diff options
-rw-r--r-- | ChangeLog | 51 |
1 files changed, 50 insertions, 1 deletions
@@ -28,7 +28,56 @@ history is also available from Git. | |||
28 | 28 | ||
29 | LibreSSL Portable Release Notes: | 29 | LibreSSL Portable Release Notes: |
30 | 30 | ||
31 | 2.4.3 - Bug fixes and reliability improvements | 31 | 2.5.0 - New APIs, bug fixes and improvements |
32 | |||
33 | * libtls now supports ALPN and SNI | ||
34 | |||
35 | * libtls adds a new callback interface for integrating custom IO | ||
36 | functions. Thanks to Tobias Pape. | ||
37 | |||
38 | * libtls now handles 4 cipher suite groups: | ||
39 | "secure" (TLSv1.2+AEAD+PFS) | ||
40 | "compat" (HIGH:!aNULL) | ||
41 | "legacy" (HIGH:MEDIUM:!aNULL) | ||
42 | "insecure" (ALL:!aNULL:!eNULL) | ||
43 | |||
44 | This allows for flexibility and finer grained control, rather than | ||
45 | having two extremes (an issue raised by Marko Kreen some time ago). | ||
46 | |||
47 | * Tightened error handling for tls_config_set_ciphers(). | ||
48 | |||
49 | * libtls now always loads CA, key and certificate files at the time the | ||
50 | configuration function is called. This simplifies code and results in | ||
51 | a single memory based code path being used to provide data to libssl. | ||
52 | |||
53 | * Add support for OCSP intermediate certificates. | ||
54 | |||
55 | * Improved behavior of arc4random on Windows when using memory leak | ||
56 | analysis software. | ||
57 | |||
58 | * Added initial support for iOS, thanks to Jacob Berkman. | ||
59 | |||
60 | * Correctly handle an EOF that occurs prior to the TLS handshake | ||
61 | completing. Reported by Vasily Kolobkov, based on a diff from Marko | ||
62 | Kreen. | ||
63 | |||
64 | * Limit the support of the "backward compatible" ssl2 handshake to | ||
65 | only be used if TLS 1.0 is enabled. | ||
66 | |||
67 | * Fix incorrect results in certain cases on 64-bit systems when | ||
68 | BN_mod_word() can return incorrect results. BN_mod_word() now can | ||
69 | return an error condition. Thanks to Brian Smith. | ||
70 | |||
71 | * Added constant-time updates to address CVE-2016-0702 | ||
72 | |||
73 | * Fixed undefined behavior in BN_GF2m_mod_arr() | ||
74 | |||
75 | * Removed unused Cryptographic Message Support (CMS) | ||
76 | |||
77 | * More conversions of long long idioms to time_t | ||
78 | |||
79 | * Improved compatibility by avoiding printing NULL strings with | ||
80 | printf. | ||
32 | 81 | ||
33 | * Reverted change that cleans up the EVP cipher context in | 82 | * Reverted change that cleans up the EVP cipher context in |
34 | EVP_EncryptFinal() and EVP_DecryptFinal(). Some software relies on the | 83 | EVP_EncryptFinal() and EVP_DecryptFinal(). Some software relies on the |