@@ -338,7 +338,7 @@ breaking changes, and mappings for the large list of deprecated functions.
338
338
*Matt Caswell*
339
339
340
340
* Fix a bug in the OPENSSL_LH_flush() function that breaks reuse of the memory
341
- occuppied by the removed hash table entries.
341
+ occupied by the removed hash table entries.
342
342
343
343
This function is used when decoding certificates or keys. If a long lived
344
344
process periodically decodes certificates or keys its memory usage will
@@ -535,7 +535,7 @@ breaking changes, and mappings for the large list of deprecated functions.
535
535
536
536
* The EVP_get_cipherbyname() function will return NULL for algorithms such as
537
537
"AES-128-SIV", "AES-128-CBC-CTS" and "CAMELLIA-128-CBC-CTS" which were
538
- previously only accessible via low level interfaces. Use EVP_CIPHER_fetch()
538
+ previously only accessible via low- level interfaces. Use EVP_CIPHER_fetch()
539
539
instead to retrieve these algorithms from a provider.
540
540
541
541
*Shane Lontis*
@@ -882,7 +882,7 @@ breaking changes, and mappings for the large list of deprecated functions.
882
882
883
883
*David von Oheimb*
884
884
885
- * All of the low level EC_KEY functions have been deprecated.
885
+ * All of the low- level EC_KEY functions have been deprecated.
886
886
887
887
*Shane Lontis, Paul Dale, Richard Levitte, and Tomáš Mráz*
888
888
@@ -1163,7 +1163,7 @@ breaking changes, and mappings for the large list of deprecated functions.
1163
1163
1164
1164
*David von Oheimb*
1165
1165
1166
- * All of the low level RSA functions have been deprecated.
1166
+ * All of the low- level RSA functions have been deprecated.
1167
1167
1168
1168
*Paul Dale*
1169
1169
@@ -1188,11 +1188,11 @@ breaking changes, and mappings for the large list of deprecated functions.
1188
1188
1189
1189
*Paul Dale*
1190
1190
1191
- * All of the low level DH functions have been deprecated.
1191
+ * All of the low- level DH functions have been deprecated.
1192
1192
1193
1193
*Paul Dale and Matt Caswell*
1194
1194
1195
- * All of the low level DSA functions have been deprecated.
1195
+ * All of the low- level DSA functions have been deprecated.
1196
1196
1197
1197
*Paul Dale*
1198
1198
@@ -1201,7 +1201,7 @@ breaking changes, and mappings for the large list of deprecated functions.
1201
1201
1202
1202
*Richard Levitte*
1203
1203
1204
- * Deprecated low level ECDH and ECDSA functions.
1204
+ * Deprecated low- level ECDH and ECDSA functions.
1205
1205
1206
1206
*Paul Dale*
1207
1207
@@ -1220,7 +1220,7 @@ breaking changes, and mappings for the large list of deprecated functions.
1220
1220
1221
1221
*Paul Dale*
1222
1222
1223
- * All of the low level HMAC functions have been deprecated.
1223
+ * All of the low- level HMAC functions have been deprecated.
1224
1224
1225
1225
*Paul Dale and David von Oheimb*
1226
1226
@@ -1236,7 +1236,7 @@ breaking changes, and mappings for the large list of deprecated functions.
1236
1236
1237
1237
*Rich Salz*
1238
1238
1239
- * All of the low level CMAC functions have been deprecated.
1239
+ * All of the low- level CMAC functions have been deprecated.
1240
1240
1241
1241
*Paul Dale*
1242
1242
@@ -1255,7 +1255,7 @@ breaking changes, and mappings for the large list of deprecated functions.
1255
1255
1256
1256
*Richard Levitte*
1257
1257
1258
- * All of the low level cipher functions have been deprecated.
1258
+ * All of the low- level cipher functions have been deprecated.
1259
1259
1260
1260
*Matt Caswell and Paul Dale*
1261
1261
@@ -1525,7 +1525,7 @@ breaking changes, and mappings for the large list of deprecated functions.
1525
1525
used and the recipient will not notice the attack.
1526
1526
As a work around for this potential attack the length of the decrypted
1527
1527
key must be equal to the cipher default key length, in case the
1528
- certifiate is not given and all recipientInfo are tried out.
1528
+ certificate is not given and all recipientInfo are tried out.
1529
1529
The old behaviour can be re-enabled in the CMS code by setting the
1530
1530
CMS_DEBUG_DECRYPT flag.
1531
1531
@@ -1545,7 +1545,7 @@ breaking changes, and mappings for the large list of deprecated functions.
1545
1545
when primes for RSA keys are computed.
