Refine the language in the ChangeLog

Fix the language and descriptions in the ChangeLog following review of the
Release Notes for the next release.
This commit is contained in:
Simon Butcher 2018-11-19 15:49:26 +00:00
parent 681edee803
commit b35e59d36d

View file

@ -4,16 +4,16 @@ mbed TLS ChangeLog (Sorted per branch, date)
Security Security
* Fix overly strict DN comparison when looking for CRLs belonging to a * Fix overly strict DN comparison when looking for CRLs belonging to a
particular CA. This previously lead to ignoring CRLs when the CRL's issuer particular CA. This previously led to ignoring CRLs when the CRL's issuer
name and the CA's subject name differed in their string encoding (e.g., name and the CA's subject name differed in their string encoding (e.g.,
one using PrintableString and the other UTF8String) or in the choice of one using PrintableString and the other UTF8String) or in the choice of
upper and lower case. Reported by Henrik Andersson of Bosch GmbH in issue upper and lower case. Reported by Henrik Andersson of Bosch GmbH in issue
#1784. #1784.
* Fix a flawed bounds check in server PSK hint parsing. In case the * Fix a flawed bounds check in server PSK hint parsing. In case the
incoming message buffer was placed within the first 64KB of address incoming message buffer was placed within the first 64KiB of address
space and a PSK-(EC)DHE ciphersuite was used, this allowed an attacker space and a PSK-(EC)DHE ciphersuite was used, this allowed an attacker
to trigger a memory access up to 64KB beyond the incoming message buffer, to trigger a memory access up to 64KiB beyond the incoming message buffer,
potentially leading to application crash or information disclosure. potentially leading to an application crash or information disclosure.
* Fix mbedtls_mpi_is_prime() to use more rounds of probabilistic testing. The * Fix mbedtls_mpi_is_prime() to use more rounds of probabilistic testing. The
previous settings for the number of rounds made it practical for an previous settings for the number of rounds made it practical for an
adversary to construct non-primes that would be erroneously accepted as adversary to construct non-primes that would be erroneously accepted as
@ -28,11 +28,11 @@ Security
Features Features
* Add support for temporarily suspending expensive ECC computations after * Add support for temporarily suspending expensive ECC computations after
some configurable amount of operations, to be used in single-threaded some configurable amount of operations. This is intended to be used in
constrained systems where ECC is time consuming and blocking until constrained, single-threaded systems where ECC is time consuming and can
completion cannot be tolerated. This is enabled by block other operations until they complete. This is disabled by default,
MBEDTLS_ECP_RESTARTABLE at compile time (disabled by default) and but can be enabled by MBEDTLS_ECP_RESTARTABLE at compile time and
configured by mbedtls_ecp_set_max_ops() at runtime. It applies to new configured by mbedtls_ecp_set_max_ops() at runtime. It applies to the new
xxx_restartable functions in ECP, ECDSA, PK and X.509 (CRL not supported xxx_restartable functions in ECP, ECDSA, PK and X.509 (CRL not supported
yet), and to existing functions in ECDH and SSL (currently only yet), and to existing functions in ECDH and SSL (currently only
implemented client-side, for ECDHE-ECDSA ciphersuites in TLS 1.2, implemented client-side, for ECDHE-ECDSA ciphersuites in TLS 1.2,
@ -41,12 +41,11 @@ Features
operations. On CPUs where the extensions are available, they can accelerate operations. On CPUs where the extensions are available, they can accelerate
MPI multiplications used in ECC and RSA cryptography. Contributed by MPI multiplications used in ECC and RSA cryptography. Contributed by
Aurelien Jarno. Aurelien Jarno.
* Extend RSASSA-PSS signature to allow slightly a smaller salt size. * Extend RSASSA-PSS signature to allow a smaller salt size. Previously, PSS
Previously, PSS signature always used a salt with the same length as the signature always used a salt with the same length as the hash, and returned
hash, and returned an error if this was not possible. Now the salt size an error if this was not possible. Now the salt size may be up to two bytes
may be up to two bytes shorter. This allows the library to support all shorter. This allows the library to support all hash and signature sizes
hash and signature sizes that comply with FIPS 186-4, including SHA-512 that comply with FIPS 186-4, including SHA-512 with a 1024-bit key.
with a 1024-bit key.
* Add support for 128-bit keys in CTR_DRBG. Note that using keys shorter * Add support for 128-bit keys in CTR_DRBG. Note that using keys shorter
than 256 bits limits the security of generated material to 128 bits. than 256 bits limits the security of generated material to 128 bits.