diff options
| author | Brent Cook <busterb@gmail.com> | 2019-09-30 04:10:08 -0500 |
|---|---|---|
| committer | Brent Cook <busterb@gmail.com> | 2019-09-30 04:10:08 -0500 |
| commit | bc038c7ebf45d5115e4690deeacf9b48a3e8e871 (patch) | |
| tree | 5fd87e22b718615f48f6c7e28952aa60c6ccbc08 | |
| parent | a4338ca124a8ed3979bae6cc14ee47e79468c7d7 (diff) | |
| download | portable-bc038c7ebf45d5115e4690deeacf9b48a3e8e871.tar.gz portable-bc038c7ebf45d5115e4690deeacf9b48a3e8e871.tar.bz2 portable-bc038c7ebf45d5115e4690deeacf9b48a3e8e871.zip | |
3.0.1 changelog
| -rw-r--r-- | ChangeLog | 17 |
1 files changed, 17 insertions, 0 deletions
| @@ -28,6 +28,23 @@ history is also available from Git. | |||
| 28 | 28 | ||
| 29 | LibreSSL Portable Release Notes: | 29 | LibreSSL Portable Release Notes: |
| 30 | 30 | ||
| 31 | 3.0.1 - Development release | ||
| 32 | |||
| 33 | * Ported Billy Brumley's fix for CVE-2019-1547 in OpenSSL 1.1.1. If a NULL | ||
| 34 | or zero cofactor is passed to EC_GROUP_set_generator(), try to compute | ||
| 35 | it using Hasse's bound. This works as long as the cofactor is small | ||
| 36 | enough. | ||
| 37 | |||
| 38 | * Fixed a memory leak in error paths for eckey_type2param(). | ||
| 39 | |||
| 40 | * Initial work on supporting Cryptographic Message Syntax (CMS) in | ||
| 41 | libcrypto (not enabled). | ||
| 42 | |||
| 43 | * Various manual page improvements and additions. | ||
| 44 | |||
| 45 | * Added a CMake check for an existing uninstall target, facilitating | ||
| 46 | embedding LibreSSL in larger CMake projects, from Matthew Albrecht. | ||
| 47 | |||
| 31 | 3.0.0 - Development release | 48 | 3.0.0 - Development release |
| 32 | 49 | ||
| 33 | * Completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API. | 50 | * Completed the port of RSA_METHOD accessors from the OpenSSL 1.1 API. |
