]> git.ipfire.org Git - thirdparty/openssl.git/blame_incremental - CHANGES
For consistency define clone digests in evp_fips.c
[thirdparty/openssl.git] / CHANGES
... / ...
CommitLineData
1
2 OpenSSL CHANGES
3 _______________
4
5 Changes between 1.0.0d and 1.0.1 [xx XXX xxxx]
6
7 *) Low level digest APIs are not approved in FIPS mode: any attempt
8 to use these will cause a fatal error. Applications that *really* want
9 to use them can use the private_* version instead.
10 [Steve Henson]
11
12 *) Redirect cipher operations to FIPS module for FIPS builds.
13 [Steve Henson]
14
15 *) Redirect digest operations to FIPS module for FIPS builds.
16 [Steve Henson]
17
18 *) Update build system to add "fips" flag which will link in fipscanister.o
19 for static and shared library builds embedding a signature if needed.
20 [Steve Henson]
21
22 *) Output TLS supported curves in preference order instead of numerical
23 order. This is currently hardcoded for the highest order curves first.
24 This should be configurable so applications can judge speed vs strength.
25 [Steve Henson]
26
27 *) Add protection against ECDSA timing attacks as mentioned in the paper
28 by Billy Bob Brumley and Nicola Tuveri, see:
29
30 http://eprint.iacr.org/2011/232.pdf
31
32 [Billy Bob Brumley and Nicola Tuveri]
33
34 *) Add TLS v1.2 server support for client authentication.
35 [Steve Henson]
36
37 *) Add support for FIPS mode in ssl library: disable SSLv3, non-FIPS ciphers
38 and enable MD5.
39 [Steve Henson]
40
41 *) Functions FIPS_mode_set() and FIPS_mode() which call the underlying
42 FIPS modules versions.
43 [Steve Henson]
44
45 *) Add TLS v1.2 client side support for client authentication. Keep cache
46 of handshake records longer as we don't know the hash algorithm to use
47 until after the certificate request message is received.
48 [Steve Henson]
49
50 *) Initial TLS v1.2 client support. Add a default signature algorithms
51 extension including all the algorithms we support. Parse new signature
52 format in client key exchange. Relax some ECC signing restrictions for
53 TLS v1.2 as indicated in RFC5246.
54 [Steve Henson]
55
56 *) Add server support for TLS v1.2 signature algorithms extension. Switch
57 to new signature format when needed using client digest preference.
58 All server ciphersuites should now work correctly in TLS v1.2. No client
59 support yet and no support for client certificates.
60 [Steve Henson]
61
62 *) Initial TLS v1.2 support. Add new SHA256 digest to ssl code, switch
63 to SHA256 for PRF when using TLS v1.2 and later. Add new SHA256 based
64 ciphersuites. At present only RSA key exchange ciphersuites work with
65 TLS v1.2. Add new option for TLS v1.2 replacing the old and obsolete
66 SSL_OP_PKCS1_CHECK flags with SSL_OP_NO_TLSv1_2. New TLSv1.2 methods
67 and version checking.
68 [Steve Henson]
69
70 *) New option OPENSSL_NO_SSL_INTERN. If an application can be compiled
71 with this defined it will not be affected by any changes to ssl internal
72 structures. Add several utility functions to allow openssl application
73 to work with OPENSSL_NO_SSL_INTERN defined.
74 [Steve Henson]
75
76 *) Add SRP support.
77 [Tom Wu <tjw@cs.stanford.edu> and Ben Laurie]
78
79 *) Add functions to copy EVP_PKEY_METHOD and retrieve flags and id.
80 [Steve Henson]
81
82 *) Add EC_GFp_nistp224_method(), a 64-bit optimized implementation for
83 elliptic curve NIST-P224 with constant-time single point multiplication on
84 typical inputs. EC_GROUP_new_by_curve_name() will automatically use this
85 (while EC_GROUP_new_curve_GFp() currently won't and prefers the more
86 flexible implementations).
87
88 The implementation requires support for the nonstandard type __uint128_t,
89 and so is disabled by default. To include this in your build of OpenSSL,
90 use -DEC_NISTP224_64_GCC_128 on the Configure (or config) command line,
91 and run "make depend" (or "make update").
92