]> git.ipfire.org Git - thirdparty/openssl.git/blame - CHANGES
Even when you don't want to create shared libraries, it's a good idea
[thirdparty/openssl.git] / CHANGES
CommitLineData
651d0aff 1
f1c236f8 2 OpenSSL CHANGES
651d0aff
RE
3 _______________
4
c5e8580e
RL
5 Changes between 0.9.6 and 0.9.7 [xx XXX 2000]
6
a22fb399
RL
7 *) Rework the system to generate shared libraries:
8
9 - Make note of the expected extension for the shared libraries and
10 if there is a need for symbolic links from for example libcrypto.so.0
11 to libcrypto.so.0.9.7. There is extended info in Configure for
12 that.
13
14 - Make as few rebuilds of the shared libraries as possible.
15
16 - Still avoid linking the OpenSSL programs with the shared libraries.
17
18 - When installing, install the shared libraries separately from the
19 static ones.
20 [Richard Levitte]
21
924046ce
DSH
22 *) Fix for non blocking accept BIOs. Added new I/O special reason
23 BIO_RR_ACCEPT to cover this case. Previously use of accept BIOs
24 with non blocking I/O was not possible because no retry code was
25 implemented. Also added new SSL code SSL_WANT_ACCEPT to cover
26 this case.
27 [Steve Henson]
28
d0c98589 29 *) Fix for bug in DirectoryString mask setting. Add support for
8ca533e3
DSH
30 X509_NAME_print_ex() in 'req' and X509_print_ex() function
31 to allow certificate printing to more controllable, additional
32 'certopt' option to 'x509' to allow new printing options to be
33 set.
d0c98589
DSH
34 [Steve Henson]
35
ef71cb6d
RL
36 *) Clean old EAY MD5 hack from e_os.h.
37 [Richard Levitte]
38
3a0afe1e
BM
39 *) Fix SSL_CTX_set_read_ahead macro to actually use its argument.
40
41 Copy SSL_CTX's read_ahead flag to SSL object directly in SSL_new
42 and not in SSL_clear because the latter is also used by the
43 accept/connect functions; previously, the settings made by
44 SSL_set_read_ahead would be lost during the handshake.
45 [Bodo Moeller; problems reported by Anders Gertz <gertz@epact.se>]
46
88aeb646
RL
47 *) Correct util/mkdef.pl to be selective about disabled algorithms.
48 Previously, it would create entries for disableed algorithms no
49 matter what.
50 [Richard Levitte]
c5e8580e 51
0e8f2fdf 52 Changes between 0.9.5a and 0.9.6 [24 Sep 2000]
bbb72003 53
f1192b7f
BM
54 *) In ssl23_get_client_hello, generate an error message when faced
55 with an initial SSL 3.0/TLS record that is too small to contain the
56 first two bytes of the ClientHello message, i.e. client_version.
57 (Note that this is a pathologic case that probably has never happened
58 in real life.) The previous approach was to use the version number
5a5accdd 59 from the record header as a substitute; but our protocol choice
f1192b7f
BM
60 should not depend on that one because it is not authenticated
61 by the Finished messages.
62 [Bodo Moeller]
63
d49da3aa
UM
64 *) More robust randomness gathering functions for Windows.
65 [Jeffrey Altman <jaltman@columbia.edu>]
66
dbba890c
DSH
67 *) For compatibility reasons if the flag X509_V_FLAG_ISSUER_CHECK is
68 not set then we don't setup the error code for issuer check errors
69 to avoid possibly overwriting other errors which the callback does
70 handle. If an application does set the flag then we assume it knows
71 what it is doing and can handle the new informational codes
72 appropriately.
73 [Steve Henson]
74
6cffb201
DSH
75 *) Fix for a nasty bug in ASN1_TYPE handling. ASN1_TYPE is used for
76 a general "ANY" type, as such it should be able to decode anything
77 including tagged types. However it didn't check the class so it would
78 wrongly interpret tagged types in the same way as their universal
79 counterpart and unknown types were just rejected. Changed so that the
80 tagged and unknown types are handled in the same way as a SEQUENCE:
81 that is the encoding is stored intact. There is also a new type
82 "V_ASN1_OTHER" which is used when the class is not universal, in this
83 case we have no idea what the actual type is so we just lump them all
84 together.
85 [Steve Henson]
86
645749ef
RL
87 *) On VMS, stdout may very well lead to a file that is written to
88 in a record-oriented fashion. That means that every write() will
89 write a separate record, which will be read separately by the
90 programs trying to read from it. This can be very confusing.
91
92 The solution is to put a BIO filter in the way that will buffer
93 text until a linefeed is reached, and then write everything a
94 line at a time, so every record written will be an actual line,
95 not chunks of lines and not (usually doesn't happen, but I've
96 seen it once) several lines in one record. BIO_f_linebuffer() is
97 the answer.
98
99 Currently, it's a VMS-only method, because that's where it has
100 been tested well enough.
101 [Richard Levitte]
102
fe035197 103 *) Remove 'optimized' squaring variant in BN_mod_mul_montgomery,
a45bd295 104 it can return incorrect results.
cb1fbf8e
BM
105 (Note: The buggy variant was not enabled in OpenSSL 0.9.5a,
106 but it was in 0.9.6-beta[12].)
a45bd295
BM
107 [Bodo Moeller]
108
730e37ed
DSH
109 *) Disable the check for content being present when verifying detached
110 signatures in pk7_smime.c. Some versions of Netscape (wrongly)
111 include zero length content when signing messages.
112 [Steve Henson]
113
07fcf422
BM
114 *) New BIO_shutdown_wr macro, which invokes the BIO_C_SHUTDOWN_WR
115 BIO_ctrl (for BIO pairs).
d49da3aa 116