Update change log

This commit is contained in:
Krzysztof Stachowiak 2018-03-14 11:14:13 +01:00
parent 027f84c69f
commit 00bbf572af

View File

@ -17,6 +17,8 @@ Security
implementation allowed an offline 2^80 brute force attack on the implementation allowed an offline 2^80 brute force attack on the
HMAC key of a single, uninterrupted connection (with no HMAC key of a single, uninterrupted connection (with no
resumption of the session). resumption of the session).
* Fix a buffer overread in ssl_parse_server_key_exchange() that could cause
a crash on invalid input.
Features Features
* Extend PKCS#8 interface by introducing support for the entire SHA * Extend PKCS#8 interface by introducing support for the entire SHA
@ -44,6 +46,8 @@ Bugfix
Nick Wilson on issue #355 Nick Wilson on issue #355
* In test_suite_pk, pass valid parameters when testing for hash length * In test_suite_pk, pass valid parameters when testing for hash length
overflow. #1179 overflow. #1179
* Fix a possible arithmetic overflow in ssl_parse_server_key_exchange()
that could cause a key exchange to fail on valid data.
Changes Changes
* Fix tag lengths and value ranges in the documentation of CCM encryption. * Fix tag lengths and value ranges in the documentation of CCM encryption.