Fix multiple cosmetic typos.
This commit is contained in:
parent
e0f7cfda68
commit
3d7bf77f61
104
CHANGES
104
CHANGES
@ -31,7 +31,7 @@
|
|||||||
[Steve Henson]
|
[Steve Henson]
|
||||||
|
|
||||||
*) Integrate hostname, email address and IP address checking with certificate
|
*) Integrate hostname, email address and IP address checking with certificate
|
||||||
verification. New verify options supporting checking in opensl utility.
|
verification. New verify options supporting checking in openssl utility.
|
||||||
[Steve Henson]
|
[Steve Henson]
|
||||||
|
|
||||||
*) New function X509_CRL_diff to generate a delta CRL from the difference
|
*) New function X509_CRL_diff to generate a delta CRL from the difference
|
||||||
@ -111,9 +111,9 @@
|
|||||||
|
|
||||||
*) Add support for certificate stores in CERT structure. This makes it
|
*) Add support for certificate stores in CERT structure. This makes it
|
||||||
possible to have different stores per SSL structure or one store in
|
possible to have different stores per SSL structure or one store in
|
||||||
the parent SSL_CTX. Include distint stores for certificate chain
|
the parent SSL_CTX. Include distinct stores for certificate chain
|
||||||
verification and chain building. New ctrl SSL_CTRL_BUILD_CERT_CHAIN
|
verification and chain building. New ctrl SSL_CTRL_BUILD_CERT_CHAIN
|
||||||
to build and store a certificate chain in CERT structure: returing
|
to build and store a certificate chain in CERT structure: returning
|
||||||
an error if the chain cannot be built: this will allow applications
|
an error if the chain cannot be built: this will allow applications
|
||||||
to test if a chain is correctly configured.
|
to test if a chain is correctly configured.
|
||||||
|
|
||||||
@ -235,16 +235,16 @@
|
|||||||
[Steve Henson]
|
[Steve Henson]
|
||||||
|
|
||||||
*) Add functions FIPS_module_version() and FIPS_module_version_text()
|
*) Add functions FIPS_module_version() and FIPS_module_version_text()
|
||||||
to return numberical and string versions of the FIPS module number.
|
to return numerical and string versions of the FIPS module number.
|
||||||
[Steve Henson]
|
[Steve Henson]
|
||||||
|
|
||||||
*) Rename FIPS_mode_set and FIPS_mode to FIPS_module_mode_set and
|
*) Rename FIPS_mode_set and FIPS_mode to FIPS_module_mode_set and
|
||||||
FIPS_module_mode. FIPS_mode and FIPS_mode_set will be implmeneted
|
FIPS_module_mode. FIPS_mode and FIPS_mode_set will be implemented
|
||||||
outside the validated module in the FIPS capable OpenSSL.
|
outside the validated module in the FIPS capable OpenSSL.
|
||||||
[Steve Henson]
|
[Steve Henson]
|
||||||
|
|
||||||
*) Minor change to DRBG entropy callback semantics. In some cases
|
*) Minor change to DRBG entropy callback semantics. In some cases
|
||||||
there is no mutiple of the block length between min_len and
|
there is no multiple of the block length between min_len and
|
||||||
max_len. Allow the callback to return more than max_len bytes
|
max_len. Allow the callback to return more than max_len bytes
|
||||||
of entropy but discard any extra: it is the callback's responsibility
|
of entropy but discard any extra: it is the callback's responsibility
|
||||||
to ensure that the extra data discarded does not impact the
|
to ensure that the extra data discarded does not impact the
|
||||||
@ -446,7 +446,7 @@
|
|||||||
When in FIPS mode the approved implementations are used as normal,
|
When in FIPS mode the approved implementations are used as normal,
|
||||||
when not in FIPS mode the internal unapproved versions are used instead.
|
when not in FIPS mode the internal unapproved versions are used instead.
|
||||||
This means that the FIPS capable OpenSSL isn't forced to use the
|
This means that the FIPS capable OpenSSL isn't forced to use the
|
||||||
(often lower perfomance) FIPS implementations outside FIPS mode.
|
(often lower performance) FIPS implementations outside FIPS mode.
