HISTORY 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316
  1. 16-Mar-98
  2. - Patch for Cray T90 from Wayne Schroeder <schroede@SDSC.EDU>
  3. - Lots and lots of changes
  4. 29-Jan-98
  5. - ASN1_BIT_STRING_set_bit()/ASN1_BIT_STRING_get_bit() from
  6. Goetz Babin-Ebell <babinebell@trustcenter.de>.
  7. - SSL_version() now returns SSL2_VERSION, SSL3_VERSION or
  8. TLS1_VERSION.
  9. 7-Jan-98
  10. - Finally reworked the cipher string to ciphers again, so it
  11. works correctly
  12. - All the app_data stuff is now ex_data with funcion calls to access.
  13. The index is supplied by a function and 'methods' can be setup
  14. for the types that are called on XXX_new/XXX_free. This lets
  15. applications get notified on creation and destruction. Some of
  16. the RSA methods could be implemented this way and I may do so.
  17. - Oh yes, SSL under perl5 is working at the basic level.
  18. 15-Dec-97
  19. - Warning - the gethostbyname cache is not fully thread safe,
  20. but it should work well enough.
  21. - Major internal reworking of the app_data stuff. More functions
  22. but if you were accessing ->app_data directly, things will
  23. stop working.
  24. - The perlv5 stuff is working. Currently on message digests,
  25. ciphers and the bignum library.
  26. 9-Dec-97
  27. - Modified re-negotiation so that server initated re-neg
  28. will cause a SSL_read() to return -1 should retry.
  29. The danger otherwise was that the server and the
  30. client could end up both trying to read when using non-blocking
  31. sockets.
  32. 4-Dec-97
  33. - Lots of small changes
  34. - Fix for binaray mode in Windows for the FILE BIO, thanks to
  35. Bob Denny <rdenny@dc3.com>
  36. 17-Nov-97
  37. - Quite a few internal cleanups, (removal of errno, and using macros
  38. defined in e_os.h).
  39. - A bug in ca.c, pointed out by yasuyuki-ito@d-cruise.co.jp, where
  40. the automactic naming out output files was being stuffed up.
  41. 29-Oct-97
  42. - The Cast5 cipher has been added. MD5 and SHA-1 are now in assember
  43. for x86.
  44. 21-Oct-97
  45. - Fixed a bug in the BIO_gethostbyname() cache.
  46. 15-Oct-97
  47. - cbc mode for blowfish/des/3des is now in assember. Blowfish asm
  48. has also been improved. At this point in time, on the pentium,
  49. md5 is %80 faster, the unoptimesed sha-1 is %79 faster,
  50. des-cbc is %28 faster, des-ede3-cbc is %9 faster and blowfish-cbc
  51. is %62 faster.
  52. 12-Oct-97
  53. - MEM_BUF_grow() has been fixed so that it always sets the buf->length
  54. to the value we are 'growing' to. Think of MEM_BUF_grow() as the
  55. way to set the length value correctly.
  56. 10-Oct-97
  57. - I now hash for certificate lookup on the raw DER encoded RDN (md5).
  58. This breaks things again :-(. This is efficent since I cache
  59. the DER encoding of the RDN.
  60. - The text DN now puts in the numeric OID instead of UNKNOWN.
  61. - req can now process arbitary OIDs in the config file.
  62. - I've been implementing md5 in x86 asm, much faster :-).
  63. - Started sha1 in x86 asm, needs more work.
  64. - Quite a few speedups in the BN stuff. RSA public operation
  65. has been made faster by caching the BN_MONT_CTX structure.
  66. The calulating of the Ai where A*Ai === 1 mod m was rather
  67. expensive. Basically a 40-50% speedup on public operations.
  68. The RSA speedup is now 15% on pentiums and %20 on pentium
  69. pro.
  70. 30-Sep-97
  71. - After doing some profiling, I added x86 adm for bn_add_words(),
  72. which just adds 2 arrays of longs together. A %10 speedup
  73. for 512 and 1024 bit RSA on the pentium pro.
  74. 29-Sep-97
  75. - Converted the x86 bignum assembler to us the perl scripts
  76. for generation.
  77. 23-Sep-97
  78. - If SSL_set_session() is passed a NULL session, it now clears the
  79. current session-id.
  80. 22-Sep-97
  81. - Added a '-ss_cert file' to apps/ca.c. This will sign selfsigned
  82. certificates.
  83. - Bug in crypto/evp/encode.c where by decoding of 65 base64
  84. encoded lines, one line at a time (via a memory BIO) would report
  85. EOF after the first line was decoded.
  86. - Fix in X509_find_by_issuer_and_serial() from
  87. Dr Stephen Henson <shenson@bigfoot.com>
  88. 19-Sep-97
  89. - NO_FP_API and NO_STDIO added.
  90. - Put in sh config command. It auto runs Configure with the correct
  91. parameters.
  92. 18-Sep-97
  93. - Fix x509.c so if a DSA cert has different parameters to its parent,
  94. they are left in place. Not tested yet.
