aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorkinichiro <kinichiro.inoguchi@gmail.com>2020-10-05 01:15:25 +0900
committerkinichiro <kinichiro.inoguchi@gmail.com>2020-10-05 01:15:25 +0900
commit1f6d4197837bc4c2977e0812a00efac0cdab40fc (patch)
treeff8bd7141b7698c9c7e05471a7b30defe7870b80
parent2dc9f8e3733edf19f2826a9aa34f9645f79aec82 (diff)
downloadportable-1f6d4197837bc4c2977e0812a00efac0cdab40fc.tar.gz
portable-1f6d4197837bc4c2977e0812a00efac0cdab40fc.tar.bz2
portable-1f6d4197837bc4c2977e0812a00efac0cdab40fc.zip
Update ChangeLog
Diffstat (limited to '')
-rw-r--r--ChangeLog16
1 files changed, 8 insertions, 8 deletions
diff --git a/ChangeLog b/ChangeLog
index 76dadd3..ba3305d 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -51,7 +51,7 @@ LibreSSL Portable Release Notes:
51 51
52 * Simplify tls_decrypt_ticket() exit path. 52 * Simplify tls_decrypt_ticket() exit path.
53 53
54 * Copy the session ide directly in ssl_get_prev_session() instead of 54 * Copy the session id directly in ssl_get_prev_session() instead of
55 handing it through several functions for copying. 55 handing it through several functions for copying.
56 56
57 * Split session retrieval out of ssl_get_prev_session(). 57 * Split session retrieval out of ssl_get_prev_session().
@@ -91,7 +91,7 @@ LibreSSL Portable Release Notes:
91 91
92 * Remove cipher_list_by_id. 92 * Remove cipher_list_by_id.
93 93
94 * Add a new implementation of X509 name constraints with regrssion 94 * Add a new implementation of X509 name constraints with regression
95 tests. 95 tests.
96 96
97 * Fix and re-enable cert and cipher interop tests. 97 * Fix and re-enable cert and cipher interop tests.
@@ -115,7 +115,7 @@ LibreSSL Portable Release Notes:
115 The new validator finds multiple validated chains to handle the 115 The new validator finds multiple validated chains to handle the
116 modern PKI cases which may frequently have multiple paths via 116 modern PKI cases which may frequently have multiple paths via
117 different intermediates to different roots. It is loosely based on 117 different intermediates to different roots. It is loosely based on
118 golang's x509 validator. 118 golang's X509 validator.
119 119
120 This includes integration so that the new validator can be used via 120 This includes integration so that the new validator can be used via
121 X509_verify_cert() as well as a new API x509_verify() which will 121 X509_verify_cert() as well as a new API x509_verify() which will
@@ -145,10 +145,10 @@ LibreSSL Portable Release Notes:
145 * Clean up and simplify SSL_set_session(). 145 * Clean up and simplify SSL_set_session().
146 146
147 * Move state initialization from SSL_clear() to ssl3_clear() to ensure 147 * Move state initialization from SSL_clear() to ssl3_clear() to ensure
148 that it gets correctly reinitialized accross a SSL_set_ssl_method() 148 that it gets correctly reinitialized across a SSL_set_ssl_method()
149 call. 149 call.
150 150
151 * Test the botan TLS client with LibreSSL, OpenSSL 1.0.2 and 1.1.1 151 * Test the Botan TLS client with LibreSSL, OpenSSL 1.0.2 and 1.1.1
152 servers. 152 servers.
153 153
154 * Mop up the get_ssl_method function pointer. 154 * Mop up the get_ssl_method function pointer.
@@ -156,12 +156,12 @@ LibreSSL Portable Release Notes:
156 * Clean up and simplify SSL_set_ssl_method(). 156 * Clean up and simplify SSL_set_ssl_method().
157 157
158 * Deduplicate the time validation code between the legacy and the new 158 * Deduplicate the time validation code between the legacy and the new
159 verifcation code. 159 verification code.
160 160
161 * Set error_depth and current_cert to avoid problems in legacy 161 * Set error_depth and current_cert to avoid problems in legacy
162 callbacks that don't do proper error checking. 162 callbacks that don't do proper error checking.
163 163
164 * Correct a failure case in tls12_record_layer_esal_record_protected(). 164 * Correct a failure case in tls12_record_layer_seal_record_protected().
165 165
166 * Do not destroy an existing cipher list when ssl_parse_ciphersuites() 166 * Do not destroy an existing cipher list when ssl_parse_ciphersuites()
167 fails to match the behavior of ssl_create_cipher_list() and 167 fails to match the behavior of ssl_create_cipher_list() and
@@ -170,7 +170,7 @@ LibreSSL Portable Release Notes:
170 * Split the tls12_record_layer_write_mac() for future reuse on the 170 * Split the tls12_record_layer_write_mac() for future reuse on the
171 read side. 171 read side.
172 172
173 * Dedup code in X509_verify_ctx_new_from_xsc(). 173 * Dedup code in x509_verify_ctx_new_from_xsc().
174 174
175 * Make check in x509_verify_ctx_set_max_signatures() consistent with 175 * Make check in x509_verify_ctx_set_max_signatures() consistent with
176 others. 176 others.