]> git.ipfire.org Git - thirdparty/openssl.git/blame - CHANGES
Stop compiler warnings.
[thirdparty/openssl.git] / CHANGES
CommitLineData
81a6c781 1
f1c236f8 2 OpenSSL CHANGES
651d0aff
RE
3 _______________
4
d5f686d8 5 Changes between 0.9.7e and 0.9.8 [xx XXX xxxx]
4d94ae00 6
30fe028f
GT
7 *) Add a new engine to support VIA PadLock ACE extensions in the VIA C3
8 Nehemiah processors. These extensions support AES encryption in hardware
9 as well as RNG (though RNG support is currently disabled).
10 [Michal Ludvig <michal@logix.cz>, with help from Andy Polyakov]
11
df11e1e9
GT
12 *) Deprecate BN_[get|set]_params() functions (they were ignored internally).
13 [Geoff Thorpe]
14
ad500340
AP
15 *) New FIPS 180-2 algorithms, SHA-224/-256/-384/-512 are implemented.
16 [Andy Polyakov and a number of other people]
17
e14f4aab
AP
18 *) Improved PowerPC platform support. Most notably BIGNUM assembler
19 implementation contributed by IBM.
20 [Suresh Chari, Peter Waltenberg, Andy Polyakov]
21
bcfea9fb
GT
22 *) The new 'RSA_generate_key_ex' function now takes a BIGNUM for the public
23 exponent rather than 'unsigned long'. There is a corresponding change to
24 the new 'rsa_keygen' element of the RSA_METHOD structure.
25 [Jelte Jansen, Geoff Thorpe]
26
d5f686d8
BM
27 *) Functionality for creating the initial serial number file is now
28 moved from CA.pl to the 'ca' utility with a new option -create_serial.
29
30 (Before OpenSSL 0.9.7e, CA.pl used to initialize the serial
31 number file to 1, which is bound to cause problems. To avoid
32 the problems while respecting compatibility between different 0.9.7
33 patchlevels, 0.9.7e employed 'openssl x509 -next_serial' in
34 CA.pl for serial number initialization. With the new release 0.9.8,
35 we can fix the problem directly in the 'ca' utility.)
64674bcc
DSH
36 [Steve Henson]
37
3a87a9b9
GT
38 *) Reduced header interdepencies by declaring more opaque objects in
39 ossl_typ.h. As a consequence, including some headers (eg. engine.h) will
40 give fewer recursive includes, which could break lazy source code - so
41 this change is covered by the OPENSSL_NO_DEPRECATED symbol. As always,
42 developers should define this symbol when building and using openssl to
43 ensure they track the recommended behaviour, interfaces, [etc], but
44 backwards-compatible behaviour prevails when this isn't defined.
45 [Geoff Thorpe]
46
bf5773fa
DSH
47 *) New function X509_POLICY_NODE_print() which prints out policy nodes.
48 [Steve Henson]
49
216659eb
DSH
50 *) Add new EVP function EVP_CIPHER_CTX_rand_key and associated functionality.
51 This will generate a random key of the appropriate length based on the
52 cipher context. The EVP_CIPHER can provide its own random key generation
53 routine to support keys of a specific form. This is used in the des and
54 3des routines to generate a key of the correct parity. Update S/MIME
55 code to use new functions and hence generate correct parity DES keys.
56 Add EVP_CHECK_DES_KEY #define to return an error if the key is not
57 valid (weak or incorrect parity).
58 [Steve Henson]
59
e1a27eb3
DSH
60 *) Add a local set of CRLs that can be used by X509_verify_cert() as well
61 as looking them up. This is useful when the verified structure may contain
62 CRLs, for example PKCS#7 signedData. Modify PKCS7_verify() to use any CRLs
63 present unless the new PKCS7_NO_CRL flag is asserted.
64 [Steve Henson]
65
6446e0c3
DSH
66 *) Extend ASN1 oid configuration module. It now additionally accepts the
67 syntax:
68
69 shortName = some long name, 1.2.3.4
70 [Steve Henson]
71
5c98b2ca
GT
72 *) Reimplemented the BN_CTX implementation. There is now no more static
73 limitation on the number of variables it can handle nor the depth of the
74 "stack" handling for BN_CTX_start()/BN_CTX_end() pairs. The stack
75 information can now expand as required, and rather than having a single
76 static array of bignums, BN_CTX now uses a linked-list of such arrays
77 allowing it to expand on demand whilst maintaining the usefulness of
78 BN_CTX's "bundling".
79 [Geoff Thorpe]
80
46ef873f
GT
81 *) Add a missing BN_CTX parameter to the 'rsa_mod_exp' callback in RSA_METHOD
82 to allow all RSA operations to function using a single BN_CTX.
83 [Geoff Thorpe]
84
4acc3e90
DSH
85 *) Preliminary support for certificate policy evaluation and checking. This
86 is initially intended to pass the tests outlined in "Conformance Testing
87 of Relying Party Client Certificate Path Processing Logic" v1.07.
88 [Steve Henson]
89
7f663ce4
GT
90 *) bn_dup_expand() has been deprecated, it was introduced in 0.9.7 and
91 remained unused and not that useful. A variety of other little bignum
92 tweaks and fixes have also been made continuing on from the audit (see
93 below).
94 [Geoff Thorpe]
95
875a644a
RL
96 *) Constify all or almost all d2i, c2i, s2i and r2i functions, along with
97 associated ASN1, EVP and SSL functions and old ASN1 macros.
7f663ce4 98 [Richard Levitte]
875a644a 99
b6358c89
GT
100 *) BN_zero() only needs to set 'top' and 'neg' to zero for correct results,
101 and this should never fail. So the return value from the use of
102 BN_set_word() (which can fail due to needless expansion) is now deprecated;
103 if OPENSSL_NO_DEPRECATED is defined, BN_zero() is a void macro.
104 [Geoff Thorpe]
105
9e051bac
GT
106 *) BN_CTX_get() should return zero-valued bignums, providing the same
107 initialised value as BN_new().
108