]> git.ipfire.org Git - thirdparty/openssl.git/blame - CHANGES
Fix horrible (and hard to track down) bug in ssl23_get_client_hello:
[thirdparty/openssl.git] / CHANGES
CommitLineData
651d0aff 1
f1c236f8 2 OpenSSL CHANGES
651d0aff
RE
3 _______________
4
d91e201e
RE
5 Changes between 0.9.4 and 0.9.5 [xx XXX 1999]
6
de1915e4
BM
7 *) Bugfix: ssl23_get_client_hello did not work properly when called in
8 state SSL23_ST_SR_CLNT_HELLO_B, i.e. when the first 7 bytes of
9 a SSLv2-compatible client hello for SSLv3 or TLSv1 could be read,
10 but a retry condition occured while trying to read the rest.
11 [Bodo Moeller]
12
c6c34506
DSH
13 *) The PKCS7_ENC_CONTENT_new() function was setting the content type as
14 NID_pkcs7_encrypted by default: this was wrong since this should almost
15 always be NID_pkcs7_data. Also modified the PKCS7_set_type() to handle
16 the encrypted data type: this is a more sensible place to put it and it
17 allows the PKCS#12 code to be tidied up that duplicated this
18 functionality.
19 [Steve Henson]
20
fd520577
DSH
21 *) Changed obj_dat.pl script so it takes its input and output files on
22 the command line. This should avoid shell escape redirection problems
23 under Win32.
24 [Steve Henson]
25
87c49f62 26 *) Initial support for certificate extension requests, these are included
fd520577
DSH
27 in things like Xenroll certificate requests. Included functions to allow
28 extensions to be obtained and added.
87c49f62
DSH
29 [Steve Henson]
30
1b1a6e78
BM
31 *) -crlf option to s_client and s_server for sending newlines as
32 CRLF (as required by many protocols).
33 [Bodo Moeller]
34
9a577e29 35 Changes between 0.9.3a and 0.9.4 [09 Aug 1999]
dfbaf956 36
9a577e29 37 *) Install libRSAglue.a when OpenSSL is built with RSAref.
dfbaf956 38 [Ralf S. Engelschall]
74678cc2 39
96395158
RE
40 *) A few more ``#ifndef NO_FP_API / #endif'' pairs for consistency.
41 [Andrija Antonijevic <TheAntony2@bigfoot.com>]
42
ed7f60fb
DSH
43 *) Fix -startdate and -enddate (which was missing) arguments to 'ca'
44 program.
45 [Steve Henson]
46
48c843c3
BM
47 *) New function DSA_dup_DH, which duplicates DSA parameters/keys as
48 DH parameters/keys (q is lost during that conversion, but the resulting
49 DH parameters contain its length).
50
51 For 1024-bit p, DSA_generate_parameters followed by DSA_dup_DH is
52 much faster than DH_generate_parameters (which creates parameters
53 where p = 2*q + 1), and also the smaller q makes DH computations
54 much more efficient (160-bit exponentiation instead of 1024-bit
55 exponentiation); so this provides a convenient way to support DHE
56 ciphersuites in SSL/TLS servers (see ssl/ssltest.c). It is of
57 utter importance to use
58 SSL_CTX_set_options(s_ctx, SSL_OP_SINGLE_DH_USE);
59 or
60 SSL_set_options(s_ctx, SSL_OP_SINGLE_DH_USE);
61 when such DH parameters are used, because otherwise small subgroup
62 attacks may become possible!
63 [Bodo Moeller]
64
65 *) Avoid memory leak in i2d_DHparams.
66 [Bodo Moeller]
67
922180d7
DSH
68 *) Allow the -k option to be used more than once in the enc program:
69 this allows the same encrypted message to be read by multiple recipients.
70 [Steve Henson]
71
3e3d2ea2
DSH
72 *) New function OBJ_obj2txt(buf, buf_len, a, no_name), this converts
73 an ASN1_OBJECT to a text string. If the "no_name" parameter is set then
74 it will always use the numerical form of the OID, even if it has a short
75 or long name.
76 [Steve Henson]
77
770d19b8
DSH
78 *) Added an extra RSA flag: RSA_FLAG_EXT_PKEY. Previously the rsa_mod_exp
79 method only got called if p,q,dmp1,dmq1,iqmp components were present,
80 otherwise bn_mod_exp was called. In the case of hardware keys for example
81 no private key components need be present and it might store extra data
82 in the RSA structure, which cannot be accessed from bn_mod_exp. By setting
83 RSA_FLAG_EXT_PKEY rsa_mod_exp will always be called for private key
84 operations.
85 [Steve Henson]
86
a0618e3e
AP
87 *) Added support for SPARC Linux.
88 [Andy Polyakov]
89
74678cc2
BM
90 *) pem_password_cb function type incompatibly changed from
91 typedef int pem_password_cb(char *buf, int size, int rwflag);
92 to
93 ....(char *buf, int size, int rwflag, void *userdata);
94 so that applications can pass data to their callbacks:
95 The PEM[_ASN1]_{read,write}... functions and macros now take an
96 additional void * argument, which is just handed through whenever
97 the password callback is called.
98 [Damien Miller <dmiller@ilogic.com.au>, with tiny changes by Bodo Moeller]
99
100 New function SSL_CTX_set_default_passwd_cb_userdata.
101
102 Compatibility note: As many C implementations push function arguments
103 onto the stack in reverse order, the new library version is likely to
104 interoperate with programs that have been compiled with the old
105 pem_password_cb definition (PEM_whatever takes some data that
106 happens to be on the stack as its last argument, and the callback
107 just ignores this garbage); but there is no guarantee whatsoever that
108 this will work.
0cceb1c7 109
664b9985
BM
110 *) The -DPLATFORM="\"$(PLATFORM)\"" definition and the similar -DCFLAGS=...
111 (both in crypto/Makefile.ssl for use by crypto/cversion.c) caused
112 problems not only on Windows, but also on some Unix platforms.
2e0fc875 113 To avoid problematic command lines, these definitions are now in an
57119943
BM
114 auto-generated file crypto/buildinf.h (created by crypto/Makefile.ssl
115 for standard "make" builds, by util/mk1mf.pl for "mk1mf" builds).
664b9985
BM
116 [Bodo Moeller]
117
7363455f
AP
118 *) MIPS III/IV assembler module is reimplemented.
119 [Andy Polyakov]
120
6434450c
UM
121 *) More DES library cleanups: remove references to srand/rand and
122 delete an unused file.
123