]> git.ipfire.org Git - thirdparty/openssl.git/blame - CHANGES
Set values to NULL after freeing them.
[thirdparty/openssl.git] / CHANGES
CommitLineData
81a6c781 1
f1c236f8 2 OpenSSL CHANGES
651d0aff
RE
3 _______________
4
7b3a9b00 5 Changes between 1.0.1 and 1.1.0 [xx XXX xxxx]
aaf35f11 6
bdaa5415
DSH
7 *) Initial, experimental EVP support for AES-GCM. AAD can be input by
8 setting output buffer to NULL. The *Final function must be
9 called although it will not retrieve any additional data. The tag
10 can be set or retrieved with a ctrl. The IV length is by default 12
11 bytes (96 bits) but can be set to an alternative value. If the IV
12 length exceeds the maximum IV length (currently 16 bytes) it cannot be
13 set before the key.
14 [Steve Henson]
15
3da0ca79
DSH
16 *) New flag in ciphers: EVP_CIPH_FLAG_CUSTOM_CIPHER. This means the
17 underlying do_cipher function handles all cipher semantics itself
18 including padding and finalisation. This is useful if (for example)
19 an ENGINE cipher handles block padding itself. The behaviour of
20 do_cipher is subtly changed if this flag is set: the return value
21 is the number of characters written to the output buffer (zero is
22 no longer an error code) or a negative error code. Also if the
d45087c6 23 input buffer is NULL and length 0 finalisation should be performed.
3da0ca79
DSH
24 [Steve Henson]
25
2b3936e8
DSH
26 *) If a candidate issuer certificate is already part of the constructed
27 path ignore it: new debug notification X509_V_ERR_PATH_LOOP for this case.
28 [Steve Henson]
29
7c2d4fee
BM
30 *) Improve forward-security support: add functions
31
32 void SSL_CTX_set_not_resumable_session_callback(SSL_CTX *ctx, int (*cb)(SSL *ssl, int is_forward_secure))
33 void SSL_set_not_resumable_session_callback(SSL *ssl, int (*cb)(SSL *ssl, int is_forward_secure))
34
35 for use by SSL/TLS servers; the callback function will be called whenever a
36 new session is created, and gets to decide whether the session may be
37 cached to make it resumable (return 0) or not (return 1). (As by the
38 SSL/TLS protocol specifications, the session_id sent by the server will be
39 empty to indicate that the session is not resumable; also, the server will
40 not generate RFC 4507 (RFC 5077) session tickets.)
41
42 A simple reasonable callback implementation is to return is_forward_secure.
43 This parameter will be set to 1 or 0 depending on the ciphersuite selected
44 by the SSL/TLS server library, indicating whether it can provide forward
45 security.
46