]> git.ipfire.org Git - thirdparty/openssl.git/blame - CHANGES
New SP 800-56A compliant version of DH_compute_key().
[thirdparty/openssl.git] / CHANGES
CommitLineData
81a6c781 1
f1c236f8 2 OpenSSL CHANGES
651d0aff
RE
3 _______________
4
7b3a9b00 5 Changes between 1.0.1 and 1.1.0 [xx XXX xxxx]
aaf35f11 6
591cbfae
DSH
7 *) Initial implementation of SP800-90 DRBGs for Hash and CTR. Not used by
8 anything, incomplete, subject to change and largely untested at present.
9 [Steve Henson]
10
eead69f5
DSH
11 *) Modify fipscanisteronly build option to only build the necessary object
12 files by filtering FIPS_EX_OBJ through a perl script in crypto/Makefile.
13 [Steve Henson]
14
017bc57b
DSH
15 *) Add experimental option FIPSSYMS to give all symbols in
16 fipscanister.o and FIPS or fips prefix. This will avoid
5d439d69
DSH
17 conflicts with future versions of OpenSSL. Add perl script
18 util/fipsas.pl to preprocess assembly language source files
19 and rename any affected symbols.
017bc57b
DSH
20 [Steve Henson]
21
25c65429
DSH
22 *) Add selftest checks and algorithm block of non-fips algorithms in
23 FIPS mode. Remove DES2 from selftests.
24 [Steve Henson]
25
fe26d066
DSH
26 *) Add ECDSA code to fips module. Add tiny fips_ecdsa_check to just
27 return internal method without any ENGINE dependencies. Add new
25c65429 28 tiny fips sign and verify functions.
fe26d066
DSH
29 [Steve Henson]
30
b3310161
DSH
31 *) New build option no-ec2m to disable characteristic 2 code.
32 [Steve Henson]
33
30b56225
DSH
34 *) New build option "fipscanisteronly". This only builds fipscanister.o
35 and (currently) associated fips utilities. Uses the file Makefile.fips
36 instead of Makefile.org as the prototype.
37 [Steve Henson]
38
b3d8022e
DSH
39 *) Add some FIPS mode restrictions to GCM. Add internal IV generator.
40 Update fips_gcmtest to use IV generator.
41 [Steve Henson]
42
bdaa5415
DSH
43 *) Initial, experimental EVP support for AES-GCM. AAD can be input by
44 setting output buffer to NULL. The *Final function must be
45 called although it will not retrieve any additional data. The tag
46 can be set or retrieved with a ctrl. The IV length is by default 12
47 bytes (96 bits) but can be set to an alternative value. If the IV
48 length exceeds the maximum IV length (currently 16 bytes) it cannot be
49 set before the key.
50 [Steve Henson]
51
3da0ca79
DSH
52 *) New flag in ciphers: EVP_CIPH_FLAG_CUSTOM_CIPHER. This means the
53 underlying do_cipher function handles all cipher semantics itself
54 including padding and finalisation. This is useful if (for example)
55 an ENGINE cipher handles block padding itself. The behaviour of
56 do_cipher is subtly changed if this flag is set: the return value
57 is the number of characters written to the output buffer (zero is
58 no longer an error code) or a negative error code. Also if the
d45087c6 59 input buffer is NULL and length 0 finalisation should be performed.
3da0ca79
DSH
60 [Steve Henson]
61
2b3936e8
DSH
62 *) If a candidate issuer certificate is already part of the constructed
63 path ignore it: new debug notification X509_V_ERR_PATH_LOOP for this case.
64 [Steve Henson]
65
7c2d4fee
BM
66 *) Improve forward-security support: add functions
67
68 void SSL_CTX_set_not_resumable_session_callback(SSL_CTX *ctx, int (*cb)(SSL *ssl, int is_forward_secure))
69 void SSL_set_not_resumable_session_callback(SSL *ssl, int (*cb)(SSL *ssl, int is_forward_secure))
70
71 for use by SSL/TLS servers; the callback function will be called whenever a
72 new session is created, and gets to decide whether the session may be
73 cached to make it resumable (return 0) or not (return 1). (As by the
74 SSL/TLS protocol specifications, the session_id sent by the server will be
75 empty to indicate that the session is not resumable; also, the server will
76 not generate RFC 4507 (RFC 5077) session tickets.)
77
78 A simple reasonable callback implementation is to return is_forward_secure.
79 This parameter will be set to 1 or 0 depending on the ciphersuite selected
80 by the SSL/TLS server library, indicating whether it can provide forward
81 security.
82