1546
1546
Since we previously always generated primes == 2 (mod 3) for RSA keys,
1547
1547
the 2-prime and 3-prime RSA modules were easy to distinguish, since
1548
- `N = p*q = 1 (mod 3)`, but `N = p*q*r = 2 (mod 3)`. Therefore fingerprinting
1548
+ `N = p*q = 1 (mod 3)`, but `N = p*q*r = 2 (mod 3)`. Therefore, fingerprinting
1549
1549
2-prime vs. 3-prime RSA keys was possible by computing N mod 3.
1550
1550
This avoids possible fingerprinting of newly generated RSA modules.
1551
1551
@@ -1966,7 +1966,7 @@ OpenSSL 1.1.1
1966
1966
ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING
1967
1967
structure which contains a buffer holding the string data and a field
1968
1968
holding the buffer length. This contrasts with normal C strings which
1969
- are repesented as a buffer for the string data which is terminated
1969
+ are represented as a buffer for the string data which is terminated
1970
1970
with a NUL (0) byte.
1971
1971
1972
1972
Although not a strict requirement, ASN.1 strings that are parsed using
@@ -2054,7 +2054,7 @@ OpenSSL 1.1.1
2054
2054
2055
2055
* Fixed the X509_issuer_and_serial_hash() function. It attempts to
2056
2056
create a unique hash value based on the issuer and serial number data
2057
- contained within an X509 certificate. However it was failing to correctly
2057
+ contained within an X509 certificate. However, it was failing to correctly
2058
2058
handle any errors that may occur while parsing the issuer field (which might
2059
2059
occur if the issuer field is maliciously constructed). This may subsequently
2060
2060
result in a NULL pointer deref and a crash leading to a potential denial of
@@ -2072,7 +2072,7 @@ OpenSSL 1.1.1
2072
2072
2073
2073
Fixed the EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate
2074
2074
functions. Previously they could overflow the output length argument in some
2075
- cases where the input length is close to the maximum permissable length for
2075
+ cases where the input length is close to the maximum permissible length for
2076
2076
an integer on the platform. In such cases the return value from the function
2077
2077
call would be 1 (indicating success), but the output length value would be
2078
2078
negative. This could cause applications to behave incorrectly or crash.
@@ -2174,7 +2174,7 @@ OpenSSL 1.1.1
2174
2174
when primes for RSA keys are computed.
2175
2175
Since we previously always generated primes == 2 (mod 3) for RSA keys,
2176
2176
the 2-prime and 3-prime RSA modules were easy to distinguish, since
2177
- N = p*q = 1 (mod 3), but N = p*q*r = 2 (mod 3). Therefore fingerprinting
2177
+ N = p*q = 1 (mod 3), but N = p*q*r = 2 (mod 3). Therefore, fingerprinting
2178
2178
2-prime vs. 3-prime RSA keys was possible by computing N mod 3.
2179
2179
This avoids possible fingerprinting of newly generated RSA modules.
2180
2180
@@ -2233,7 +2233,7 @@ OpenSSL 1.1.1
2233
2233
* Fixed a fork protection issue. OpenSSL 1.1.1 introduced a rewritten random
2234
2234
number generator (RNG). This was intended to include protection in the
2235
2235
event of a fork() system call in order to ensure that the parent and child
2236
- processes did not share the same RNG state. However this protection was not
2236
+ processes did not share the same RNG state. However, this protection was not
2237
2237
being used in the default case.
2238
2238
2239
2239
A partial mitigation for this issue is that the output from a high
@@ -2275,7 +2275,7 @@ OpenSSL 1.1.1
2275
2275
used and the recipient will not notice the attack.
2276
2276
As a work around for this potential attack the length of the decrypted
2277
2277
key must be equal to the cipher default key length, in case the
2278
- certifiate is not given and all recipientInfo are tried out.
2278
+ certificate is not given and all recipientInfo are tried out.
2279
2279
The old behaviour can be re-enabled in the CMS code by setting the
2280
2280
CMS_DEBUG_DECRYPT flag.
2281
2281
([CVE-2019-1563])
@@ -3045,7 +3045,7 @@ OpenSSL 1.1.0
3045
3045
used and the recipient will not notice the attack.
3046
3046
As a work around for this potential attack the length of the decrypted
3047
3047
key must be equal to the cipher default key length, in case the
3048
- certifiate is not given and all recipientInfo are tried out.
3048
+ certificate is not given and all recipientInfo are tried out.
3049
3049
The old behaviour can be re-enabled in the CMS code by setting the
3050
3050
CMS_DEBUG_DECRYPT flag.
