.
|
||||||
* Fix compilation failure for configurations which use compile time
|
* Fix compilation failure for configurations which use compile time
|
||||||
replacements of standard calloc/free functions through the macros
|
replacements of standard calloc/free functions through the macros
|
||||||
MBEDTLS_PLATFORM_CALLOC_MACRO and MBEDTLS_PLATFORM_FREE_MACRO.
|
MBEDTLS_PLATFORM_CALLOC_MACRO and MBEDTLS_PLATFORM_FREE_MACRO.
|
||||||
|
@ -110,14 +109,14 @@ Changes
|
||||||
* Change the use of Windows threading to use Microsoft Visual C++ runtime
|
* Change the use of Windows threading to use Microsoft Visual C++ runtime
|
||||||
calls, rather than Win32 API calls directly. This is necessary to avoid
|
calls, rather than Win32 API calls directly. This is necessary to avoid
|
||||||
conflict with C runtime usage. Found and fixed by irwir.
|
conflict with C runtime usage. Found and fixed by irwir.
|
||||||
* Remember the string format of X.509 DN attributes when replicating X.509 DNs.
|
* Remember the string format of X.509 DN attributes when replicating
|
||||||
Previously, DN attributes were always written in their default string format
|
X.509 DNs. Previously, DN attributes were always written in their default
|
||||||
(mostly PrintableString), which could lead to CRTs being created which used
|
string format (mostly PrintableString), which could lead to CRTs being
|
||||||
PrintableStrings in the issuer field even though the signing CA used
|
created which used PrintableStrings in the issuer field even though the
|
||||||
UTF8Strings in its subject field; while X.509 compliant, such CRTs were
|
signing CA used UTF8Strings in its subject field; while X.509 compliant,
|
||||||
rejected in some applications, e.g. some versions of Firefox, curl
|
such CRTs were rejected in some applications, e.g. some versions of
|
||||||
and GnuTLS. Reported in #1033 by Moschn. Fix contributed by
|
Firefox, curl and GnuTLS. Reported in #1033 by Moschn. Fix contributed by
|
||||||
Thomas-Dee in #1641.
|
Thomas-Dee.
|
||||||
* Improve documentation of mbedtls_ssl_get_verify_result().
|
* Improve documentation of mbedtls_ssl_get_verify_result().
|
||||||
Fixes #517 reported by github-monoculture.
|
Fixes #517 reported by github-monoculture.
|
||||||
* Add MBEDTLS_MPI_GEN_PRIME_FLAG_LOW_ERR flag to mbedtls_mpi_gen_prime() and
|
* Add MBEDTLS_MPI_GEN_PRIME_FLAG_LOW_ERR flag to mbedtls_mpi_gen_prime() and
|
||||||
|
|
Loading…
Reference in a new issue