===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/65.html,v
retrieving revision 1.3
retrieving revision 1.4
diff -u -r1.3 -r1.4
--- www/65.html 2018/11/11 17:39:54 1.3
+++ www/65.html 2018/11/11 17:57:14 1.4
@@ -86,41 +86,51 @@
OpenSMTPD
-li>LibreSSL 2.9.X>
-
API and Documentation Enhancements
-
- - CRYPTO_LOCK is now automatically initialized, with the
- legacy callbacks stubbed for compatibility
-
- Added SM3 hash function support
-
- Testing and Proactive Security
-
- - Added interperability tests between LibreSSL and OpenSSL
- 1.0 and 1.1
-
+LibreSSL 2.9.X
+
+ - API and Documentation Enhancements
+
+ -
+ CRYPTO_LOCK is now automatically initialized, with the legacy
+ callbacks stubbed for compatibility
+
-
+ Added the SM3 hash function from the Chinese standard GB/T 32905-2016.
+
- - Internal Improvements
-
- - Simplified sigalgs option processing and handshake signing algorithm
- selection.
-
- Added the ability to use the RSA PSS algorithm for
- handshake signatures.
-
- Added bn_rand_interval() and use it in code needing
- ranges of random bn values
-
- Added functionaly to derive early, handshake, and
- application secrets as per RFC8446
-
- Added handshake state machine from RFC8446
-
+ - Testing and Proactive Security
+
+ -
+ Added interperability tests between LibreSSL and OpenSSL 1.0 and 1.1
+
- - Bug Fixes
-
- - Fix timing vulnerability in ECDSA signature generation
- (CVE-2018-0735)
-
- Fix for Portsmash vulnerability originally by Brumley,
- ul Hassan and Tuveri
-
-
-
-
+ Internal Improvements
+
+ -
+ Simplified sigalgs option processing and handshake signing algorithm
+ selection
+
-
+ Added the ability to use the RSA PSS algorithm for handshake signatures
+
-
+ Added bn_rand_interval() and use it in code needing ranges of random bn
+ values
+
-
+ Added functionality to derive early, handshake, and application secrets
+ as per RFC8446
+
-
+ Added handshake state machine from RFC8446, TLS 1.3
+
+
+ Bug Fixes
+
+ -
+ Fix timing vulnerability in ECDSA signature generation (CVE-2018-0735)
+
-
+ Fix for Portsmash vulnerability originally by Brumley, ul Hassan and
+ Tuveri
+
-
+ Ensure transcript handshake is always freed with TLS 1.2
+
+
Mandoc
@@ -133,7 +143,7 @@
The system includes the following major components from outside suppliers:
-
+