3051
3051
([CVE-2019-1563])
@@ -3280,7 +3280,7 @@ OpenSSL 1.1.0
3280
3280
3281
3281
OpenSSL 1.0.2 and below had the ability to disable renegotiation using the
3282
3282
(undocumented) SSL3_FLAGS_NO_RENEGOTIATE_CIPHERS flag. Due to the opacity
3283
- changes this is no longer possible in 1.1.0. Therefore the new
3283
+ changes this is no longer possible in 1.1.0. Therefore, the new
3284
3284
SSL_OP_NO_RENEGOTIATION option from 1.1.1-dev has been backported to
3285
3285
1.1.0 to provide equivalent functionality.
3286
3286
@@ -3371,7 +3371,7 @@ OpenSSL 1.1.0
3371
3371
3372
3372
During a renegotiation handshake if the Encrypt-Then-Mac extension is
3373
3373
negotiated where it was not in the original handshake (or vice-versa) then
3374
- this can cause OpenSSL to crash (dependant on ciphersuite). Both clients
3374
+ this can cause OpenSSL to crash (dependent on ciphersuite). Both clients
3375
3375
and servers are affected.
3376
3376
3377
3377
This issue was reported to OpenSSL by Joe Orton (Red Hat).
@@ -3543,7 +3543,7 @@ OpenSSL 1.1.0
3543
3543
place, and this would cause the connection to immediately fail. Assuming
3544
3544
that the application calls SSL_free() on the failed connection in a timely
3545
3545
manner then the 21Mb of allocated memory will then be immediately freed
3546
- again. Therefore the excessive memory allocation will be transitory in
3546
+ again. Therefore, the excessive memory allocation will be transitory in
3547
3547
nature. This then means that there is only a security impact if:
3548
3548
3549
3549
1) The application does not call SSL_free() in a timely manner in the event
@@ -4310,7 +4310,7 @@ OpenSSL 1.1.0
4310
4310
* Given the pervasive nature of TLS extensions it is inadvisable to run
4311
4311
OpenSSL without support for them. It also means that maintaining
4312
4312
the OPENSSL_NO_TLSEXT option within the code is very invasive (and probably
4313
- not well tested). Therefore the OPENSSL_NO_TLSEXT option has been removed.
4313
+ not well tested). Therefore, the OPENSSL_NO_TLSEXT option has been removed.
4314
4314
4315
4315
*Matt Caswell*
4316
4316
@@ -4388,7 +4388,7 @@ OpenSSL 1.1.0
4388
4388
4389
4389
*Matt Caswell*
4390
4390
4391
- * SSLv2 support has been removed. It still supports receiving a SSLv2
4391
+ * SSLv2 support has been removed. It still supports receiving an SSLv2
4392
4392
compatible client hello.
4393
4393
4394
4394
*Kurt Roeckx*
@@ -4842,7 +4842,7 @@ OpenSSL 1.0.2
4842
4842
used and the recipient will not notice the attack.
4843
4843
As a work around for this potential attack the length of the decrypted
4844
4844
key must be equal to the cipher default key length, in case the
4845
- certifiate is not given and all recipientInfo are tried out.
4845
+ certificate is not given and all recipientInfo are tried out.
4846
4846
The old behaviour can be re-enabled in the CMS code by setting the
4847
4847
CMS_DEBUG_DECRYPT flag.
4848
4848
([CVE-2019-1563])
@@ -5318,8 +5318,8 @@ OpenSSL 1.0.2
5318
5318
has been completed. An attacker could force up to approx. 15 messages to
5319
5319
remain in the buffer when they are no longer required. These messages will
5320
5320
be cleared when the DTLS connection is closed. The default maximum size for
5321
- a message is 100k. Therefore the attacker could force an additional 1500k
5322
- to be consumed per connection. By opening many simulataneous connections an
5321
+ a message is 100k. Therefore, the attacker could force an additional 1500k
5322
+ to be consumed per connection. By opening many simultaneous connections an
5323
5323
attacker could cause a DoS attack through memory exhaustion.
5324
5324
5325
5325
This issue was reported to OpenSSL by Quan Luo.
@@ -6483,7 +6483,7 @@ OpenSSL 1.0.1
6483
6483
message).
6484
6484
6485
6485
The rules of C pointer arithmetic are such that "p + len" is only well
6486
- defined where len <= SIZE. Therefore the above idiom is actually
6486
+ defined where len <= SIZE. Therefore, the above idiom is actually
6487
6487
undefined behaviour.
6488
6488
6489
6489
For example this could cause problems if some malloc implementation
@@ -6519,8 +6519,8 @@ OpenSSL 1.0.1
6519
6519
has been completed. An attacker could force up to approx. 15 messages to
6520
6520
remain in the buffer when they are no longer required. These messages will
6521
6521
be cleared when the DTLS connection is closed. The default maximum size for
6522
- a message is 100k. Therefore the attacker could force an additional 1500k
6523
- to be consumed per connection. By opening many simulataneous connections an
6522
+ a message is 100k. Therefore, the attacker could force an additional 1500k
6523
+ to be consumed per connection. By opening many simultaneous connections an
6524
6524
attacker could cause a DoS attack through memory exhaustion.
