summaryrefslogtreecommitdiffstats
path: root/CHANGES
AgeCommit message (Collapse)Author
2000-08-21Various fixes...Dr. Stephen Henson
initialize ex_pathlen to -1 so it isn't checked if pathlen is not present. set ucert to NULL in apps/pkcs12.c otherwise it gets freed twice. remove extraneous '\r' in MIME encoder. Allow a NULL to be passed to X509_gmtime_adj() Make PKCS#7 code use definite length encoding rather then the indefinite stuff it used previously.
2000-08-18Assar wanted an address change.Richard Levitte
2000-08-18Added BIO_vprintf() and BIO_vsnprintf(). The former because I'veRichard Levitte
found myself needing it a number of times, the latter for completeness.
2000-08-17Document the added diversity to the possible log levels.Richard Levitte
2000-08-17Document the reconfiguratoin option for Configure.Richard Levitte
2000-08-14MD4 implemented. Assar Westerlund provided the digest code itself and the ↵Richard Levitte
test utility, I added the bits to get a EVP interface, the command line utility and the speed test
2000-08-11The pkcs12 had no way of getting a CA file or path to be used whenRichard Levitte
building a complete chain. Now added through the -CAfile and -CApath arguments.
2000-08-06Fix for bad sorting of object names.Dr. Stephen Henson
Add warning print out if duplicate names found: should end up as a fatal error but a warning for now until they problems are fixed...
2000-08-04Changes needed for Tandem NSK, supplied by Scott Uroff (scott@xypro.com).Dr. Stephen Henson
Fix warnings with BIO_dump_indent().
2000-07-29Document rollback issues.Bodo Möller
2000-07-29Fix SSL 2.0 rollback checking: The previous implementation of theBodo Möller
test was never triggered due to an off-by-one error. In s23_clnt.c, don't use special rollback-attack detection padding (RSA_SSLV23_PADDING) if SSL 2.0 is the only protocol enabled in the client; similarly, in s23_srvr.c, don't do the rollback check if SSL 2.0 is the only protocol enabled in the server.
2000-07-28New ASN1_STRING_print_ex() and X509_NAME_print_ex()Dr. Stephen Henson
functions. These are intended to be replacements for the ancient ASN1_STRING_print() and X509_NAME_print() functions. The new functions support RFC2253 and various pretty printing options. It is also possible to display international characters if the terminal properly handles UTF8 encoding (Linux seems to tolerate this if the "unicode_start" script is run). Still needs to be documented, integrated into other utilities and extensively tested.
2000-07-27Add the possibility to get hexdumps of unprintable data when usingRichard Levitte
'openssl asn1parse'. As a side effect, the functions ASN1_parse_dump and BIO_dump_indent are added.
2000-07-26Make NEG_PUBKEY_BUG on by default.Dr. Stephen Henson
ASN1_TIME fixes. New function c2i_ASN1_OBJECT().
2000-07-21crypto/err.c bugfixBodo Möller
2000-07-21Redo and enhance the support for building shared libraries. CurrentlyRichard Levitte
there's support for building under Linux and True64 (using examples from the programming manuals), including versioning that is currently the same as OpenSSL versions but should really be a different series. With this change, it's up to the users to decide if they want shared libraries as well as the static ones. This decision now has to be done at configuration time (well, not really, those who know what they do can still do it the same way as before). The OpenSSL programs (openssl and the test programs) are currently always linked statically, but this may change in the future in a configurable manner. The necessary makefile variables to enable this are in place. Also note that I have done absolutely nothing about the Windows target to get something similar. On the other hand, DLLs are already the default there, but without versioning, and I've no idea what the possibilities for such a thing are there...
2000-07-19Randomness polling function for Win9x.Ulf Möller
2000-07-12Make req seed the PRNG if signing withDr. Stephen Henson
an already existing DSA key. Document the new smime options.