|
||||||
[Steve Henson]
|
[Steve Henson]
|
||||||
|
|
||||||
*) Transparently support X9.42 DH parameters when calling
|
*) Transparently support X9.42 DH parameters when calling
|
||||||
@ -529,7 +529,7 @@
|
|||||||
*) OpenSSL 1.0.0 sets SSL_OP_ALL to 0x80000FFFL and OpenSSL 1.0.1 and
|
*) OpenSSL 1.0.0 sets SSL_OP_ALL to 0x80000FFFL and OpenSSL 1.0.1 and
|
||||||
1.0.1a set SSL_OP_NO_TLSv1_1 to 0x00000400L which would unfortunately
|
1.0.1a set SSL_OP_NO_TLSv1_1 to 0x00000400L which would unfortunately
|
||||||
mean any application compiled against OpenSSL 1.0.0 headers setting
|
mean any application compiled against OpenSSL 1.0.0 headers setting
|
||||||
SSL_OP_ALL would also set SSL_OP_NO_TLSv1_1, unintentionally disablng
|
SSL_OP_ALL would also set SSL_OP_NO_TLSv1_1, unintentionally disabling
|
||||||
TLS 1.1 also. Fix this by changing the value of SSL_OP_NO_TLSv1_1 to
|
TLS 1.1 also. Fix this by changing the value of SSL_OP_NO_TLSv1_1 to
|
||||||
0x10000000L Any application which was previously compiled against
|
0x10000000L Any application which was previously compiled against
|
||||||
OpenSSL 1.0.1 or 1.0.1a headers and which cares about SSL_OP_NO_TLSv1_1
|
OpenSSL 1.0.1 or 1.0.1a headers and which cares about SSL_OP_NO_TLSv1_1
|
||||||
@ -538,7 +538,7 @@
|
|||||||
in unlike event, limit maximum offered version to TLS 1.0 [see below].
|
in unlike event, limit maximum offered version to TLS 1.0 [see below].
|
||||||
[Steve Henson]
|
[Steve Henson]
|
||||||
|
|
||||||
*) In order to ensure interoperabilty SSL_OP_NO_protocolX does not
|
*) In order to ensure interoperability SSL_OP_NO_protocolX does not
|
||||||
disable just protocol X, but all protocols above X *if* there are
|
disable just protocol X, but all protocols above X *if* there are
|
||||||
protocols *below* X still enabled. In more practical terms it means
|
protocols *below* X still enabled. In more practical terms it means
|
||||||
that if application wants to disable TLS1.0 in favor of TLS1.1 and
|
that if application wants to disable TLS1.0 in favor of TLS1.1 and
|
||||||
@ -593,7 +593,7 @@
|
|||||||
|
|
||||||
*) Some servers which support TLS 1.0 can choke if we initially indicate
|
*) Some servers which support TLS 1.0 can choke if we initially indicate
|
||||||
support for TLS 1.2 and later renegotiate using TLS 1.0 in the RSA
|
support for TLS 1.2 and later renegotiate using TLS 1.0 in the RSA
|
||||||
encrypted premaster secret. As a workaround use the maximum pemitted
|
encrypted premaster secret. As a workaround use the maximum permitted
|
||||||
client version in client hello, this should keep such servers happy
|
client version in client hello, this should keep such servers happy
|
||||||
and still work with previous versions of OpenSSL.
|
and still work with previous versions of OpenSSL.
|
||||||
[Steve Henson]
|
[Steve Henson]
|
||||||
@ -723,7 +723,7 @@
|
|||||||
*) Add GCM support to TLS library. Some custom code is needed to split
|
*) Add GCM support to TLS library. Some custom code is needed to split
|
||||||
the IV between the fixed (from PRF) and explicit (from TLS record)
|
the IV between the fixed (from PRF) and explicit (from TLS record)
|
||||||
portions. This adds all GCM ciphersuites supported by RFC5288 and
|
portions. This adds all GCM ciphersuites supported by RFC5288 and
|
||||||
RFC5289. Generalise some AES* cipherstrings to inlclude GCM and
|
RFC5289. Generalise some AES* cipherstrings to include GCM and
|
||||||
add a special AESGCM string for GCM only.
|
add a special AESGCM string for GCM only.
|
||||||
[Steve Henson]
|
[Steve Henson]
|
||||||
|
|
||||||
@ -737,9 +737,9 @@
|
|||||||
[Steve Henson]
|
[Steve Henson]
|
||||||
|
|
||||||
*) For FIPS capable OpenSSL interpret a NULL default public key method
|
*) For FIPS capable OpenSSL interpret a NULL default public key method
|
||||||
as unset and return the appopriate default but do *not* set the default.
|
as unset and return the appropriate default but do *not* set the default.
|
||||||
This means we can return the appopriate method in applications that
|
This means we can return the appropriate method in applications that
|
||||||
swicth between FIPS and non-FIPS modes.
|
switch between FIPS and non-FIPS modes.
|
||||||
[Steve Henson]
|
[Steve Henson]
|
||||||
|
|
||||||
*) Redirect HMAC and CMAC operations to FIPS module in FIPS mode. If an
|
*) Redirect HMAC and CMAC operations to FIPS module in FIPS mode. If an
|
||||||
@ -1416,7 +1416,7 @@
|
|||||||
most recently disabled ciphersuites when "HIGH" is parsed).
|
most recently disabled ciphersuites when "HIGH" is parsed).
