]> git.ipfire.org Git - thirdparty/openssl.git/blame - CHANGES
Add new sign and verify members to RSA_METHOD and change SSL code to use sign
[thirdparty/openssl.git] / CHANGES
CommitLineData
651d0aff 1
f1c236f8 2 OpenSSL CHANGES
651d0aff
RE
3 _______________
4
d91e201e
RE
5 Changes between 0.9.4 and 0.9.5 [xx XXX 1999]
6
1c80019a
DSH
7 *) Enhance RSA_METHOD structure. Now there are two extra methods, rsa_sign
8 and rsa_verify. When the RSA_FLAGS_SIGN_VER option is set these functions
9 will be called when RSA_sign() and RSA_verify() are used. This is useful
10 if rsa_pub_dec() and rsa_priv_enc() equivalents are not available.
11 For this to work properly RSA_public_decrypt() and RSA_private_encrypt()
12 should *not* be used: RSA_sign() and RSA_verify() must be used instead.
13 This necessitated the support of an extra signature type NID_md5_sha1
14 for SSL signatures and modifications to the SSL library to use it instead
15 of calling RSA_public_decrypt() and RSA_private_encrypt().
16 [Steve Henson]
17
090d848e
DSH
18 *) Add new -verify -CAfile and -CApath options to the crl program, these
19 will lookup a CRL issuers certificate and verify the signature in a
20 similar way to the verify program. Tidy up the crl program so it
21 no longer acesses structures directly. Make the ASN1 CRL parsing a bit
22 less strict. It will now permit CRL extensions even if it is not
23 a V2 CRL: this will allow it to tolerate some broken CRLs.
24 [Steve Henson]
25
396f6314
BM
26 *) Initialize all non-automatic variables each time one of the openssl
27 sub-programs is started (this is necessary as they may be started
28 multiple times from the "OpenSSL>" prompt).
29 [Lennart Bang, Bodo Moeller]
30
4a61a64f
DSH
31 *) Preliminary compilation option RSA_NULL which disables RSA crypto without
32 removing all other RSA functionality (this is what NO_RSA does). This
33 is so (for example) those in the US can disable those operations covered
34 by the RSA patent while allowing storage and parsing of RSA keys and RSA
35 key generation.
36 [Steve Henson]
37
c1082a90 38 *) Non-copying interface to BIO pairs.
6f7af152 39 (still largely untested)
c1082a90
BM
40 [Bodo Moeller]
41
a785abc3
DSH
42 *) New function ANS1_tag2str() to convert an ASN1 tag to a descriptive
43 ASCII string. This was handled independently in various places before.
44 [Steve Henson]
45
aef838fc
DSH
46 *) New functions UTF8_getc() and UTF8_putc() that parse and generate
47 UTF8 strings a character at a time.
48 [Steve Henson]
49
074309b7
BM
50 *) Use client_version from client hello to select the protocol
51 (s23_srvr.c) and for RSA client key exchange verification
52 (s3_srvr.c), as required by the SSL 3.0/TLS 1.0 specifications.
53 [Bodo Moeller]
54
8ce97163
DSH
55 *) Add various utility functions to handle SPKACs, these were previously
56 handled by poking round in the structure internals. Added new function
57 NETSCAPE_SPKI_print() to print out SPKAC and a new utility 'spkac' to
58 print, verify and generate SPKACs. Based on an original idea from
59 Massimiliano Pala <madwolf@comune.modena.it> but extensively modified.
60 [Steve Henson]
61
2d4287da
AP
62 *) RIPEMD160 is operational on all platforms and is back in 'make test'.
63 [Andy Polyakov]
64
87a25f90
DSH
65 *) Allow the config file extension section to be overwritten on the
66 command line. Based on an original idea from Massimiliano Pala
67 <madwolf@comune.modena.it>. The new option is called -extensions
68 and can be applied to ca, req and x509. Also -reqexts to override
69 the request extensions in req and -crlexts to override the crl extensions
70 in ca.
71 [Steve Henson]
72
f9150e54
DSH
73 *) Add new feature to the SPKAC handling in ca. Now you can include
74 the same field multiple times by preceding it by "XXXX." for example:
75 1.OU="Unit name 1"
76 2.OU="Unit name 2"
77 this is the same syntax as used in the req config file.