  95. 16-Sep-97
  96. - ssl_create_cipher_list() had some bugs, fixes from
  97. Patrick Eisenacher <eisenach@stud.uni-frankfurt.de>
  98. - Fixed a bug in the Base64 BIO, where it would return 1 instead
  99. of -1 when end of input was encountered but should retry.
  100. Basically a Base64/Memory BIO interaction problem.
  101. - Added a HMAC set of functions in preporarion for TLS work.
  102. 15-Sep-97
  103. - Top level makefile tweak - Cameron Simpson <cs@zip.com.au>
  104. - Prime generation spead up %25 (512 bit prime, pentium pro linux)
  105. by using montgomery multiplication in the prime number test.
  106. 11-Sep-97
  107. - Ugly bug in ssl3_write_bytes(). Basically if application land
  108. does a SSL_write(ssl,buf,len) where len > 16k, the SSLv3 write code
  109. did not check the size and tried to copy the entire buffer.
  110. This would tend to cause memory overwrites since SSLv3 has
  111. a maximum packet size of 16k. If your program uses
  112. buffers <= 16k, you would probably never see this problem.
  113. - Fixed a new errors that were cause by malloc() not returning
  114. 0 initialised memory..
  115. - SSL_OP_NETSCAPE_CA_DN_BUG was being switched on when using
  116. SSL_CTX_set_options(ssl_ctx,SSL_OP_ALL); which was a bad thing
  117. since this flags stops SSLeay being able to handle client
  118. cert requests correctly.
  119. 08-Sep-97
  120. - SSL_SESS_CACHE_NO_INTERNAL_LOOKUP option added. When switched
  121. on, the SSL server routines will not use a SSL_SESSION that is
  122. held in it's cache. This in intended to be used with the session-id
  123. callbacks so that while the session-ids are still stored in the
  124. cache, the decision to use them and how to look them up can be
  125. done by the callbacks. The are the 'new', 'get' and 'remove'
  126. callbacks. This can be used to determine the session-id
  127. to use depending on information like which port/host the connection
  128. is coming from. Since the are also SSL_SESSION_set_app_data() and
  129. SSL_SESSION_get_app_data() functions, the application can hold
  130. information against the session-id as well.
  131. 03-Sep-97
  132. - Added lookup of CRLs to the by_dir method,
  133. X509_load_crl_file() also added. Basically it means you can
  134. lookup CRLs via the same system used to lookup certificates.
  135. - Changed things so that the X509_NAME structure can contain
  136. ASN.1 BIT_STRINGS which is required for the unique
  137. identifier OID.
  138. - Fixed some problems with the auto flushing of the session-id
  139. cache. It was not occuring on the server side.
  140. 02-Sep-97
  141. - Added SSL_CTX_sess_cache_size(SSL_CTX *ctx,unsigned long size)
  142. which is the maximum number of entries allowed in the
  143. session-id cache. This is enforced with a simple FIFO list.
  144. The default size is 20*1024 entries which is rather large :-).
  145. The Timeout code is still always operating.
  146. 01-Sep-97
  147. - Added an argument to all the 'generate private key/prime`
  148. callbacks. It is the last parameter so this should not
  149. break existing code but it is needed for C++.
  150. - Added the BIO_FLAGS_BASE64_NO_NL flag for the BIO_f_base64()
  151. BIO. This lets the BIO read and write base64 encoded data
  152. without inserting or looking for '\n' characters. The '-A'
  153. flag turns this on when using apps/enc.c.
  154. - RSA_NO_PADDING added to help BSAFE functionality. This is a
  155. very dangerous thing to use, since RSA private key
  156. operations without random padding bytes (as PKCS#1 adds) can
  157. be attacked such that the private key can be revealed.
  158. - ASN.1 bug and rc2-40-cbc and rc4-40 added by
  159. Dr Stephen Henson <shenson@bigfoot.com>
  160. 31-Aug-97 (stuff added while I was away)
  161. - Linux pthreads by Tim Hudson (tjh@cryptsoft.com).
  162. - RSA_flags() added allowing bypass of pub/priv match check
  163. in ssl/ssl_rsa.c - Tim Hudson.
  164. - A few minor bugs.
  165. SSLeay 0.8.1 released.
  166. 19-Jul-97
  167. - Server side initated dynamic renegotiation is broken. I will fix
  168. it when I get back from holidays.
  169. 15-Jul-97
  170. - Quite a few small changes.
  171. - INVALID_SOCKET usage cleanups from Alex Kiernan <alex@hisoft.co.uk>
  172. 09-Jul-97
  173. - Added 2 new values to the SSL info callback.
  174. SSL_CB_START which is passed when the SSL protocol is started
  175. and SSL_CB_DONE when it has finished sucsessfully.
  176. 08-Jul-97
  177. - Fixed a few bugs problems in apps/req.c and crypto/asn1/x_pkey.c
  178. that related to DSA public/private keys.
  179. - Added all the relevent PEM and normal IO functions to support
  180. reading and writing RSAPublic keys.