|
||||||
|
|
||||||
Also, change ssl_create_cipher_list() (using this new
|
Also, change ssl_create_cipher_list() (using this new
|
||||||
funcionality) such that between otherwise identical
|
functionality) such that between otherwise identical
|
||||||
cihpersuites, ephemeral ECDH is preferred over ephemeral DH in
|
cihpersuites, ephemeral ECDH is preferred over ephemeral DH in
|
||||||
the default order.
|
the default order.
|
||||||
[Bodo Moeller]
|
[Bodo Moeller]
|
||||||
@ -1596,7 +1596,7 @@
|
|||||||
functional reference processing.
|
functional reference processing.
|
||||||
[Steve Henson]
|
[Steve Henson]
|
||||||
|
|
||||||
*) New functions EVP_Digest{Sign,Verify)*. These are enchance versions of
|
*) New functions EVP_Digest{Sign,Verify)*. These are enhance versions of
|
||||||
EVP_{Sign,Verify}* which allow an application to customise the signature
|
EVP_{Sign,Verify}* which allow an application to customise the signature
|
||||||
process.
|
process.
|
||||||
[Steve Henson]
|
[Steve Henson]
|
||||||
@ -1636,7 +1636,7 @@
|
|||||||
*) Add a ctrl to asn1 method to allow a public key algorithm to express
|
*) Add a ctrl to asn1 method to allow a public key algorithm to express
|
||||||
a default digest type to use. In most cases this will be SHA1 but some
|
a default digest type to use. In most cases this will be SHA1 but some
|
||||||
algorithms (such as GOST) need to specify an alternative digest. The
|
algorithms (such as GOST) need to specify an alternative digest. The
|
||||||
return value indicates how strong the prefernce is 1 means optional and
|
return value indicates how strong the preference is 1 means optional and
|
||||||
2 is mandatory (that is it is the only supported type). Modify
|
2 is mandatory (that is it is the only supported type). Modify
|
||||||
ASN1_item_sign() to accept a NULL digest argument to indicate it should
|
ASN1_item_sign() to accept a NULL digest argument to indicate it should
|
||||||
use the default md. Update openssl utilities to use the default digest
|
use the default md. Update openssl utilities to use the default digest
|
||||||
@ -1681,7 +1681,7 @@
|
|||||||
manual pages.
|
manual pages.
|
||||||
[Oliver Tappe <zooey@hirschkaefer.de>]
|
[Oliver Tappe <zooey@hirschkaefer.de>]
|
||||||
|
|
||||||
*) New utility "genpkey" this is analagous to "genrsa" etc except it can
|
*) New utility "genpkey" this is analogous to "genrsa" etc except it can
|
||||||
generate keys for any algorithm. Extend and update EVP_PKEY_METHOD to
|
generate keys for any algorithm. Extend and update EVP_PKEY_METHOD to
|
||||||
support key and parameter generation and add initial key generation
|
support key and parameter generation and add initial key generation
|
||||||
functionality for RSA.
|
functionality for RSA.
|
||||||
@ -1958,7 +1958,7 @@
|
|||||||
*) Fix for double free bug in ssl/s3_clnt.c CVE-2010-2939
|
*) Fix for double free bug in ssl/s3_clnt.c CVE-2010-2939
|
||||||
[Steve Henson]
|
[Steve Henson]
|
||||||
|
|
||||||
*) Don't reencode certificate when calculating signature: cache and use
|
*) Don't re-encode certificate when calculating signature: cache and use
|
||||||
the original encoding instead. This makes signature verification of
|
the original encoding instead. This makes signature verification of
|
||||||
some broken encodings work correctly.
|
some broken encodings work correctly.
|
||||||
[Steve Henson]
|
[Steve Henson]
|
||||||
@ -2318,16 +2318,16 @@
|
|||||||
This work was sponsored by Logica.
|
This work was sponsored by Logica.
|
||||||
[Steve Henson]
|
[Steve Henson]
|
||||||
|
|
||||||
*) Fix bug in X509_ATTRIBUTE creation: dont set attribute using
|
*) Fix bug in X509_ATTRIBUTE creation: don't set attribute using
|
||||||
ASN1_TYPE_set1 if MBSTRING flag set. This bug would crash certain
|
ASN1_TYPE_set1 if MBSTRING flag set. This bug would crash certain
|
||||||
attribute creation routines such as certifcate requests and PKCS#12
|
attribute creation routines such as certificate requests and PKCS#12
|
||||||
files.
|
files.
