We have released LibreSSL 2.3.2, which will be arriving in the
LibreSSL directory of your local OpenBSD mirror soon.

This release is the third snapshot based on the development OpenBSD 5.9
branch. It is slowing down as we approach the end of the release's development
cycle.  See http://www.libressl.org/releases.html for more details.

LibreSSL 2.3.2 has the following notable changes:
    * Changed format of LIBRESSL_VERSION_NUMBER to match that of
      OPENSSL_VERSION_NUMBER, see:
      https://wiki.openssl.org/index.php/Manual:OPENSSL_VERSION_NUMBER(3)

    * Added EVP_aead_chacha20_poly1305_ietf() which matches the AEAD
      construction introduced in RFC 7539, which is different than that
      already used in TLS with EVP_aead_chacha20_poly1305()

    * Avoid a potential undefined C99+ behavior due to shift overflow in
      AES_decrypt, reported by Pascal Cuoq <cuoq at trust-in-soft.com>

    * More man pages converted from pod to mdoc format

    * Added COMODO RSA Certification Authority and QuoVadis
      root certificates to cert.pem

    * Removed Remhve "C=US, O=VeriSign, Inc., OU=Class 3 Public Primary
      Certification Authority"
      (serial 3c:91:31:cb:1f:f6:d0:1b:0e:9a:b8:d0:44:bf:12:be)
      root certificate from cert.pem

    * Added support for building nc(1) on Solaris

    * Fixed GCC 5.x+ preprocessor checks, reported by Ruslan Babayev

    * Improved console handling with openssl(1) on Windows

    * Ensure the network stack is enabled on Windows when running
      tls_init()

    * Fixed incorrect TLS certificate loading by nc(1)

    * Added support for Solaris 11.3's getentropy(2) system call

    * Enabled support for using NetBSD 7.0's arc4random(3) implementation

    * Deprecated the SSL_OP_SINGLE_DH_USE flag

    * Fixes from OpenSSL 1.0.1q
     - CVE-2015-3194 - NULL pointer dereference in client side certificate
                       validation.
     - CVE-2015-3195 - Memory leak in PKCS7 - not reachable from TLS/SSL

    * The following OpenSSL CVEs did not apply to LibreSSL
     - CVE-2015-3193 - Carry propagating bug in the x86_64 Montgomery
                       squaring procedure.
     - CVE-2015-3196 - Double free race condition of the identify hint
                       data.

     See https://marc.info/?l=openbsd-announce&m=144925068504102

The LibreSSL project continues improvement of the codebase to reflect modern,
safe programming practices. We welcome feedback and improvements from the
broader community. Thanks to all of the contributors who helped make this
release possible.