78 [Steve Henson]
79
c79b16e1
DSH
80 *) Allow certificate extensions to be added to certificate requests. These
81 are specified in a 'req_extensions' option of the req section of the
82 config file. They can be printed out with the -text option to req but
83 are otherwise ignored at present.
84 [Steve Henson]
85
7b65c329
DSH
86 *) Fix a horrible bug in enc_read() in crypto/evp/bio_enc.c: if the first data
87 read consists of only the final block it would not decrypted because
88 EVP_CipherUpdate() would correctly report zero bytes had been decrypted.
89 A misplaced 'break' also meant the decrypted final block might not be
90 copied until the next read.
91 [Steve Henson]
92
13066cee
DSH
93 *) Initial support for DH_METHOD. Again based on RSA_METHOD. Also added
94 a few extra parameters to the DH structure: these will be useful if
95 for example we want the value of 'q' or implement X9.42 DH.
96 [Steve Henson]
97
c0711f7f
DSH
98 *) Initial support for DSA_METHOD. This is based on the RSA_METHOD and
99 provides hooks that allow the default DSA functions or functions on a
100 "per key" basis to be replaced. This allows hardware acceleration and
101 hardware key storage to be handled without major modification to the
102 library. Also added low level modexp hooks and CRYPTO_EX structure and
103 associated functions.
104 [Steve Henson]
105
8484721a
DSH
106 *) Add a new flag to memory BIOs, BIO_FLAG_MEM_RDONLY. This marks the BIO
107 as "read only": it can't be written to and the buffer it points to will
108 not be freed. Reading from a read only BIO is much more efficient than
109 a normal memory BIO. This was added because there are several times when
110 an area of memory needs to be read from a BIO. The previous method was
111 to create a memory BIO and write the data to it, this results in two
112 copies of the data and an O(n^2) reading algorithm. There is a new
113 function BIO_new_mem_buf() which creates a read only memory BIO from
114 an area of memory. Also modified the PKCS#7 routines to use read only
115 memory BIOSs.
116 [Steve Henson]
117
de1915e4
BM
118 *) Bugfix: ssl23_get_client_hello did not work properly when called in
119 state SSL23_ST_SR_CLNT_HELLO_B, i.e. when the first 7 bytes of
120 a SSLv2-compatible client hello for SSLv3 or TLSv1 could be read,
121 but a retry condition occured while trying to read the rest.
122 [Bodo Moeller]
123
c6c34506
DSH
124 *) The PKCS7_ENC_CONTENT_new() function was setting the content type as
125 NID_pkcs7_encrypted by default: this was wrong since this should almost
126 always be NID_pkcs7_data. Also modified the PKCS7_set_type() to handle
127 the encrypted data type: this is a more sensible place to put it and it
128 allows the PKCS#12 code to be tidied up that duplicated this
129 functionality.
130 [Steve Henson]
131
fd520577
DSH
132 *) Changed obj_dat.pl script so it takes its input and output files on
133 the command line. This should avoid shell escape redirection problems
134 under Win32.
135 [Steve Henson]
136
87c49f62 137 *) Initial support for certificate extension requests, these are included
fd520577
DSH
138 in things like Xenroll certificate requests. Included functions to allow
139 extensions to be obtained and added.
87c49f62
DSH
140 [Steve Henson]
141
1b1a6e78
BM
142 *) -crlf option to s_client and s_server for sending newlines as
143 CRLF (as required by many protocols).
144 [Bodo Moeller]
145
9a577e29 146 Changes between 0.9.3a and 0.9.4 [09 Aug 1999]
dfbaf956 147
9a577e29 148 *) Install libRSAglue.a when OpenSSL is built with RSAref.
dfbaf956 149 [Ralf S. Engelschall]
74678cc2 150
96395158
RE
151 *) A few more ``#ifndef NO_FP_API / #endif'' pairs for consistency.
152 [Andrija Antonijevic <TheAntony2@bigfoot.com>]
153
ed7f60fb
DSH
154 *) Fix -startdate and -enddate (which was missing) arguments to 'ca'
155 program.