|
||||||
[Steve Henson]
|
[Steve Henson]
|
||||||
|
|
||||||
Changes between 0.9.8g and 0.9.8h [28 May 2008]
|
Changes between 0.9.8g and 0.9.8h [28 May 2008]
|
||||||
|
|
||||||
*) Fix flaw if 'Server Key exchange message' is omitted from a TLS
|
*) Fix flaw if 'Server Key exchange message' is omitted from a TLS
|
||||||
handshake which could lead to a cilent crash as found using the
|
handshake which could lead to a client crash as found using the
|
||||||
Codenomicon TLS test suite (CVE-2008-1672)
|
Codenomicon TLS test suite (CVE-2008-1672)
|
||||||
[Steve Henson, Mark Cox]
|
[Steve Henson, Mark Cox]
|
||||||
|
|
||||||
@ -2395,7 +2395,7 @@
|
|||||||
[Ian Lister (tweaked by Geoff Thorpe)]
|
[Ian Lister (tweaked by Geoff Thorpe)]
|
||||||
|
|
||||||
*) Backport of CMS code to OpenSSL 0.9.8. This differs from the 0.9.9
|
*) Backport of CMS code to OpenSSL 0.9.8. This differs from the 0.9.9
|
||||||
implemention in the following ways:
|
implementation in the following ways:
|
||||||
|
|
||||||
Lack of EVP_PKEY_ASN1_METHOD means algorithm parameters have to be
|
Lack of EVP_PKEY_ASN1_METHOD means algorithm parameters have to be
|
||||||
hard coded.
|
hard coded.
|
||||||
@ -2745,7 +2745,7 @@
|
|||||||
unofficial, and the ID has long expired.
|
unofficial, and the ID has long expired.
|
||||||
[Bodo Moeller]
|
[Bodo Moeller]
|
||||||
|
|
||||||
*) Fix RSA blinding Heisenbug (problems sometimes occured on
|
*) Fix RSA blinding Heisenbug (problems sometimes occurred on
|
||||||
dual-core machines) and other potential thread-safety issues.
|
dual-core machines) and other potential thread-safety issues.
|
||||||
[Bodo Moeller]
|
[Bodo Moeller]
|
||||||
|
|
||||||
@ -2761,7 +2761,7 @@
|
|||||||
|
|
||||||
*) Disable the padding bug check when compression is in use. The padding
|
*) Disable the padding bug check when compression is in use. The padding
|
||||||
bug check assumes the first packet is of even length, this is not
|
bug check assumes the first packet is of even length, this is not
|
||||||
necessarily true if compresssion is enabled and can result in false
|
necessarily true if compression is enabled and can result in false
|
||||||
positives causing handshake failure. The actual bug test is ancient
|
positives causing handshake failure. The actual bug test is ancient
|
||||||
code so it is hoped that implementations will either have fixed it by
|
code so it is hoped that implementations will either have fixed it by
|
||||||
now or any which still have the bug do not support compression.
|
now or any which still have the bug do not support compression.
|
||||||
@ -2900,7 +2900,7 @@
|
|||||||
to SSL_CTX_use_PrivateKey_file() and SSL_use_PrivateKey_file()
|
to SSL_CTX_use_PrivateKey_file() and SSL_use_PrivateKey_file()
|
||||||
[Walter Goulet]
|
[Walter Goulet]
|
||||||
|
|
||||||
*) Remove buggy and incompletet DH cert support from
|
*) Remove buggy and incomplete DH certificate support from
|
||||||
ssl/ssl_rsa.c and ssl/s3_both.c
|
ssl/ssl_rsa.c and ssl/s3_both.c
|
||||||
[Nils Larsch]
|
[Nils Larsch]
|
||||||
|
|
||||||
@ -2990,7 +2990,7 @@
|
|||||||
we can fix the problem directly in the 'ca' utility.)
|
we can fix the problem directly in the 'ca' utility.)
|
||||||
[Steve Henson]
|
[Steve Henson]
|
||||||
|
|
||||||
*) Reduced header interdepencies by declaring more opaque objects in
|
*) Reduced header interdependencies by declaring more opaque objects in
|
||||||
ossl_typ.h. As a consequence, including some headers (eg. engine.h) will
|
ossl_typ.h. As a consequence, including some headers (eg. engine.h) will
|
||||||
give fewer recursive includes, which could break lazy source code - so
|
give fewer recursive includes, which could break lazy source code - so
|
||||||
this change is covered by the OPENSSL_NO_DEPRECATED symbol. As always,
|
this change is covered by the OPENSSL_NO_DEPRECATED symbol. As always,
|
||||||
@ -3114,7 +3114,7 @@
|
|||||||
[Geoff Thorpe]
|
[Geoff Thorpe]
|
||||||
|
|
||||||
*) Reorganise PKCS#7 code to separate the digest location functionality
|
*) Reorganise PKCS#7 code to separate the digest location functionality
|
||||||
into PKCS7_find_digest(), digest addtion into PKCS7_bio_add_digest().
|
into PKCS7_find_digest(), digest addition into PKCS7_bio_add_digest().
