]> git.ipfire.org Git - thirdparty/openssl.git/blame - CHANGES
Add the possibility to use keys handled by engines in more
[thirdparty/openssl.git] / CHANGES
CommitLineData
651d0aff 1
f1c236f8 2 OpenSSL CHANGES
651d0aff
RE
3 _______________
4
c5e8580e
RL
5 Changes between 0.9.6 and 0.9.7 [xx XXX 2000]
6
7c155330
RL
7 *) Add OCSP code that comes from CertCo.
8 [Richard Levitte]
9
34a14882 10 *) Add VMS support for the Rijndael code.
5270e702
RL
11 [Richard Levitte]
12
13 *) Added untested support for Nuron crypto accelerator.
14 [Ben Laurie]
15
16 *) Add support for external cryptographic devices. This code was
17 previously distributed separately as the "engine" branch.
18 [Geoff Thorpe, Richard Levitte]
19
1df586be
GT
20 *) Rework the filename-translation in the DSO code. It is now possible to
21 have far greater control over how a "name" is turned into a filename
22 depending on the operating environment and any oddities about the
23 different shared library filenames on each system.
24 [Geoff Thorpe]
25
53400da7
RL
26 *) Support threads on FreeBSD-elf in Configure.
27 [Richard Levitte]
28
0fd44e2d
RL
29 *) Add the possibility to create shared libraries on HP-UX
30 [Richard Levitte]
31
627ec355
DSH
32 *) Fix for SHA1 assembly problem with MASM: it produces
33 warnings about corrupt line number information when assembling
34 with debugging information. This is caused by the overlapping
35 of two sections.
36 [Bernd Matthes <mainbug@celocom.de>, Steve Henson]
37
567f17cf
RL
38 *) NCONF changes.
39 NCONF_get_number() has no error checking at all. As a replacement,
40 NCONF_get_number_e() is defined (_e for "error checking") and is
41 promoted strongly. The old NCONF_get_number is kept around for
42 binary backward compatibility.
43 Make it possible for methods to load from something other than a BIO,
44 by providing a function pointer that is given a name instead of a BIO.
45 For example, this could be used to load configuration data from an
46 LDAP server.
47 [Richard Levitte]
48
71d525c9
DSH
49 *) Fix typo in get_cert_by_subject() in by_dir.c
50 [Jean-Marc Desperrier <jean-marc.desperrier@certplus.com>]
51
a22fb399
RL
52 *) Rework the system to generate shared libraries:
53
54 - Make note of the expected extension for the shared libraries and
55 if there is a need for symbolic links from for example libcrypto.so.0
56 to libcrypto.so.0.9.7. There is extended info in Configure for
57 that.
58
59 - Make as few rebuilds of the shared libraries as possible.
60
61 - Still avoid linking the OpenSSL programs with the shared libraries.
62
63 - When installing, install the shared libraries separately from the
64 static ones.
65 [Richard Levitte]
66
924046ce
DSH
67 *) Fix for non blocking accept BIOs. Added new I/O special reason
68 BIO_RR_ACCEPT to cover this case. Previously use of accept BIOs
69 with non blocking I/O was not possible because no retry code was
70 implemented. Also added new SSL code SSL_WANT_ACCEPT to cover
71 this case.
72 [Steve Henson]
73
3ab56511
RL
74 *) Added the beginnings of Rijndael support.
75 [Ben Laurie]
76
d0c98589 77 *) Fix for bug in DirectoryString mask setting. Add support for
8ca533e3
DSH
78 X509_NAME_print_ex() in 'req' and X509_print_ex() function
79 to allow certificate printing to more controllable, additional
80 'certopt' option to 'x509' to allow new printing options to be
81 set.
d0c98589
DSH
82 [Steve Henson]
83
ef71cb6d
RL
84 *) Clean old EAY MD5 hack from e_os.h.
85 [Richard Levitte]
86
3a0afe1e
BM
87 *) Fix SSL_CTX_set_read_ahead macro to actually use its argument.