156 [Steve Henson]
157
48c843c3
BM
158 *) New function DSA_dup_DH, which duplicates DSA parameters/keys as
159 DH parameters/keys (q is lost during that conversion, but the resulting
160 DH parameters contain its length).
161
162 For 1024-bit p, DSA_generate_parameters followed by DSA_dup_DH is
163 much faster than DH_generate_parameters (which creates parameters
164 where p = 2*q + 1), and also the smaller q makes DH computations
165 much more efficient (160-bit exponentiation instead of 1024-bit
166 exponentiation); so this provides a convenient way to support DHE
167 ciphersuites in SSL/TLS servers (see ssl/ssltest.c). It is of
168 utter importance to use
169 SSL_CTX_set_options(s_ctx, SSL_OP_SINGLE_DH_USE);
170 or
171 SSL_set_options(s_ctx, SSL_OP_SINGLE_DH_USE);
172 when such DH parameters are used, because otherwise small subgroup
173 attacks may become possible!
174 [Bodo Moeller]
175
176 *) Avoid memory leak in i2d_DHparams.
177 [Bodo Moeller]
178
922180d7
DSH
179 *) Allow the -k option to be used more than once in the enc program:
180 this allows the same encrypted message to be read by multiple recipients.
181 [Steve Henson]
182
3e3d2ea2
DSH
183 *) New function OBJ_obj2txt(buf, buf_len, a, no_name), this converts
184 an ASN1_OBJECT to a text string. If the "no_name" parameter is set then
185 it will always use the numerical form of the OID, even if it has a short
186 or long name.
187 [Steve Henson]
188
770d19b8
DSH
189 *) Added an extra RSA flag: RSA_FLAG_EXT_PKEY. Previously the rsa_mod_exp
190 method only got called if p,q,dmp1,dmq1,iqmp components were present,
191 otherwise bn_mod_exp was called. In the case of hardware keys for example
192 no private key components need be present and it might store extra data
193 in the RSA structure, which cannot be accessed from bn_mod_exp. By setting
194 RSA_FLAG_EXT_PKEY rsa_mod_exp will always be called for private key
195 operations.
196 [Steve Henson]
197
a0618e3e
AP
198 *) Added support for SPARC Linux.
199 [Andy Polyakov]
200
74678cc2
BM
201 *) pem_password_cb function type incompatibly changed from
202 typedef int pem_password_cb(char *buf, int size, int rwflag);
203 to
204 ....(char *buf, int size, int rwflag, void *userdata);
205 so that applications can pass data to their callbacks:
206 The PEM[_ASN1]_{read,write}... functions and macros now take an
207 additional void * argument, which is just handed through whenever
208 the password callback is called.
209 [Damien Miller <dmiller@ilogic.com.au>, with tiny changes by Bodo Moeller]
210
211 New function SSL_CTX_set_default_passwd_cb_userdata.
212
213 Compatibility note: As many C implementations push function arguments
214 onto the stack in reverse order, the new library version is likely to
215 interoperate with programs that have been compiled with the old
216 pem_password_cb definition (PEM_whatever takes some data that
217 happens to be on the stack as its last argument, and the callback
218 just ignores this garbage); but there is no guarantee whatsoever that
219 this will work.
0cceb1c7 220
664b9985
BM
221 *) The -DPLATFORM="\"$(PLATFORM)\"" definition and the similar -DCFLAGS=...
222 (both in crypto/Makefile.ssl for use by crypto/cversion.c) caused
223 problems not only on Windows, but also on some Unix platforms.
2e0fc875 224 To avoid problematic command lines, these definitions are now in an
57119943
BM
225 auto-generated file crypto/buildinf.h (created by crypto/Makefile.ssl
226 for standard "make" builds, by util/mk1mf.pl for "mk1mf" builds).
664b9985
BM
227 [Bodo Moeller]
228
7363455f
AP
229 *) MIPS III/IV assembler module is reimplemented.
230 [Andy Polyakov]
231
6434450c
UM
232 *) More DES library cleanups: remove references to srand/rand and
233 delete an unused file.
234