|
||||||
New function PKCS7_set_digest() to set the digest type for PKCS#7
|
New function PKCS7_set_digest() to set the digest type for PKCS#7
|
||||||
digestedData type. Add additional code to correctly generate the
|
digestedData type. Add additional code to correctly generate the
|
||||||
digestedData type and add support for this type in PKCS7 initialization
|
digestedData type and add support for this type in PKCS7 initialization
|
||||||
@ -3297,7 +3297,7 @@
|
|||||||
*) Key-generation can now be implemented in RSA_METHOD, DSA_METHOD
|
*) Key-generation can now be implemented in RSA_METHOD, DSA_METHOD
|
||||||
and DH_METHOD (eg. by ENGINE implementations) to override the normal
|
and DH_METHOD (eg. by ENGINE implementations) to override the normal
|
||||||
software implementations. For DSA and DH, parameter generation can
|
software implementations. For DSA and DH, parameter generation can
|
||||||
also be overriden by providing the appropriate method callbacks.
|
also be overridden by providing the appropriate method callbacks.
|
||||||
[Geoff Thorpe]
|
[Geoff Thorpe]
|
||||||
|
|
||||||
*) Change the "progress" mechanism used in key-generation and
|
*) Change the "progress" mechanism used in key-generation and
|
||||||
@ -3380,13 +3380,13 @@
|
|||||||
the "shared" options was given to ./Configure or ./config.
|
the "shared" options was given to ./Configure or ./config.
|
||||||
Otherwise, they are inserted in libcrypto.a.
|
Otherwise, they are inserted in libcrypto.a.
|
||||||
/usr/local/ssl/engines is the default directory for dynamic
|
/usr/local/ssl/engines is the default directory for dynamic
|
||||||
engines, but that can be overriden at configure time through
|
engines, but that can be overridden at configure time through
|
||||||
the usual use of --prefix and/or --openssldir, and at run
|
the usual use of --prefix and/or --openssldir, and at run
|
||||||
time with the environment variable OPENSSL_ENGINES.
|
time with the environment variable OPENSSL_ENGINES.
|
||||||
[Geoff Thorpe and Richard Levitte]
|
[Geoff Thorpe and Richard Levitte]
|
||||||
|
|
||||||
*) Add Makefile.shared, a helper makefile to build shared
|
*) Add Makefile.shared, a helper makefile to build shared
|
||||||
libraries. Addapt Makefile.org.
|
libraries. Adapt Makefile.org.
|
||||||
[Richard Levitte]
|
[Richard Levitte]
|
||||||
|
|
||||||
*) Add version info to Win32 DLLs.
|
*) Add version info to Win32 DLLs.
|
||||||
@ -3760,7 +3760,7 @@
|
|||||||
unofficial, and the ID has long expired.
|
unofficial, and the ID has long expired.
|
||||||
[Bodo Moeller]
|
[Bodo Moeller]
|
||||||
|
|
||||||
*) Fix RSA blinding Heisenbug (problems sometimes occured on
|
*) Fix RSA blinding Heisenbug (problems sometimes occurred on
|
||||||
dual-core machines) and other potential thread-safety issues.
|
dual-core machines) and other potential thread-safety issues.
|
||||||
[Bodo Moeller]
|
[Bodo Moeller]
|
||||||
|
|
||||||
@ -3774,7 +3774,7 @@
|
|||||||
[Steve Henson]
|
[Steve Henson]
|
||||||
|
|
||||||
*) Add new Windows build target VC-32-GMAKE for VC++. This uses GNU make
|
*) Add new Windows build target VC-32-GMAKE for VC++. This uses GNU make
|
||||||
from a Windows bash shell such as MSYS. It is autodetected from the
|
from a Windows bash shell such as MSYS. It is auto-detected from the
|
||||||
"config" script when run from a VC++ environment. Modify standard VC++
|
"config" script when run from a VC++ environment. Modify standard VC++
|
||||||
build to use fipscanister.o from the GNU make build.
|
build to use fipscanister.o from the GNU make build.
|
||||||
[Steve Henson]
|
[Steve Henson]
|
||||||
@ -3915,7 +3915,7 @@
|
|||||||
[Steve Henson]
|
[Steve Henson]
|
||||||
|
|
||||||
*) Perform some character comparisons of different types in X509_NAME_cmp:
|
*) Perform some character comparisons of different types in X509_NAME_cmp:
|
||||||
this is needed for some certificates that reencode DNs into UTF8Strings
|
this is needed for some certificates that re-encode DNs into UTF8Strings
|
||||||
(in violation of RFC3280) and can't or wont issue name rollover
|
(in violation of RFC3280) and can't or wont issue name rollover
|
||||||
certificates.
|
certificates.
