]> git.ipfire.org Git - thirdparty/openssl.git/blame - CHANGES
Don't use @syntax for extended CRLDP format.
[thirdparty/openssl.git] / CHANGES
CommitLineData
81a6c781 1
f1c236f8 2 OpenSSL CHANGES
651d0aff
RE
3 _______________
4
28e4fe34
RL
5 Changes between 0.9.8 and 0.9.9 [xx XXX xxxx]
6
9aa9d70d 7 *) Modify CRL distribution points extension code to print out previously
0745d089
DSH
8 unsupported fields. Enhance extension setting code to allow setting of
9 all fields.
9aa9d70d
DSH
10 [Steve Henson]
11
231493c9
DSH
12 *) Add print only support for Issuing Distribution Point CRL extension.
13 [Steve Henson]
28e4fe34 14
2bd2cd9b
RL
15 Changes between 0.9.8 and 0.9.8a [XX xxx XXXX]
16
17 *)
18
19 Changes between 0.9.7h and 0.9.8 [05 Jul 2005]
12bdb643 20
c8310124
RL
21 *) Add libcrypto.pc and libssl.pc for those who feel they need them.
22 [Richard Levitte]
23
24 *) Change CA.sh and CA.pl so they don't bundle the CSR and the private
25 key into the same file any more.
26 [Richard Levitte]
27
8d3509b9
AP
28 *) Add initial support for Win64, both IA64 and AMD64/x64 flavors.
29 [Andy Polyakov]
30
cbdac46d
DSH
31 *) Add -utf8 command line and config file option to 'ca'.
32 [Stefan <stf@udoma.org]
33
c8310124
RL
34 *) Removed the macro des_crypt(), as it seems to conflict with some
35 libraries. Use DES_crypt().
36 [Richard Levitte]
37
a2c32e2d
GT
38 *) Correct naming of the 'chil' and '4758cca' ENGINEs. This
39 involves renaming the source and generated shared-libs for
40 both. The engines will accept the corrected or legacy ids
41 ('ncipher' and '4758_cca' respectively) when binding. NB,
42 this only applies when building 'shared'.
43 [Corinna Vinschen <vinschen@redhat.com> and Geoff Thorpe]
44
b6995add
DSH
45 *) Add attribute functions to EVP_PKEY structure. Modify
46 PKCS12_create() to recognize a CSP name attribute and
47 use it. Make -CSP option work again in pkcs12 utility.
48 [Steve Henson]
49
800e400d
NL
50 *) Add new functionality to the bn blinding code:
51 - automatic re-creation of the BN_BLINDING parameters after
52 a fixed number of uses (currently 32)
53 - add new function for parameter creation
54 - introduce flags to control the update behaviour of the
55 BN_BLINDING parameters
56 - hide BN_BLINDING structure
57 Add a second BN_BLINDING slot to the RSA structure to improve
58 performance when a single RSA object is shared among several
59 threads.
60 [Nils Larsch]
61
36d16f8e
BL
62 *) Add support for DTLS.
63 [Nagendra Modadugu <nagendra@cs.stanford.edu> and Ben Laurie]
64
dc0ed30c
NL
65 *) Add support for DER encoded private keys (SSL_FILETYPE_ASN1)
66 to SSL_CTX_use_PrivateKey_file() and SSL_use_PrivateKey_file()
67 [Walter Goulet]
68
6049399b
NL
69 *) Remove buggy and incompletet DH cert support from
70 ssl/ssl_rsa.c and ssl/s3_both.c
71 [Nils Larsch]
72
12bdb643
NL
73 *) Use SHA-1 instead of MD5 as the default digest algorithm for
74 the apps/openssl applications.
75 [Nils Larsch]
4d94ae00 76
41a15c4f
BL
77 *) Compile clean with "-Wall -Wmissing-prototypes
78 -Wstrict-prototypes -Wmissing-declarations -Werror". Currently
79 DEBUG_SAFESTACK must also be set.
80 [Ben Laurie]
81
c9a112f5 82 *) Change ./Configure so that certain algorithms can be disabled by default.
ecc5ef87
BM
83 The new counterpiece to "no-xxx" is "enable-xxx".
84
85 The patented RC5 and MDC2 algorithms will now be disabled unless
86 "enable-rc5" and "enable-mdc2", respectively, are specified.
87
88 (IDEA remains enabled despite being patented. This is because IDEA
89 is frequently required for interoperability, and there is no license
90 fee for non-commercial use. As before, "no-idea" can be used to
91 avoid this algorithm.)
92
c9a112f5
BM
93 [Bodo Moeller]
94
6951c23a
RL
95 *) Add processing of proxy certificates (see RFC 3820). This work was
96 sponsored by KTH (The Royal Institute of Technology in Stockholm) and
97 EGEE (Enabling Grids for E-science in Europe).
98 [Richard Levitte]
99
ea681ba8
AP
100 *) RC4 performance overhaul on modern architectures/implementations, such
101 as Intel P4, IA-64 and AMD64.
102 [Andy Polyakov]
103
401ee37a
DSH
104 *) New utility extract-section.pl. This can be used specify an alternative
105 section number in a pod file instead of having to treat each file as
106 a separate case in Makefile. This can be done by adding two lines to the
107 pod file:
108
109 =for comment openssl_section:XXX
110
111 The blank line is mandatory.
112
113 [Steve Henson]
114
826a42a0
DSH
115 *) New arguments -certform, -keyform and -pass for s_client and s_server
116 to allow alternative format key and certificate files and passphrase
117 sources.
118 [Steve Henson]
119
5d7c222d
DSH
120 *) New structure X509_VERIFY_PARAM which combines current verify parameters,
121 update associated structures and add various utility functions.
