]> git.ipfire.org Git - thirdparty/openssl.git/blame - CHANGES
Initial support for DH_METHOD. Also added a DH lock. A few changes made to
[thirdparty/openssl.git] / CHANGES
CommitLineData
651d0aff 1
f1c236f8 2 OpenSSL CHANGES
651d0aff
RE
3 _______________
4
d91e201e
RE
5 Changes between 0.9.4 and 0.9.5 [xx XXX 1999]
6
13066cee
DSH
7 *) Initial support for DH_METHOD. Again based on RSA_METHOD. Also added
8 a few extra parameters to the DH structure: these will be useful if
9 for example we want the value of 'q' or implement X9.42 DH.
10 [Steve Henson]
11
c0711f7f
DSH
12 *) Initial support for DSA_METHOD. This is based on the RSA_METHOD and
13 provides hooks that allow the default DSA functions or functions on a
14 "per key" basis to be replaced. This allows hardware acceleration and
15 hardware key storage to be handled without major modification to the
16 library. Also added low level modexp hooks and CRYPTO_EX structure and
17 associated functions.
18 [Steve Henson]
19
8484721a
DSH
20 *) Add a new flag to memory BIOs, BIO_FLAG_MEM_RDONLY. This marks the BIO
21 as "read only": it can't be written to and the buffer it points to will
22 not be freed. Reading from a read only BIO is much more efficient than
23 a normal memory BIO. This was added because there are several times when
24 an area of memory needs to be read from a BIO. The previous method was
25 to create a memory BIO and write the data to it, this results in two
26 copies of the data and an O(n^2) reading algorithm. There is a new
27 function BIO_new_mem_buf() which creates a read only memory BIO from
28 an area of memory. Also modified the PKCS#7 routines to use read only
29 memory BIOSs.
30 [Steve Henson]
31
de1915e4
BM
32 *) Bugfix: ssl23_get_client_hello did not work properly when called in
33 state SSL23_ST_SR_CLNT_HELLO_B, i.e. when the first 7 bytes of
34 a SSLv2-compatible client hello for SSLv3 or TLSv1 could be read,
35 but a retry condition occured while trying to read the rest.
36 [Bodo Moeller]
37
c6c34506
DSH
38 *) The PKCS7_ENC_CONTENT_new() function was setting the content type as
39 NID_pkcs7_encrypted by default: this was wrong since this should almost
40 always be NID_pkcs7_data. Also modified the PKCS7_set_type() to handle
41 the encrypted data type: this is a more sensible place to put it and it
42 allows the PKCS#12 code to be tidied up that duplicated this
43 functionality.
44 [Steve Henson]
45
fd520577
DSH
46 *) Changed obj_dat.pl script so it takes its input and output files on
47 the command line. This should avoid shell escape redirection problems
48 under Win32.
49 [Steve Henson]
50
87c49f62 51 *) Initial support for certificate extension requests, these are included
fd520577
DSH
52 in things like Xenroll certificate requests. Included functions to allow
53 extensions to be obtained and added.
87c49f62
DSH
54 [Steve Henson]
55
1b1a6e78
BM
56 *) -crlf option to s_client and s_server for sending newlines as
57 CRLF (as required by many protocols).
58 [Bodo Moeller]
59
9a577e29 60 Changes between 0.9.3a and 0.9.4 [09 Aug 1999]
dfbaf956 61
9a577e29 62 *) Install libRSAglue.a when OpenSSL is built with RSAref.
dfbaf956 63 [Ralf S. Engelschall]
74678cc2 64
96395158
RE
65 *) A few more ``#ifndef NO_FP_API / #endif'' pairs for consistency.
66 [Andrija Antonijevic <TheAntony2@bigfoot.com>]
67
ed7f60fb
DSH
68 *) Fix -startdate and -enddate (which was missing) arguments to 'ca'
69 program.
