]>
Commit | Line | Data |
---|---|---|
651d0aff | 1 | |
f1c236f8 | 2 | OpenSSL CHANGES |
651d0aff RE |
3 | _______________ |
4 | ||
c90341a1 RL |
5 | Changes between 0.9.5a and 0.9.6 [xx XXX 2000] |
6 | ||
3aceb94b DSH |
7 | *) Reorganisation of the stack code. The macros are now all |
8 | collected in safestack.h . Each macro is defined in terms of | |
9 | a "stack macro" of the form SKM_<name>(type, a, b). The | |
10 | DEBUG_SAFESTACK is now handled in terms of function casts, | |
11 | this has the advantage of retaining type safety without the | |
12 | use of additional functions. If DEBUG_SAFESTACK is not defined | |
13 | then the non typesafe macros are used instead. Also modified the | |
14 | mkstack.pl script to handle the new form. Needs testing to see | |
15 | if which (if any) compilers it chokes and maybe make DEBUG_SAFESTACK | |
7ef82068 DSH |
16 | the default if no major problems. Similar behaviour for ASN1_SET_OF |
17 | and PKCS12_STACK_OF. | |
3aceb94b DSH |
18 | [Steve Henson] |
19 | ||
d3ed8ceb DSH |
20 | *) When some versions of IIS use the 'NET' form of private key the |
21 | key derivation algorithm is different. Normally MD5(password) is | |
22 | used as a 128 bit RC4 key. In the modified case | |
23 | MD5(MD5(password) + "SGCKEYSALT") is used insted. Added some | |
24 | new functions i2d_RSA_NET(), d2i_RSA_NET() etc which are the same | |
25 | as the old Netscape_RSA functions except they have an additional | |
26 | 'sgckey' parameter which uses the modified algorithm. Also added | |
27 | an -sgckey command line option to the rsa utility. Thanks to | |
28 | Adrian Peck <bertie@ncipher.com> for posting details of the modified | |
29 | algorithm to openssl-dev. | |
30 | [Steve Henson] | |
31 | ||
e366f2b8 DSH |
32 | *) The evp_local.h macros were using 'c.##kname' which resulted in |
33 | invalid expansion on some systems (SCO 5.0.5 for example). | |
34 | Corrected to 'c.kname'. | |
35 | [Phillip Porch <root@theporch.com>] | |
36 | ||
a91dedca DSH |
37 | *) New X509_get1_email() and X509_REQ_get1_email() functions that return |
38 | a STACK of email addresses from a certificate or request, these look | |
39 | in the subject name and the subject alternative name extensions and | |
40 | omit any duplicate addresses. | |
41 | [Steve Henson] | |
42 | ||
dc434bbc BM |
43 | *) Re-implement BN_mod_exp2_mont using independent (and larger) windows. |
44 | This makes DSA verification about 2 % faster. | |
45 | [Bodo Moeller] | |
46 | ||
47 | *) Increase maximum window size in BN_mod_exp_... to 6 bits instead of 5 | |
48 | (meaning that now 2^5 values will be precomputed, which is only 4 KB | |
49 | plus overhead for 1024 bit moduli). | |
50 | This makes exponentiations about 0.5 % faster for 1024 bit | |
51 | exponents (as measured by "openssl speed rsa2048"). | |
52 | [Bodo Moeller] | |
53 | ||
947b3b8b BM |
54 | *) Rename memory handling macros to avoid conflicts with other |
55 | software: | |
56 | Malloc => OPENSSL_malloc | |
57 | Malloc_locked => OPENSSL_malloc_locked | |
58 | Realloc => OPENSSL_realloc | |
59 | Free => OPENSSL_free | |
60 | [Richard Levitte] | |
61 | ||
482a9d41 BM |
62 | *) New function BN_mod_exp_mont_word for small bases (roughly 15% |
63 | faster than BN_mod_exp_mont, i.e. 7% for a full DH exchange). | |
6dad7bd6 BM |
64 | [Bodo Moeller] |
65 | ||
be5d92e0 UM |
66 | *) CygWin32 support. |
67 | [John Jarvie <jjarvie@newsguy.com>] | |
68 | ||
e41c8d6a GT |
69 | *) The type-safe stack code has been rejigged. It is now only compiled |
70 | in when OpenSSL is configured with the DEBUG_SAFESTACK option and | |
71 | by default all type-specific stack functions are "#define"d back to | |
72 | standard stack functions. This results in more streamlined output | |
73 | but retains the type-safety checking possibilities of the original | |
74 | approach. | |
75 | [Geoff Thorpe] | |
76 | ||
ccd86b68 GT |
77 | *) The STACK code has been cleaned up, and certain type declarations |
78 | that didn't make a lot of sense have been brought in line. This has | |
79 | also involved a cleanup of sorts in safestack.h to more correctly | |
80 | map type-safe stack functions onto their plain stack counterparts. | |
81 | This work has also resulted in a variety of "const"ifications of | |