122
123 Add new policy related verify parameters, include policy checking in
124 standard verify code. Enhance 'smime' application with extra parameters
125 to support policy checking and print out.
126 [Steve Henson]
127
30fe028f
GT
128 *) Add a new engine to support VIA PadLock ACE extensions in the VIA C3
129 Nehemiah processors. These extensions support AES encryption in hardware
130 as well as RNG (though RNG support is currently disabled).
131 [Michal Ludvig <michal@logix.cz>, with help from Andy Polyakov]
132
df11e1e9
GT
133 *) Deprecate BN_[get|set]_params() functions (they were ignored internally).
134 [Geoff Thorpe]
135
ad500340
AP
136 *) New FIPS 180-2 algorithms, SHA-224/-256/-384/-512 are implemented.
137 [Andy Polyakov and a number of other people]
138
e14f4aab
AP
139 *) Improved PowerPC platform support. Most notably BIGNUM assembler
140 implementation contributed by IBM.
141 [Suresh Chari, Peter Waltenberg, Andy Polyakov]
142
bcfea9fb
GT
143 *) The new 'RSA_generate_key_ex' function now takes a BIGNUM for the public
144 exponent rather than 'unsigned long'. There is a corresponding change to
145 the new 'rsa_keygen' element of the RSA_METHOD structure.
146 [Jelte Jansen, Geoff Thorpe]
147
d5f686d8
BM
148 *) Functionality for creating the initial serial number file is now
149 moved from CA.pl to the 'ca' utility with a new option -create_serial.
150
151 (Before OpenSSL 0.9.7e, CA.pl used to initialize the serial
152 number file to 1, which is bound to cause problems. To avoid
153 the problems while respecting compatibility between different 0.9.7
154 patchlevels, 0.9.7e employed 'openssl x509 -next_serial' in
155 CA.pl for serial number initialization. With the new release 0.9.8,
156 we can fix the problem directly in the 'ca' utility.)
64674bcc
DSH
157 [Steve Henson]
158
3a87a9b9
GT
159 *) Reduced header interdepencies by declaring more opaque objects in
160 ossl_typ.h. As a consequence, including some headers (eg. engine.h) will
161 give fewer recursive includes, which could break lazy source code - so
162 this change is covered by the OPENSSL_NO_DEPRECATED symbol. As always,
163 developers should define this symbol when building and using openssl to
164 ensure they track the recommended behaviour, interfaces, [etc], but
165 backwards-compatible behaviour prevails when this isn't defined.
166 [Geoff Thorpe]
167
bf5773fa
DSH
168 *) New function X509_POLICY_NODE_print() which prints out policy nodes.
169 [Steve Henson]
170
216659eb
DSH
171 *) Add new EVP function EVP_CIPHER_CTX_rand_key and associated functionality.
172 This will generate a random key of the appropriate length based on the
173 cipher context. The EVP_CIPHER can provide its own random key generation
174 routine to support keys of a specific form. This is used in the des and
175 3des routines to generate a key of the correct parity. Update S/MIME
176 code to use new functions and hence generate correct parity DES keys.
177 Add EVP_CHECK_DES_KEY #define to return an error if the key is not
178 valid (weak or incorrect parity).
179 [Steve Henson]
180
e1a27eb3
DSH
181 *) Add a local set of CRLs that can be used by X509_verify_cert() as well
182 as looking them up. This is useful when the verified structure may contain
183 CRLs, for example PKCS#7 signedData. Modify PKCS7_verify() to use any CRLs
184 present unless the new PKCS7_NO_CRL flag is asserted.
185 [Steve Henson]
186
6446e0c3
DSH
187 *) Extend ASN1 oid configuration module. It now additionally accepts the
188 syntax:
189
190 shortName = some long name, 1.2.3.4
191 [Steve Henson]
192
5c98b2ca
GT
193 *) Reimplemented the BN_CTX implementation. There is now no more static
194 limitation on the number of variables it can handle nor the depth of the
195 "stack" handling for BN_CTX_start()/BN_CTX_end() pairs. The stack
196 information can now expand as required, and rather than having a single
197 static array of bignums, BN_CTX now uses a linked-list of such arrays
198 allowing it to expand on demand whilst maintaining the usefulness of
199 BN_CTX's "bundling".
200 [Geoff Thorpe]
201
46ef873f
GT
202 *) Add a missing BN_CTX parameter to the 'rsa_mod_exp' callback in RSA_METHOD
203 to allow all RSA operations to function using a single BN_CTX.
204 [Geoff Thorpe]
205
4acc3e90
DSH
206 *) Preliminary support for certificate policy evaluation and checking. This
207 is initially intended to pass the tests outlined in "Conformance Testing
208 of Relying Party Client Certificate Path Processing Logic" v1.07.
209 [Steve Henson]
210
7f663ce4
GT
211 *) bn_dup_expand() has been deprecated, it was introduced in 0.9.7 and
212 remained unused and not that useful. A variety of other little bignum
213 tweaks and fixes have also been made continuing on from the audit (see
214 below).
215 [Geoff Thorpe]
216
875a644a
RL
217 *) Constify all or almost all d2i, c2i, s2i and r2i functions, along with
218 associated ASN1, EVP and SSL functions and old ASN1 macros.
7f663ce4 219 [Richard Levitte]
875a644a 220
b6358c89
GT
221 *) BN_zero() only needs to set 'top' and 'neg' to zero for correct results,
222 and this should never fail. So the return value from the use of
223 BN_set_word() (which can fail due to needless expansion) is now deprecated;
224 if OPENSSL_NO_DEPRECATED is defined, BN_zero() is a void macro.
225 [Geoff Thorpe]
226
9e051bac
GT
227 *) BN_CTX_get() should return zero-valued bignums, providing the same
228 initialised value as BN_new().
229