|
||||||
[Steve Henson]
|
[Steve Henson]
|
||||||
@ -4090,7 +4090,7 @@
|
|||||||
Changes between 0.9.7 and 0.9.7a [19 Feb 2003]
|
Changes between 0.9.7 and 0.9.7a [19 Feb 2003]
|
||||||
|
|
||||||
*) In ssl3_get_record (ssl/s3_pkt.c), minimize information leaked
|
*) In ssl3_get_record (ssl/s3_pkt.c), minimize information leaked
|
||||||
via timing by performing a MAC computation even if incorrrect
|
via timing by performing a MAC computation even if incorrect
|
||||||
block cipher padding has been found. This is a countermeasure
|
block cipher padding has been found. This is a countermeasure
|
||||||
against active attacks where the attacker has to distinguish
|
against active attacks where the attacker has to distinguish
|
||||||
between bad padding and a MAC verification error. (CVE-2003-0078)
|
between bad padding and a MAC verification error. (CVE-2003-0078)
|
||||||
@ -4352,7 +4352,7 @@
|
|||||||
done
|
done
|
||||||
|
|
||||||
To be absolutely sure not to disturb the source tree, a "make clean"
|
To be absolutely sure not to disturb the source tree, a "make clean"
|
||||||
is a good thing. If it isn't successfull, don't worry about it,
|
is a good thing. If it isn't successful, don't worry about it,
|
||||||
it probably means the source directory is very clean.
|
it probably means the source directory is very clean.
|
||||||
[Richard Levitte]
|
[Richard Levitte]
|
||||||
|
|
||||||
@ -4448,7 +4448,7 @@
|
|||||||
[Steve Henson]
|
[Steve Henson]
|
||||||
|
|
||||||
*) Move default behaviour from OPENSSL_config(). If appname is NULL
|
*) Move default behaviour from OPENSSL_config(). If appname is NULL
|
||||||
use "openssl_conf" if filename is NULL use default openssl config file.
|
use "openssl_conf". If filename is NULL use default openssl config file.
|
||||||
[Steve Henson]
|
[Steve Henson]
|
||||||
|
|
||||||
*) Add an argument to OPENSSL_config() to allow the use of an alternative
|
*) Add an argument to OPENSSL_config() to allow the use of an alternative
|
||||||
@ -4657,7 +4657,7 @@
|
|||||||
*) Major restructuring to the underlying ENGINE code. This includes
|
*) Major restructuring to the underlying ENGINE code. This includes
|
||||||
reduction of linker bloat, separation of pure "ENGINE" manipulation
|
reduction of linker bloat, separation of pure "ENGINE" manipulation
|
||||||
(initialisation, etc) from functionality dealing with implementations
|
(initialisation, etc) from functionality dealing with implementations
|
||||||
of specific crypto iterfaces. This change also introduces integrated
|
of specific crypto interfaces. This change also introduces integrated
|
||||||
support for symmetric ciphers and digest implementations - so ENGINEs
|
support for symmetric ciphers and digest implementations - so ENGINEs
|
||||||
can now accelerate these by providing EVP_CIPHER and EVP_MD
|
can now accelerate these by providing EVP_CIPHER and EVP_MD
|
||||||
implementations of their own. This is detailed in crypto/engine/README
|
implementations of their own. This is detailed in crypto/engine/README
|
||||||
@ -4686,7 +4686,7 @@
|
|||||||
|
|
||||||
*) New function SSL_renegotiate_pending(). This returns true once
|
*) New function SSL_renegotiate_pending(). This returns true once
|
||||||
renegotiation has been requested (either SSL_renegotiate() call
|
renegotiation has been requested (either SSL_renegotiate() call
|
||||||
or HelloRequest/ClientHello receveived from the peer) and becomes
|
or HelloRequest/ClientHello received from the peer) and becomes
|
||||||
false once a handshake has been completed.
|
false once a handshake has been completed.
|
||||||
(For servers, SSL_renegotiate() followed by SSL_do_handshake()
|
(For servers, SSL_renegotiate() followed by SSL_do_handshake()
|
||||||
sends a HelloRequest, but does not ensure that a handshake takes
|
sends a HelloRequest, but does not ensure that a handshake takes
|
||||||
@ -5099,7 +5099,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
|
|||||||
missing functions (including a catch-all ENGINE_cpy that duplicates
|
missing functions (including a catch-all ENGINE_cpy that duplicates
|
||||||
all ENGINE values onto a new ENGINE except reference counts/state).
|
all ENGINE values onto a new ENGINE except reference counts/state).
|
||||||
- Removed NULL parameter checks in get/set functions. Setting a method
|
- Removed NULL parameter checks in get/set functions. Setting a method
|
||||||
or function to NULL is a way of cancelling out a previously set
|
or function to NULL is a way of canceling out a previously set
|
||||||
value. Passing a NULL ENGINE parameter is just plain stupid anyway
|
value. Passing a NULL ENGINE parameter is just plain stupid anyway
|
||||||
and doesn't justify the extra error symbols and code.
