From 7dec308d1028a1fefea9ac8b89cc2932bcf47829 Mon Sep 17 00:00:00 2001 From: Tomas Mraz Date: Tue, 6 Jun 2023 11:32:15 +0200 Subject: [PATCH] Make link to RFC 1578 in CHANGES.md be a proper link Reviewed-by: Tom Cosgrove Reviewed-by: Matt Caswell (Merged from https://github.com/openssl/openssl/pull/21130) (cherry picked from commit 18f82df5b14b3fba078c6c5f0f4a0bb8eee6c954) --- CHANGES.md | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/CHANGES.md b/CHANGES.md index ced7c4b139d..2b405ede8d7 100644 --- a/CHANGES.md +++ b/CHANGES.md @@ -40,7 +40,7 @@ OpenSSL 3.1 IDENTIFIER to canonical numeric text form if the size of that OBJECT IDENTIFIER is 586 bytes or less, and fail otherwise. - The basis for this restriction is RFC 2578 (STD 58), section 3.5. OBJECT + The basis for this restriction is [RFC 2578 (STD 58), section 3.5]. OBJECT IDENTIFIER values, which stipulates that OBJECT IDENTIFIERS may have at most 128 sub-identifiers, and that the maximum value that each sub- identifier may have is 2^32-1 (4294967295 decimal). @@ -50,8 +50,6 @@ OpenSSL 3.1 these restrictions may occupy is 32 * 128 / 7, which is approximately 586 bytes. - Ref: https://datatracker.ietf.org/doc/html/rfc2578#section-3.5 - *Richard Levitte* * Multiple algorithm implementation fixes for ARM BE platforms. @@ -19773,6 +19771,7 @@ ndif +[RFC 2578 (STD 58), section 3.5]: https://datatracker.ietf.org/doc/html/rfc2578#section-3.5 [CVE-2023-2650]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-2650 [CVE-2023-1255]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-1255 [CVE-2023-0466]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0466 -- 2.47.2