2000-07-10Fix some typose in the i2d/d2i functions thatDr. Stephen Henson
call the i2c/c2i (they were not using the content length for the headers). Fix ASN1 long form tag encoding. This never worked but it was never tested since it is only used for tags > 30. New options to smime program to allow the PKCS#7 format to be specified and the content supplied externally.
2000-07-07New ASN1 functions that just deal withDr. Stephen Henson
content octets, not tag+length.
2000-07-05Document the change.Richard Levitte
2000-06-28Undo the changes I just made. I'm not sure what I was thinking of.Richard Levitte
The message to everyone is "Do not hack OpenSSL when stressed"...
2000-06-28Document my latest changes.Richard Levitte
2000-06-23BSD-style MD5-based password algorithm in 'openssl passwd'.Bodo Möller
(Still needs to be tested against the original using sample passwords of different length.)
2000-06-22Document the change in req.Richard Levitte
2000-06-22Document the change in req.Richard Levitte
2000-06-22Change mkstack.pl so it now sorts each groupDr. Stephen Henson
into lexical order. Previously it depended on the order of files in the directory. This should now mean that all systems will agree on the order of safestack.h and will not change it needlessly and avoid massive needless commits to safestack.h in future. It wont however avoid this one :-(
2000-06-21Fixes for Win32 build.Dr. Stephen Henson
This is mostly a work around for the old VC++ problem that it treats func() as func(void). Various prototypes had been added to 'compare' function pointers that triggered this. This could be fixed by removing the prototype, adding function pointer casts to every call or changing the passed function to use the expected arguments. I mostly did the latter. The mkdef.pl script was modified to remove the typesafe functions which no longer exist. Oh and some functions called OPENSSL_freeLibrary() were changed back to FreeLibrary(), wonder how that happened :-)
2000-06-20Handle ASN1_SET_OF and PKCS12_STACK_OF using functionDr. Stephen Henson
casts in the same way as STACK_OF.
2000-06-16Safe stack reorganisation in terms of function casts.Dr. Stephen Henson
After some messing around this seems to work but needs a few more tests. Working out the syntax for sk_set_cmp_func() (cast it to a function that itself returns a function pointer) was painful :-( Needs some testing to see what other compilers think of this syntax. Also needs similar stuff for ASN1_SET_OF etc etc.
2000-06-15Add support for the modified SGC key format used in IIS.Dr. Stephen Henson
2000-06-11Fix evp_locl.h macros.Dr. Stephen Henson
Documentation correction.
2000-06-11Document EVP routines. Change EVP_SealInit() and EVP_OpenInit()Dr. Stephen Henson
to support multiple calls. New function to retrieve email address from certificates and requests.
2000-06-10In longer tests with g=2, DH exchange does not become quite as fastBodo Möller
as expected -- maybe it's the different processor, maybe my previous timings were too inaccurate.
2000-06-10BN_mod_exp_mont_word entry:Bodo Möller
Don't give performance gain estimates that appear to be more precise than they really are, especially when they are wrong (2/(1/1.15 + 1) = ca. 1.0698).
2000-06-08Slightly faster DSA verification (BN_mod_exp2_mont),Bodo Möller
marginally faster BN_mod_exp for 1024 bit exponents.
2000-06-08Add entry that Richard forgot.Bodo Möller
2000-06-08Use the equivalent of a sliding window (without precomputationBodo Möller
because we're only handling words anyway) in BN_mod_exp_mont_word making it a little faster for very small exponents, and adjust the performance gain estimate in CHANGES according to slightly more thorough measurements. (15% faster than BN_mod_exp_mont for "large" base, 20% faster than BN_mod_exp_mont for small base.)