6525
6525
6526
6526
This issue was reported to OpenSSL by Quan Luo.
@@ -6586,7 +6586,7 @@ OpenSSL 1.0.1
6586
6586
amounts of input data then a length check can overflow resulting in a heap
6587
6587
corruption.
6588
6588
6589
- Internally to OpenSSL the EVP_EncodeUpdate() function is primarly used by
6589
+ Internally to OpenSSL the EVP_EncodeUpdate() function is primarily used by
6590
6590
the `PEM_write_bio*` family of functions. These are mainly used within the
6591
6591
OpenSSL command line applications, so any application which processes data
6592
6592
from an untrusted source and outputs it as a PEM file should be considered
@@ -7252,7 +7252,7 @@ OpenSSL 1.0.1
7252
7252
* Build option no-ssl3 is incomplete.
7253
7253
7254
7254
When OpenSSL is configured with "no-ssl3" as a build option, servers
7255
- could accept and complete a SSL 3.0 handshake, and clients could be
7255
+ could accept and complete an SSL 3.0 handshake, and clients could be
7256
7256
configured to send them.
7257
7257
([CVE-2014-3568])
7258
7258
@@ -8269,7 +8269,7 @@ OpenSSL 1.0.0
8269
8269
* Build option no-ssl3 is incomplete.
8270
8270
8271
8271
When OpenSSL is configured with "no-ssl3" as a build option, servers
8272
- could accept and complete a SSL 3.0 handshake, and clients could be
8272
+ could accept and complete an SSL 3.0 handshake, and clients could be
8273
8273
configured to send them.
8274
8274
([CVE-2014-3568])
8275
8275
@@ -9518,7 +9518,7 @@ OpenSSL 1.0.1.]
9518
9518
9519
9519
* Add initial support for TLS extensions, specifically for the server_name
9520
9520
extension so far. The SSL_SESSION, SSL_CTX, and SSL data structures now
9521
- have new members for a host name . The SSL data structure has an
9521
+ have new members for a hostname . The SSL data structure has an
9522
9522
additional member `SSL_CTX *initial_ctx` so that new sessions can be
9523
9523
stored in that context to allow for session resumption, even after the
9524
9524
SSL has been switched to a new SSL_CTX in reaction to a client's
@@ -9542,7 +9542,7 @@ OpenSSL 1.0.1.]
9542
9542
9543
9543
openssl s_server has new options '-servername_host ...', '-cert2 ...',
9544
9544
'-key2 ...', '-servername_fatal' (subject to change). This allows
9545
- testing the HostName extension for a specific single host name ('-cert'
9545
+ testing the HostName extension for a specific single hostname ('-cert'
9546
9546
and '-key' remain fallbacks for handshakes without HostName
9547
9547
negotiation). If the unrecognized_name alert has to be sent, this by
9548
9548
default is a warning; it becomes fatal with the '-servername_fatal'
@@ -10045,7 +10045,7 @@ OpenSSL 0.9.x
10045
10045
10046
10046
The OpenSSL project does not recommend any specific CA and does not
10047
10047
have any policy with respect to including or excluding any CA.
10048
- Therefore it does not make any sense to ship an arbitrary selection
10048
+ Therefore, it does not make any sense to ship an arbitrary selection
10049
10049
of root CA certificates with the OpenSSL software.
10050
10050
10051
10051
*Lutz Jaenicke*
@@ -10225,7 +10225,7 @@ OpenSSL 0.9.x
10225
10225
10226
10226
* Add initial support for TLS extensions, specifically for the server_name
10227
10227
extension so far. The SSL_SESSION, SSL_CTX, and SSL data structures now
10228
- have new members for a host name . The SSL data structure has an
10228
+ have new members for a hostname . The SSL data structure has an
10229
10229
additional member `SSL_CTX *initial_ctx` so that new sessions can be
10230
10230
stored in that context to allow for session resumption, even after the
10231
10231
SSL has been switched to a new SSL_CTX in reaction to a client's
@@ -10249,7 +10249,7 @@ OpenSSL 0.9.x
10249
10249
10250
10250
openssl s_server has new options '-servername_host ...', '-cert2 ...',
10251
10251
'-key2 ...', '-servername_fatal' (subject to change). This allows
10252
- testing the HostName extension for a specific single host name ('-cert'
10252
+ testing the HostName extension for a specific single hostname ('-cert'
10253
10253
and '-key' remain fallbacks for handshakes without HostName
10254
10254
negotiation). If the unrecognized_name alert has to be sent, this by
10255
10255
default is a warning; it becomes fatal with the '-servername_fatal'
0 commit comments