|
and doesn't justify the extra error symbols and code.
|
||||||
- Deprecate the ENGINE_FLAGS_MALLOCED define and move the area for
|
- Deprecate the ENGINE_FLAGS_MALLOCED define and move the area for
|
||||||
@ -5661,7 +5661,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
|
|||||||
[Steve Henson]
|
[Steve Henson]
|
||||||
|
|
||||||
*) Enhance mkdef.pl to be more accepting about spacing in C preprocessor
|
*) Enhance mkdef.pl to be more accepting about spacing in C preprocessor
|
||||||
lines, recognice more "algorithms" that can be deselected, and make
|
lines, recognise more "algorithms" that can be deselected, and make
|
||||||
it complain about algorithm deselection that isn't recognised.
|
it complain about algorithm deselection that isn't recognised.
|
||||||
[Richard Levitte]
|
[Richard Levitte]
|
||||||
|
|
||||||
@ -5679,7 +5679,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
|
|||||||
*) New function X509V3_add1_i2d(). This automatically encodes and
|
*) New function X509V3_add1_i2d(). This automatically encodes and
|
||||||
adds an extension. Its behaviour can be customised with various
|
adds an extension. Its behaviour can be customised with various
|
||||||
flags to append, replace or delete. Various wrappers added for
|
flags to append, replace or delete. Various wrappers added for
|
||||||
certifcates and CRLs.
|
certificates and CRLs.
|
||||||
[Steve Henson]
|
[Steve Henson]
|
||||||
|
|
||||||
*) Fix to avoid calling the underlying ASN1 print routine when
|
*) Fix to avoid calling the underlying ASN1 print routine when
|
||||||
@ -5687,7 +5687,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
|
|||||||
OCSP_SERVICELOC extension. Tidy up print OCSP format.
|
OCSP_SERVICELOC extension. Tidy up print OCSP format.
|
||||||
[Steve Henson]
|
[Steve Henson]
|
||||||
|
|
||||||
*) Make mkdef.pl parse some of the ASN1 macros and add apropriate
|
*) Make mkdef.pl parse some of the ASN1 macros and add appropriate
|
||||||
entries for variables.
|
entries for variables.
|
||||||
[Steve Henson]
|
[Steve Henson]
|
||||||
|
|
||||||
@ -6059,7 +6059,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
|
|||||||
Changes between 0.9.6h and 0.9.6i [19 Feb 2003]
|
Changes between 0.9.6h and 0.9.6i [19 Feb 2003]
|
||||||
|
|
||||||
*) In ssl3_get_record (ssl/s3_pkt.c), minimize information leaked
|
*) In ssl3_get_record (ssl/s3_pkt.c), minimize information leaked
|
||||||
via timing by performing a MAC computation even if incorrrect
|
via timing by performing a MAC computation even if incorrect
|
||||||
block cipher padding has been found. This is a countermeasure
|
block cipher padding has been found. This is a countermeasure
|
||||||
against active attacks where the attacker has to distinguish
|
against active attacks where the attacker has to distinguish
|
||||||
between bad padding and a MAC verification error. (CVE-2003-0078)
|
between bad padding and a MAC verification error. (CVE-2003-0078)
|
||||||
@ -6224,7 +6224,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
|
|||||||
[Nils Larsch <nla@trustcenter.de>]
|
[Nils Larsch <nla@trustcenter.de>]
|
||||||
|
|
||||||
*) Fix BASE64 decode (EVP_DecodeUpdate) for data with CR/LF ended lines:
|
*) Fix BASE64 decode (EVP_DecodeUpdate) for data with CR/LF ended lines:
|
||||||
an end-of-file condition would erronously be flagged, when the CRLF
|
an end-of-file condition would erroneously be flagged, when the CRLF
|
||||||
was just at the end of a processed block. The bug was discovered when
|
was just at the end of a processed block. The bug was discovered when
|
||||||
processing data through a buffering memory BIO handing the data to a
|
processing data through a buffering memory BIO handing the data to a
|
||||||
BASE64-decoding BIO. Bug fund and patch submitted by Pavel Tsekov
|
BASE64-decoding BIO. Bug fund and patch submitted by Pavel Tsekov
|
||||||
@ -6431,7 +6431,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
|
|||||||
[Bodo Moeller; bug noticed by Andy Schneider <andy.schneider@bjss.co.uk>]
|
[Bodo Moeller; bug noticed by Andy Schneider <andy.schneider@bjss.co.uk>]
|
||||||
|
|
||||||
*) Bugfix in ssl3_accept (ssl/s3_srvr.c): Case SSL3_ST_SW_HELLO_REQ_C
|
*) Bugfix in ssl3_accept (ssl/s3_srvr.c): Case SSL3_ST_SW_HELLO_REQ_C
|
||||||
should end in 'break', not 'goto end' which circuments various
|
should end in 'break', not 'goto end' which circumvents various
|
||||||
cleanups done in state SSL_ST_OK. But session related stuff
|
cleanups done in state SSL_ST_OK. But session related stuff
|
||||||
must be disabled for SSL_ST_OK in the case that we just sent a
|
must be disabled for SSL_ST_OK in the case that we just sent a
|
||||||
HelloRequest.