2000-06-07Speed up DH with small generator.Bodo Möller
2000-06-03CygWin32 support.Ulf Möller
Submitted by: John Jarvie <jjarvie@newsguy.com>
2000-06-01This change will cause builds (by default) to not use different STACKGeoff Thorpe
structures and functions for each stack type. The previous behaviour can be enabled by configuring with the "-DDEBUG_SAFESTACK" option. This will also cause "make update" (mkdef.pl in particular) to update the libeay.num and ssleay.num symbol tables with the number of extra functions DEBUG_SAFESTACK creates. The way this change works is to accompany each DECLARE_STACK_OF() macro with a set of "#define"d versions of the sk_##type##_*** functions that ensures all the existing "type-safe" stack calls are precompiled into the underlying stack calls. The presence or abscence of the DEBUG_SAFESTACK symbol controls whether this block of "#define"s or the DECLARE_STACK_OF() macro is taking effect. The block of "#define"s is in turn generated and maintained by a perl script (util/mkstack.pl) that encompasses the block with delimiting C comments. This works in a similar way to the auto-generated error codes and, like the other such maintenance utilities, is invoked by the "make update" target. A long (but mundane) commit will follow this with the results of "make update" - this will include all the "#define" blocks for each DECLARE_STACK_OF() statement, along with stripped down libeay.num and ssleay.num files.
2000-06-01The previous commit to crypto/stack/*.[ch] pulled the type-safety stringsGeoff Thorpe
yet tighter, and also put some heat on the rest of the library by insisting (correctly) that compare callbacks used in stacks are prototyped with "const" parameters. This has led to a depth-first explosion of compiler warnings in the code where 1 constification has led to 3 or 4 more. Fortunately these have all been resolved to completion and the code seems cleaner as a result - in particular many of the _cmp() functions should have been prototyped with "const"s, and now are. There was one little problem however; X509_cmp() should by rights compare "const X509 *" pointers, and it is now declared as such. However, it's internal workings can involve recalculating hash values and extensions if they have not already been setup. Someone with a more intricate understanding of the flow control of X509 might be able to tighten this up, but for now - this seemed the obvious place to stop the "depth-first" constification of the code by using an evil cast (they have migrated all the way here from safestack.h). Fortunately, this is the only place in the code where this was required to complete these type-safety changes, and it's reasonably clear and commented, and seemed the least unacceptable of the options. Trying to take the constification further ends up exploding out considerably, and indeed leads directly into generalised ASN functions which are not likely to cooperate well with this.
2000-05-30Improve PRNG robustness.Bodo Möller
2000-05-30More EVP cipher revision.Dr. Stephen Henson
Change EVP_SealInit() and EVP_OpenInit() to handle cipher parameters. Make it possible to set RC2 and RC5 params. Make RC2 ASN1 code use the effective key bits and not the key length. TODO: document how new API works.
2000-05-30Fourth phase EVP revision.Dr. Stephen Henson
Declare ciphers in terms of macros. This reduces the amount of code and places each block cipher EVP definition in a single file instead of being spread over 4 files.
2000-05-28Third phase of EVP cipher overhaul.Dr. Stephen Henson
Remove duplicated code in EVP.
2000-05-27Bugfix: clear error queue after ignoring ssl_verify_cert_chain result.Bodo Möller
2000-05-27Second phase of EVP cipher overhaul.Dr. Stephen Henson
Change functions like EVP_EncryptUpdate() so they now return a value. These normally have software only implementations which cannot fail so this was acceptable. However ciphers can be implemented in hardware and these could return errors.
2000-05-26Beginnings of EVP cipher overhaul. This should eventuallyDr. Stephen Henson
enhance and tidy up the EVP interface. This patch adds initial support for variable length ciphers and changes S/MIME code to use this. Some other library functions need modifying to support use of modified cipher parameters. Also need to change all the cipher functions that should return error codes, but currenly don't. And of course it needs extensive testing...
2000-05-25Implement SSL_OP_TLS_ROLLBACK_BUG for servers.Bodo Möller
Call dh_tmp_cb with correct 'is_export' flag. Avoid tabs in CHANGES.