Skip to content

Commit 8d94aec

Browse files
Fix some Changelog typos
Signed-off-by: Minos Galanakis <[email protected]>
1 parent 4492dbd commit 8d94aec

File tree

1 file changed

+26
-26
lines changed

1 file changed

+26
-26
lines changed

ChangeLog

Lines changed: 26 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -18,9 +18,9 @@ Requirement changes
1818
* Drop support for Visual Studio 2013 and 2015, and Arm Compiler 5.
1919

2020
New deprecations
21-
* Rename the MBEDTLS_SHA256_USE_A64_CRYPTO_xxx config options to
22-
MBEDTLS_SHA256_USE_ARMV8_A_CRYPTO_xxx. The old names may still
23-
be used, but are deprecated.
21+
* Rename the MBEDTLS_SHA256_USE_A64_CRYPTO_xxx config options to
22+
MBEDTLS_SHA256_USE_ARMV8_A_CRYPTO_xxx. The old names may still
23+
be used, but are deprecated.
2424
* In the PSA API, domain parameters are no longer used for anything.
2525
They are deprecated and will be removed in a future version of the
2626
library.
@@ -39,10 +39,10 @@ Removals
3939

4040
Features
4141
* Added an example program showing how to hash with the PSA API.
42-
* Support Armv8-A Crypto Extension acceleration for SHA-256
43-
when compiling for Thumb (T32) or 32-bit Arm (A32).
44-
* AES-NI is now supported in Windows builds with clang and clang-cl.
45-
Resolves #8372.
42+
* Support Armv8-A Crypto Extension acceleration for SHA-256
43+
when compiling for Thumb (T32) or 32-bit Arm (A32).
44+
* AES-NI is now supported in Windows builds with clang and clang-cl.
45+
Resolves #8372.
4646
* Add new mbedtls_x509_csr_parse_der_with_ext_cb() routine which allows
4747
parsing unsupported certificate extensions via user provided callback.
4848
* Enable the new option MBEDTLS_BLOCK_CIPHER_NO_DECRYPT to omit
@@ -102,9 +102,9 @@ Features
102102
key from a PK key.
103103
* The benchmark program now reports times for both ephemeral and static
104104
ECDH in all ECDH configurations.
105-
* Add support for 8-bit GCM tables for Shoup's algorithm to speedup GCM
106-
operations when hardware accelerated AES is not present. Improves
107-
performance by around 30% on 64-bit Intel; 125% on Armv7-M.
105+
* Add support for 8-bit GCM tables for Shoup's algorithm to speedup GCM
106+
operations when hardware accelerated AES is not present. Improves
107+
performance by around 30% on 64-bit Intel; 125% on Armv7-M.
108108
* The new function psa_generate_key_ext() allows generating an RSA
109109
key pair with a custom public exponent.
110110
* The new function mbedtls_ecp_write_key_ext() is similar to
@@ -155,7 +155,7 @@ Security
155155
copying may be disabled by setting MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS.
156156
Note that setting this option will cause input-output buffer overlap to
157157
be only partially supported (#3266).
158-
Fixes CVE-2024-28960
158+
Fixes CVE-2024-28960.
159159
* Restore the maximum TLS version to be negotiated to the configured one
160160
when an SSL context is reset with the mbedtls_ssl_session_reset() API.
161161
An attacker was able to prevent an Mbed TLS server from establishing any
@@ -182,15 +182,15 @@ Bugfix
182182
in the san parameter is not separated by a colon.
183183
* Fix possible NULL dereference issue in X509 cert_write program if an entry
184184
in the san parameter is not separated by a colon.
185-
* Fix an inconsistency between implementations and usages of `__cpuid`,
186-
which mainly causes failures when building Windows target using
187-
mingw or clang. Fixes #8334 & #8332.
185+
* Fix an inconsistency between implementations and usages of `__cpuid`,
186+
which mainly causes failures when building Windows target using
187+
mingw or clang. Fixes #8334 & #8332.
188188
* Fix build failure in conda-forge. Fixes #8422.
189189
* Fix parsing of CSRs with critical extensions.
190-
* Switch to milliseconds as the unit for ticket creation and reception time
191-
instead of seconds. That avoids rounding errors when computing the age of
192-
tickets compared to peer using a millisecond clock (observed with GnuTLS).
193-
Fixes #6623.
190+
* Switch to milliseconds as the unit for ticket creation and reception time
191+
instead of seconds. That avoids rounding errors when computing the age of
192+
tickets compared to peer using a millisecond clock (observed with GnuTLS).
193+
Fixes #6623.
194194
* Fix TLS server accepting TLS 1.2 handshake while TLS 1.2
195195
is disabled at runtime. Fixes #8593.
196196
* Remove accidental introduction of RSA signature algorithms
@@ -221,7 +221,7 @@ Bugfix
221221
* In TLS 1.3 clients, fix an interoperability problem due to the client
222222
generating a new random after a HelloRetryRequest. Fixes #8669.
223223
* Fix the restoration of the ALPN when loading serialized connection with
224-
* the mbedtls_ssl_context_load() API.
224+
the mbedtls_ssl_context_load() API.
225225
* Fix NULL pointer dereference in mbedtls_pk_verify_ext() when called using
226226
an opaque RSA context and specifying MBEDTLS_PK_RSASSA_PSS as key type.
227227
* Fix RSA opaque keys always using PKCS1 v1.5 algorithms instead of the
@@ -234,13 +234,13 @@ Changes
234234
* Use heap memory to allocate DER encoded public/private key.
235235
This reduces stack usage significantly for writing a public/private
236236
key to a PEM string.
237-
* PSA_WANT_ALG_CCM and PSA_WANT_ALG_CCM_STAR_NO_TAG are no more synonyms and
238-
they are now treated separately. This means that they should be
239-
individually enabled in order to enable respective support; also the
240-
corresponding MBEDTLS_PSA_ACCEL symbol should be defined in case
241-
acceleration is required.
242-
* Moved declaration of functions mbedtls_ecc_group_to_psa and
243-
mbedtls_ecc_group_of_psa from psa/crypto_extra.h to mbedtls/psa_util.h
237+
* PSA_WANT_ALG_CCM and PSA_WANT_ALG_CCM_STAR_NO_TAG are no more synonyms and
238+
they are now treated separately. This means that they should be
239+
individually enabled in order to enable respective support; also the
240+
corresponding MBEDTLS_PSA_ACCEL symbol should be defined in case
241+
acceleration is required.
242+
* Moved declaration of functions mbedtls_ecc_group_to_psa and
243+
mbedtls_ecc_group_of_psa from psa/crypto_extra.h to mbedtls/psa_util.h
244244
* mbedtls_pk_sign_ext() is now always available, not just when
245245
PSA (MBEDTLS_PSA_CRYPTO_C) is enabled.
246246
* Extended PSA Crypto configurations options for FFDH by making it possible

0 commit comments

Comments
 (0)