|
HelloRequest.
|
||||||
@ -7408,7 +7408,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
|
|||||||
*) When some versions of IIS use the 'NET' form of private key the
|
*) When some versions of IIS use the 'NET' form of private key the
|
||||||
key derivation algorithm is different. Normally MD5(password) is
|
key derivation algorithm is different. Normally MD5(password) is
|
||||||
used as a 128 bit RC4 key. In the modified case
|
used as a 128 bit RC4 key. In the modified case
|
||||||
MD5(MD5(password) + "SGCKEYSALT") is used insted. Added some
|
MD5(MD5(password) + "SGCKEYSALT") is used instead. Added some
|
||||||
new functions i2d_RSA_NET(), d2i_RSA_NET() etc which are the same
|
new functions i2d_RSA_NET(), d2i_RSA_NET() etc which are the same
|
||||||
as the old Netscape_RSA functions except they have an additional
|
as the old Netscape_RSA functions except they have an additional
|
||||||
'sgckey' parameter which uses the modified algorithm. Also added
|
'sgckey' parameter which uses the modified algorithm. Also added
|
||||||
@ -7696,8 +7696,8 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
|
|||||||
its own key.
|
its own key.
|
||||||
ssl_cert_dup, which is used by SSL_new, now copies DH keys in addition
|
ssl_cert_dup, which is used by SSL_new, now copies DH keys in addition
|
||||||
to parameters -- in previous versions (since OpenSSL 0.9.3) the
|
to parameters -- in previous versions (since OpenSSL 0.9.3) the
|
||||||
'default key' from SSL_CTX_set_tmp_dh would always be lost, meanining
|
'default key' from SSL_CTX_set_tmp_dh would always be lost, meanings
|
||||||
you effectivly got SSL_OP_SINGLE_DH_USE when using this macro.
|
you effectively got SSL_OP_SINGLE_DH_USE when using this macro.
|
||||||
[Bodo Moeller]
|
[Bodo Moeller]
|
||||||
|
|
||||||
*) New s_client option -ign_eof: EOF at stdin is ignored, and
|
*) New s_client option -ign_eof: EOF at stdin is ignored, and
|
||||||
@ -7724,7 +7724,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
|
|||||||
|
|
||||||
*) In util/mkerr.pl (which implements 'make errors'), preserve
|
*) In util/mkerr.pl (which implements 'make errors'), preserve
|
||||||
reason strings from the previous version of the .c file, as
|
reason strings from the previous version of the .c file, as
|
||||||
the default to have only downcase letters (and digits) in
|
the default to have only lowercase letters (and digits) in
|
||||||
automatically generated reasons codes is not always appropriate.
|
automatically generated reasons codes is not always appropriate.
|
||||||
[Bodo Moeller]
|
[Bodo Moeller]
|
||||||
|
|
||||||
@ -10115,7 +10115,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
|
|||||||
error code, add initial support to X509_print() and x509 application.
|
error code, add initial support to X509_print() and x509 application.
|
||||||
[Steve Henson]
|
[Steve Henson]
|
||||||
|
|
||||||
*) Takes a deep breath and start addding X509 V3 extension support code. Add
|
*) Takes a deep breath and start adding X509 V3 extension support code. Add
|
||||||
files in crypto/x509v3. Move original stuff to crypto/x509v3/old. All this
|
files in crypto/x509v3. Move original stuff to crypto/x509v3/old. All this
|
||||||
stuff is currently isolated and isn't even compiled yet.
|
stuff is currently isolated and isn't even compiled yet.
|
||||||
[Steve Henson]
|
[Steve Henson]
|
||||||
@ -10289,7 +10289,7 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
|
|||||||
*) Fixed sk_insert which never worked properly.
|
*) Fixed sk_insert which never worked properly.
|
||||||
[Steve Henson]
|
[Steve Henson]
|
||||||
|
|
||||||
*) Fix ASN1 macros so they can handle indefinite length construted
|
*) Fix ASN1 macros so they can handle indefinite length constructed
|
||||||
EXPLICIT tags. Some non standard certificates use these: they can now
|
EXPLICIT tags. Some non standard certificates use these: they can now
|
||||||
be read in.
|
be read in.
|
||||||
[Steve Henson]
|
[Steve Henson]
|
||||||
|
Loading…
x
Reference in New Issue
Block a user