70 [Steve Henson]
71
48c843c3
BM
72 *) New function DSA_dup_DH, which duplicates DSA parameters/keys as
73 DH parameters/keys (q is lost during that conversion, but the resulting
74 DH parameters contain its length).
75
76 For 1024-bit p, DSA_generate_parameters followed by DSA_dup_DH is
77 much faster than DH_generate_parameters (which creates parameters
78 where p = 2*q + 1), and also the smaller q makes DH computations
79 much more efficient (160-bit exponentiation instead of 1024-bit
80 exponentiation); so this provides a convenient way to support DHE
81 ciphersuites in SSL/TLS servers (see ssl/ssltest.c). It is of
82 utter importance to use
83 SSL_CTX_set_options(s_ctx, SSL_OP_SINGLE_DH_USE);
84 or
85 SSL_set_options(s_ctx, SSL_OP_SINGLE_DH_USE);
86 when such DH parameters are used, because otherwise small subgroup
87 attacks may become possible!
88 [Bodo Moeller]
89
90 *) Avoid memory leak in i2d_DHparams.
91 [Bodo Moeller]
92
922180d7
DSH
93 *) Allow the -k option to be used more than once in the enc program:
94 this allows the same encrypted message to be read by multiple recipients.
95 [Steve Henson]
96
3e3d2ea2
DSH
97 *) New function OBJ_obj2txt(buf, buf_len, a, no_name), this converts
98 an ASN1_OBJECT to a text string. If the "no_name" parameter is set then
99 it will always use the numerical form of the OID, even if it has a short
100 or long name.
101 [Steve Henson]
102
770d19b8
DSH
103 *) Added an extra RSA flag: RSA_FLAG_EXT_PKEY. Previously the rsa_mod_exp
104 method only got called if p,q,dmp1,dmq1,iqmp components were present,
105 otherwise bn_mod_exp was called. In the case of hardware keys for example
106 no private key components need be present and it might store extra data
107 in the RSA structure, which cannot be accessed from bn_mod_exp. By setting
108 RSA_FLAG_EXT_PKEY rsa_mod_exp will always be called for private key
109 operations.
110 [Steve Henson]
111
a0618e3e
AP
112 *) Added support for SPARC Linux.
113 [Andy Polyakov]
114
74678cc2
BM
115 *) pem_password_cb function type incompatibly changed from
116 typedef int pem_password_cb(char *buf, int size, int rwflag);
117 to
118 ....(char *buf, int size, int rwflag, void *userdata);
119 so that applications can pass data to their callbacks:
120 The PEM[_ASN1]_{read,write}... functions and macros now take an
121 additional void * argument, which is just handed through whenever
122 the password callback is called.
123 [Damien Miller <dmiller@ilogic.com.au>, with tiny changes by Bodo Moeller]
124
125 New function SSL_CTX_set_default_passwd_cb_userdata.
126
127 Compatibility note: As many C implementations push function arguments
128 onto the stack in reverse order, the new library version is likely to
129 interoperate with programs that have been compiled with the old
130 pem_password_cb definition (PEM_whatever takes some data that
131 happens to be on the stack as its last argument, and the callback
132 just ignores this garbage); but there is no guarantee whatsoever that
133 this will work.
0cceb1c7 134
664b9985
BM
135 *) The -DPLATFORM="\"$(PLATFORM)\"" definition and the similar -DCFLAGS=...
136 (both in crypto/Makefile.ssl for use by crypto/cversion.c) caused
137 problems not only on Windows, but also on some Unix platforms.
2e0fc875 138 To avoid problematic command lines, these definitions are now in an
57119943
BM
139 auto-generated file crypto/buildinf.h (created by crypto/Makefile.ssl
140 for standard "make" builds, by util/mk1mf.pl for "mk1mf" builds).
664b9985
BM
141 [Bodo Moeller]
142
7363455f
AP
143 *) MIPS III/IV assembler module is reimplemented.
144 [Andy Polyakov]
145
6434450c
UM
146 *) More DES library cleanups: remove references to srand/rand and
147 delete an unused file.
148