diff options
| author | kinichiro <kinichiro.inoguchi@gmail.com> | 2020-10-05 01:15:25 +0900 |
|---|---|---|
| committer | kinichiro <kinichiro.inoguchi@gmail.com> | 2020-10-05 01:15:25 +0900 |
| commit | 1f6d4197837bc4c2977e0812a00efac0cdab40fc (patch) | |
| tree | ff8bd7141b7698c9c7e05471a7b30defe7870b80 /ChangeLog | |
| parent | 2dc9f8e3733edf19f2826a9aa34f9645f79aec82 (diff) | |
| download | portable-1f6d4197837bc4c2977e0812a00efac0cdab40fc.tar.gz portable-1f6d4197837bc4c2977e0812a00efac0cdab40fc.tar.bz2 portable-1f6d4197837bc4c2977e0812a00efac0cdab40fc.zip | |
Update ChangeLog
Diffstat (limited to 'ChangeLog')
| -rw-r--r-- | ChangeLog | 16 |
1 files changed, 8 insertions, 8 deletions
| @@ -51,7 +51,7 @@ LibreSSL Portable Release Notes: | |||
| 51 | 51 | ||
| 52 | * Simplify tls_decrypt_ticket() exit path. | 52 | * Simplify tls_decrypt_ticket() exit path. |
| 53 | 53 | ||
| 54 | * Copy the session ide directly in ssl_get_prev_session() instead of | 54 | * Copy the session id directly in ssl_get_prev_session() instead of |
| 55 | handing it through several functions for copying. | 55 | handing it through several functions for copying. |
| 56 | 56 | ||
| 57 | * Split session retrieval out of ssl_get_prev_session(). | 57 | * Split session retrieval out of ssl_get_prev_session(). |
| @@ -91,7 +91,7 @@ LibreSSL Portable Release Notes: | |||
| 91 | 91 | ||
| 92 | * Remove cipher_list_by_id. | 92 | * Remove cipher_list_by_id. |
| 93 | 93 | ||
| 94 | * Add a new implementation of X509 name constraints with regrssion | 94 | * Add a new implementation of X509 name constraints with regression |
| 95 | tests. | 95 | tests. |
| 96 | 96 | ||
| 97 | * Fix and re-enable cert and cipher interop tests. | 97 | * Fix and re-enable cert and cipher interop tests. |
| @@ -115,7 +115,7 @@ LibreSSL Portable Release Notes: | |||
| 115 | The new validator finds multiple validated chains to handle the | 115 | The new validator finds multiple validated chains to handle the |
| 116 | modern PKI cases which may frequently have multiple paths via | 116 | modern PKI cases which may frequently have multiple paths via |
| 117 | different intermediates to different roots. It is loosely based on | 117 | different intermediates to different roots. It is loosely based on |
| 118 | golang's x509 validator. | 118 | golang's X509 validator. |
| 119 | 119 | ||
| 120 | This includes integration so that the new validator can be used via | 120 | This includes integration so that the new validator can be used via |
| 121 | X509_verify_cert() as well as a new API x509_verify() which will | 121 | X509_verify_cert() as well as a new API x509_verify() which will |
| @@ -145,10 +145,10 @@ LibreSSL Portable Release Notes: | |||
| 145 | * Clean up and simplify SSL_set_session(). | 145 | * Clean up and simplify SSL_set_session(). |
| 146 | 146 | ||
| 147 | * Move state initialization from SSL_clear() to ssl3_clear() to ensure | 147 | * Move state initialization from SSL_clear() to ssl3_clear() to ensure |
| 148 | that it gets correctly reinitialized accross a SSL_set_ssl_method() | 148 | that it gets correctly reinitialized across a SSL_set_ssl_method() |
| 149 | call. | 149 | call. |
| 150 | 150 | ||
| 151 | * Test the botan TLS client with LibreSSL, OpenSSL 1.0.2 and 1.1.1 | 151 | * Test the Botan TLS client with LibreSSL, OpenSSL 1.0.2 and 1.1.1 |
| 152 | servers. | 152 | servers. |
| 153 | 153 | ||
| 154 | * Mop up the get_ssl_method function pointer. | 154 | * Mop up the get_ssl_method function pointer. |
| @@ -156,12 +156,12 @@ LibreSSL Portable Release Notes: | |||
| 156 | * Clean up and simplify SSL_set_ssl_method(). | 156 | * Clean up and simplify SSL_set_ssl_method(). |
| 157 | 157 | ||
| 158 | * Deduplicate the time validation code between the legacy and the new | 158 | * Deduplicate the time validation code between the legacy and the new |
| 159 | verifcation code. | 159 | verification code. |
| 160 | 160 | ||
| 161 | * Set error_depth and current_cert to avoid problems in legacy | 161 | * Set error_depth and current_cert to avoid problems in legacy |
| 162 | callbacks that don't do proper error checking. | 162 | callbacks that don't do proper error checking. |
| 163 | 163 | ||
| 164 | * Correct a failure case in tls12_record_layer_esal_record_protected(). | 164 | * Correct a failure case in tls12_record_layer_seal_record_protected(). |
| 165 | 165 | ||
| 166 | * Do not destroy an existing cipher list when ssl_parse_ciphersuites() | 166 | * Do not destroy an existing cipher list when ssl_parse_ciphersuites() |
| 167 | fails to match the behavior of ssl_create_cipher_list() and | 167 | fails to match the behavior of ssl_create_cipher_list() and |
| @@ -170,7 +170,7 @@ LibreSSL Portable Release Notes: | |||
| 170 | * Split the tls12_record_layer_write_mac() for future reuse on the | 170 | * Split the tls12_record_layer_write_mac() for future reuse on the |
| 171 | read side. | 171 | read side. |
| 172 | 172 | ||
| 173 | * Dedup code in X509_verify_ctx_new_from_xsc(). | 173 | * Dedup code in x509_verify_ctx_new_from_xsc(). |
| 174 | 174 | ||
| 175 | * Make check in x509_verify_ctx_set_max_signatures() consistent with | 175 | * Make check in x509_verify_ctx_set_max_signatures() consistent with |
| 176 | others. | 176 | others. |