88
89 Copy SSL_CTX's read_ahead flag to SSL object directly in SSL_new
90 and not in SSL_clear because the latter is also used by the
91 accept/connect functions; previously, the settings made by
92 SSL_set_read_ahead would be lost during the handshake.
93 [Bodo Moeller; problems reported by Anders Gertz <gertz@epact.se>]
94
88aeb646
RL
95 *) Correct util/mkdef.pl to be selective about disabled algorithms.
96 Previously, it would create entries for disableed algorithms no
97 matter what.
98 [Richard Levitte]
c5e8580e 99
0e8f2fdf 100 Changes between 0.9.5a and 0.9.6 [24 Sep 2000]
bbb72003 101
f1192b7f
BM
102 *) In ssl23_get_client_hello, generate an error message when faced
103 with an initial SSL 3.0/TLS record that is too small to contain the
104 first two bytes of the ClientHello message, i.e. client_version.
105 (Note that this is a pathologic case that probably has never happened
106 in real life.) The previous approach was to use the version number
5a5accdd 107 from the record header as a substitute; but our protocol choice
f1192b7f
BM
108 should not depend on that one because it is not authenticated
109 by the Finished messages.
110 [Bodo Moeller]
111
d49da3aa
UM
112 *) More robust randomness gathering functions for Windows.
113 [Jeffrey Altman <jaltman@columbia.edu>]
114
dbba890c
DSH
115 *) For compatibility reasons if the flag X509_V_FLAG_ISSUER_CHECK is
116 not set then we don't setup the error code for issuer check errors
117 to avoid possibly overwriting other errors which the callback does
118 handle. If an application does set the flag then we assume it knows
119 what it is doing and can handle the new informational codes
120 appropriately.
121 [Steve Henson]
122
6cffb201
DSH
123 *) Fix for a nasty bug in ASN1_TYPE handling. ASN1_TYPE is used for
124 a general "ANY" type, as such it should be able to decode anything
125 including tagged types. However it didn't check the class so it would
126 wrongly interpret tagged types in the same way as their universal
127 counterpart and unknown types were just rejected. Changed so that the
128 tagged and unknown types are handled in the same way as a SEQUENCE:
129 that is the encoding is stored intact. There is also a new type
130 "V_ASN1_OTHER" which is used when the class is not universal, in this
131 case we have no idea what the actual type is so we just lump them all
132 together.
133 [Steve Henson]
134
645749ef
RL
135 *) On VMS, stdout may very well lead to a file that is written to
136 in a record-oriented fashion. That means that every write() will
137 write a separate record, which will be read separately by the
138 programs trying to read from it. This can be very confusing.
139
140 The solution is to put a BIO filter in the way that will buffer
141 text until a linefeed is reached, and then write everything a
142 line at a time, so every record written will be an actual line,
143 not chunks of lines and not (usually doesn't happen, but I've
144 seen it once) several lines in one record. BIO_f_linebuffer() is
145 the answer.
146
147 Currently, it's a VMS-only method, because that's where it has
148 been tested well enough.
149 [Richard Levitte]
150
fe035197 151 *) Remove 'optimized' squaring variant in BN_mod_mul_montgomery,
a45bd295 152 it can return incorrect results.
cb1fbf8e
BM
153 (Note: The buggy variant was not enabled in OpenSSL 0.9.5a,
154 but it was in 0.9.6-beta[12].)
a45bd295
BM
155 [Bodo Moeller]
156
730e37ed
DSH
157 *) Disable the check for content being present when verifying detached
158 signatures in pk7_smime.c. Some versions of Netscape (wrongly)
159 include zero length content when signing messages.
160 [Steve Henson]
161
07fcf422
BM
162 *) New BIO_shutdown_wr macro, which invokes the BIO_C_SHUTDOWN_WR
163 BIO_ctrl (for BIO pairs).
d49da3aa 164