===================================================================
RCS file: /cvsrepo/anoncvs/cvs/www/65.html,v
retrieving revision 1.8
retrieving revision 1.9
diff -u -r1.8 -r1.9
--- www/65.html 2018/11/11 18:16:29 1.8
+++ www/65.html 2018/11/11 18:18:47 1.9
@@ -92,18 +92,18 @@
-
CRYPTO_LOCK is now automatically initialized, with the legacy
- callbacks stubbed for compatibility
+ callbacks stubbed for compatibility.
-
Added the SM3 hash function from the Chinese standard GB/T 32905-2016.
-
- Added more OPENSSL_NO_* macros for compatibility with OpenSSL
+ Added more OPENSSL_NO_* macros for compatibility with OpenSSL.
Testing and Proactive Security
-
Added extensive interoperability tests between LibreSSL and OpenSSL 1.0
- and 1.1
+ and 1.1.
-
Added additional wycheproof tests and related bug fixes.
@@ -112,20 +112,20 @@
-
Simplified sigalgs option processing and handshake signing algorithm
- selection
+ selection.
-
- Added the ability to use the RSA PSS algorithm for handshake signatures
+ Added the ability to use the RSA PSS algorithm for handshake signatures.
-
Added bn_rand_interval() and use it in code needing ranges of random bn
- values
+ values.
-
Added functionality to derive early, handshake, and application secrets
- as per RFC8446
+ as per RFC8446.
-
- Added handshake state machine from RFC8446
+ Added handshake state machine from RFC8446.
-
Removed some ASN.1 related code from libcrypto that had not been used
- since around 2000
+ since around 2000.
-
Unexported internal symbols and internalized more record layer structs.
@@ -134,18 +134,18 @@
- Portable Improvements
-
- Added support for assembly optimizations on 32-bit ARM ELF targets
+ Added support for assembly optimizations on 32-bit ARM ELF targets.
- Bug Fixes
-
- Fix timing vulnerability in ECDSA signature generation (CVE-2018-0735)
+ Fix timing vulnerability in ECDSA signature generation (CVE-2018-0735).
-
Fix for Portsmash vulnerability originally by Brumley, ul Hassan and
- Tuveri
+ Tuveri.
-
- Ensure transcript handshake is always freed with TLS 1.2
+ Ensure transcript handshake is always freed with TLS 1.2.