  181. - Changed makefiles to use ${AR} instead of 'ar r'
  182. 07-Jul-97
  183. - Error in ERR_remove_state() that would leave a dangling reference
  184. to a free()ed location - thanks to Alex Kiernan <alex@hisoft.co.uk>
  185. - s_client now prints the X509_NAMEs passed from the server
  186. when requesting a client cert.
  187. - Added a ssl->type, which is one of SSL_ST_CONNECT or
  188. SSL_ST_ACCEPT. I had to add it so I could tell if I was
  189. a connect or an accept after the handshake had finished.
  190. - SSL_get_client_CA_list(SSL *s) now returns the CA names
  191. passed by the server if called by a client side SSL.
  192. 05-Jul-97
  193. - Bug in X509_NAME_get_text_by_OBJ(), looking starting at index
  194. 0, not -1 :-( Fix from Tim Hudson (tjh@cryptsoft.com).
  195. 04-Jul-97
  196. - Fixed some things in X509_NAME_add_entry(), thanks to
  197. Matthew Donald <matthew@world.net>.
  198. - I had a look at the cipher section and though that it was a
  199. bit confused, so I've changed it.
  200. - I was not setting up the RC4-64-MD5 cipher correctly. It is
  201. a MS special that appears in exported MS Money.
  202. - Error in all my DH ciphers. Section 7.6.7.3 of the SSLv3
  203. spec. I was missing the two byte length header for the
  204. ClientDiffieHellmanPublic value. This is a packet sent from
  205. the client to the server. The SSL_OP_SSLEAY_080_CLIENT_DH_BUG
  206. option will enable SSLeay server side SSLv3 accept either
  207. the correct or my 080 packet format.
  208. - Fixed a few typos in crypto/pem.org.
  209. 02-Jul-97
  210. - Alias mapping for EVP_get_(digest|cipher)byname is now
  211. performed before a lookup for actual cipher. This means
  212. that an alias can be used to 're-direct' a cipher or a
  213. digest.
  214. - ASN1_read_bio() had a bug that only showed up when using a
  215. memory BIO. When EOF is reached in the memory BIO, it is
  216. reported as a -1 with BIO_should_retry() set to true.
  217. 01-Jul-97
  218. - Fixed an error in X509_verify_cert() caused by my
  219. miss-understanding how 'do { contine } while(0);' works.
  220. Thanks to Emil Sit <sit@mit.edu> for educating me :-)
  221. 30-Jun-97
  222. - Base64 decoding error. If the last data line did not end with
  223. a '=', sometimes extra data would be returned.
  224. - Another 'cut and paste' bug in x509.c related to setting up the
  225. STDout BIO.
  226. 27-Jun-97
  227. - apps/ciphers.c was not printing due to an editing error.
  228. - Alex Kiernan <alex@hisoft.co.uk> send in a nice fix for
  229. a library build error in util/mk1mf.pl
  230. 26-Jun-97
  231. - Still did not have the auto 'experimental' code removal
  232. script correct.
  233. - A few header tweaks for Watcom 11.0 under Win32 from
  234. Rolf Lindemann <Lindemann@maz-hh.de>
  235. - 0 length OCTET_STRING bug in asn1_parse
  236. - A minor fix with an non-existent function in the MS .def files.
  237. - A few changes to the PKCS7 stuff.
  238. 25-Jun-97
  239. SSLeay 0.8.0 finally it gets released.
  240. 24-Jun-97
  241. Added a SSL_OP_EPHEMERAL_RSA option which causes all SSLv3 RSA keys to
  242. use a temporary RSA key. This is experimental and needs some more work.
  243. Fixed a few Win16 build problems.
  244. 23-Jun-97
  245. SSLv3 bug. I was not doing the 'lookup' of the CERT structure
  246. correctly. I was taking the SSL->ctx->default_cert when I should
  247. have been using SSL->cert. The bug was in ssl/s3_srvr.c
  248. 20-Jun-97
  249. X509_ATTRIBUTES were being encoded wrongly by apps/reg.c and the
  250. rest of the library. Even though I had the code required to do
  251. it correctly, apps/req.c was doing the wrong thing. I have fixed
  252. and tested everything.
  253. Missing a few #ifdef FIONBIO sections in crypto/bio/bss_acpt.c.
  254. 19-Jun-97
  255. Fixed a bug in the SSLv2 server side first packet handling. When
  256. using the non-blocking test BIO, the ssl->s2->first_packet flag
  257. was being reset when a would-block failure occurred when reading
  258. the first 5 bytes of the first packet. This caused the checking
  259. logic to run at the wrong time and cause an error.
  260. Fixed a problem with specifying cipher. If RC4-MD5 were used,
  261. only the SSLv3 version would be picked up. Now this will pick
  262. up both SSLv2 and SSLv3 versions. This required changing the
  263. SSL_CIPHER->mask values so that they only mask the ciphers,
  264. digests, authentication, export type and key-exchange algorithms.
  265. I found that when a SSLv23 session is established, a reused
  266. session, of type SSLv3 was attempting to write the SSLv2
  267. ciphers, which were invalid. The SSL_METHOD->put_cipher_by_char
  268. method has been modified so it will only write out cipher which
  269. that method knows about.