From 18f82df5b14b3fba078c6c5f0f4a0bb8eee6c954 Mon Sep 17 00:00:00 2001 From: Tomas Mraz Date: Tue, 6 Jun 2023 11:32:15 +0200 Subject: [PATCH] Make link to RFC 1578 in CHANGES.md be a proper link Reviewed-by: Tom Cosgrove Reviewed-by: Matt Caswell (Merged from https://github.com/openssl/openssl/pull/21130) --- CHANGES.md | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/CHANGES.md b/CHANGES.md index 1d497e81ba..b48d7e338b 100644 --- a/CHANGES.md +++ b/CHANGES.md @@ -296,7 +296,7 @@ OpenSSL 3.1 IDENTIFIER to canonical numeric text form if the size of that OBJECT IDENTIFIER is 586 bytes or less, and fail otherwise. - The basis for this restriction is RFC 2578 (STD 58), section 3.5. OBJECT + The basis for this restriction is [RFC 2578 (STD 58), section 3.5]. OBJECT IDENTIFIER values, which stipulates that OBJECT IDENTIFIERS may have at most 128 sub-identifiers, and that the maximum value that each sub- identifier may have is 2^32-1 (4294967295 decimal). @@ -306,8 +306,6 @@ OpenSSL 3.1 these restrictions may occupy is 32 * 128 / 7, which is approximately 586 bytes. - Ref: https://datatracker.ietf.org/doc/html/rfc2578#section-3.5 - *Richard Levitte* * Multiple algorithm implementation fixes for ARM BE platforms. @@ -20002,6 +20000,7 @@ ndif +[RFC 2578 (STD 58), section 3.5]: https://datatracker.ietf.org/doc/html/rfc2578#section-3.5 [CVE-2023-2650]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-2650 [CVE-2023-1255]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-1255 [CVE-2023-0466]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0466