82 | lots of the code, especially "_cmp" operations which should normally | |
83 | be prototyped with "const" parameters anyway. | |
84 | [Geoff Thorpe] | |
85 | ||
361ee973 BM |
86 | *) When generating bytes for the first time in md_rand.c, 'stir the pool' |
87 | by seeding with STATE_SIZE dummy bytes (with zero entropy count). | |
88 | (The PRNG state consists of two parts, the large pool 'state' and 'md', | |
89 | where all of 'md' is used each time the PRNG is used, but 'state' | |
90 | is used only indexed by a cyclic counter. As entropy may not be | |
91 | well distributed from the beginning, 'md' is important as a | |
92 | chaining variable. However, the output function chains only half | |
93 | of 'md', i.e. 80 bits. ssleay_rand_add, on the other hand, chains | |
94 | all of 'md', and seeding with STATE_SIZE dummy bytes will result | |
95 | in all of 'state' being rewritten, with the new values depending | |
96 | on virtually all of 'md'. This overcomes the 80 bit limitation.) | |
97 | [Bodo Moeller] | |
98 | ||
49528751 DSH |
99 | *) In ssl/s2_clnt.c and ssl/s3_clnt.c, call ERR_clear_error() when |
100 | the handshake is continued after ssl_verify_cert_chain(); | |
101 | otherwise, if SSL_VERIFY_NONE is set, remaining error codes | |
102 | can lead to 'unexplainable' connection aborts later. | |
103 | [Bodo Moeller; problem tracked down by Lutz Jaenicke] | |
104 | ||
105 | *) Major EVP API cipher revision. | |
106 | Add hooks for extra EVP features. This allows various cipher | |
107 | parameters to be set in the EVP interface. Support added for variable | |
108 | key length ciphers via the EVP_CIPHER_CTX_set_key_length() function and | |
109 | setting of RC2 and RC5 parameters. | |
110 | ||
111 | Modify EVP_OpenInit() and EVP_SealInit() to cope with variable key length | |
112 | ciphers. | |
113 | ||
114 | Remove lots of duplicated code from the EVP library. For example *every* | |
360370d9 DSH |
115 | cipher init() function handles the 'iv' in the same way according to the |
116 | cipher mode. They also all do nothing if the 'key' parameter is NULL and | |
117 | for CFB and OFB modes they zero ctx->num. | |
118 | ||
49528751 DSH |
119 | New functionality allows removal of S/MIME code RC2 hack. |
120 | ||
57ae2e24 DSH |
121 | Most of the routines have the same form and so can be declared in terms |
122 | of macros. | |
123 | ||
360370d9 DSH |
124 | By shifting this to the top level EVP_CipherInit() it can be removed from |
125 | all individual ciphers. If the cipher wants to handle IVs or keys | |
126 | differently it can set the EVP_CIPH_CUSTOM_IV or EVP_CIPH_ALWAYS_CALL_INIT | |
127 | flags. | |
be06a934 DSH |
128 | |
129 | Change lots of functions like EVP_EncryptUpdate() to now return a | |
130 | value: although software versions of the algorithms cannot fail | |
131 | any installed hardware versions can. | |
7f060601 DSH |
132 | [Steve Henson] |
133 | ||
2c05c494 BM |
134 | *) Implement SSL_OP_TLS_ROLLBACK_BUG: In ssl3_get_client_key_exchange, if |
135 | this option is set, tolerate broken clients that send the negotiated | |
136 | protocol version number instead of the requested protocol version | |
137 | number. | |
138 | [Bodo Moeller] | |
139 | ||
140 | *) Call dh_tmp_cb (set by ..._TMP_DH_CB) with correct 'is_export' flag; | |
141 | i.e. non-zero for export ciphersuites, zero otherwise. | |
142 | Previous versions had this flag inverted, inconsistent with | |
143 | rsa_tmp_cb (..._TMP_RSA_CB). | |
144 | [Bodo Moeller; problem reported by Amit Chopra] | |
145 | ||
b4b41f48 DSH |
146 | *) Add missing DSA library text string. Work around for some IIS |
147 | key files with invalid SEQUENCE encoding. | |
148 | [Steve Henson] | |
149 | ||
6d7cce48 RL |
150 | *) Add a document (doc/standards.txt) that list all kinds of standards |
151 | and so on that are implemented in OpenSSL. | |
152 | [Richard Levitte] | |
153 | ||
439df508 DSH |
154 | *) Enhance c_rehash script. Old version would mishandle certificates |
155 | with the same subject name hash and wouldn't handle CRLs at all. | |
156 | Added -fingerprint option to crl utility, to support new c_rehash | |
157 | features. | |
158 | [Steve Henson] | |
159 | ||
0e1c0612 | 160 | *) Eliminate non-ANSI declarations in crypto.h and stack.h. |
2c05c494 | 161 |