1OpenSSL CHANGES 2=============== 3 4This is a high-level summary of the most important changes. 5For a full list of changes, see the [git commit log][log] and 6pick the appropriate release branch. 7 8 [log]: https://github.com/openssl/openssl/commits/ 9 10OpenSSL Releases 11---------------- 12 13 - [OpenSSL 3.0](#openssl-30) 14 - [OpenSSL 1.1.1](#openssl-111) 15 - [OpenSSL 1.1.0](#openssl-110) 16 - [OpenSSL 1.0.2](#openssl-102) 17 - [OpenSSL 1.0.1](#openssl-101) 18 - [OpenSSL 1.0.0](#openssl-100) 19 - [OpenSSL 0.9.x](#openssl-09x) 20 21OpenSSL 3.0 22----------- 23 24For OpenSSL 3.0 a [Migration guide][] has been added, so the CHANGES entries 25listed here are only a brief description. 26The migration guide contains more detailed information related to new features, 27breaking changes, and mappings for the large list of deprecated functions. 28 29[Migration guide]: https://github.com/openssl/openssl/tree/master/doc/man7/migration_guide.pod 30 31### Changes between 3.0.8 and 3.0.9 [30 May 2023] 32 33 * Mitigate for the time it takes for `OBJ_obj2txt` to translate gigantic 34 OBJECT IDENTIFIER sub-identifiers to canonical numeric text form. 35 36 OBJ_obj2txt() would translate any size OBJECT IDENTIFIER to canonical 37 numeric text form. For gigantic sub-identifiers, this would take a very 38 long time, the time complexity being O(n^2) where n is the size of that 39 sub-identifier. ([CVE-2023-2650]) 40 41 To mitigitate this, `OBJ_obj2txt()` will only translate an OBJECT 42 IDENTIFIER to canonical numeric text form if the size of that OBJECT 43 IDENTIFIER is 586 bytes or less, and fail otherwise. 44 45 The basis for this restriction is RFC 2578 (STD 58), section 3.5. OBJECT 46 IDENTIFIER values, which stipulates that OBJECT IDENTIFIERS may have at 47 most 128 sub-identifiers, and that the maximum value that each sub- 48 identifier may have is 2^32-1 (4294967295 decimal). 49 50 For each byte of every sub-identifier, only the 7 lower bits are part of 51 the value, so the maximum amount of bytes that an OBJECT IDENTIFIER with 52 these restrictions may occupy is 32 * 128 / 7, which is approximately 586 53 bytes. 54 55 Ref: https://datatracker.ietf.org/doc/html/rfc2578#section-3.5 56 57 *Richard Levitte* 58 59 * Fixed buffer overread in AES-XTS decryption on ARM 64 bit platforms which 60 happens if the buffer size is 4 mod 5 in 16 byte AES blocks. This can 61 trigger a crash of an application using AES-XTS decryption if the memory 62 just after the buffer being decrypted is not mapped. 63 Thanks to Anton Romanov (Amazon) for discovering the issue. 64 ([CVE-2023-1255]) 65 66 *Nevine Ebeid* 67 68 * Reworked the Fix for the Timing Oracle in RSA Decryption ([CVE-2022-4304]). 69 The previous fix for this timing side channel turned out to cause 70 a severe 2-3x performance regression in the typical use case 71 compared to 3.0.7. The new fix uses existing constant time 72 code paths, and restores the previous performance level while 73 fully eliminating all existing timing side channels. 74 The fix was developed by Bernd Edlinger with testing support 75 by Hubert Kario. 76 77 *Bernd Edlinger* 78 79 * Corrected documentation of X509_VERIFY_PARAM_add0_policy() to mention 80 that it does not enable policy checking. Thanks to David Benjamin for 81 discovering this issue. 82 ([CVE-2023-0466]) 83 84 *Tomáš Mráz* 85 86 * Fixed an issue where invalid certificate policies in leaf certificates are 87 silently ignored by OpenSSL and other certificate policy checks are skipped 88 for that certificate. A malicious CA could use this to deliberately assert 89 invalid certificate policies in order to circumvent policy checking on the 90 certificate altogether. 91 ([CVE-2023-0465]) 92 93 *Matt Caswell* 94 95 * Limited the number of nodes created in a policy tree to mitigate 96 against CVE-2023-0464. The default limit is set to 1000 nodes, which 97 should be sufficient for most installations. If required, the limit 98 can be adjusted by setting the OPENSSL_POLICY_TREE_NODES_MAX build 99 time define to a desired maximum number of nodes or zero to allow 100 unlimited growth. 101 ([CVE-2023-0464]) 102 103 *Paul Dale* 104 105### Changes between 3.0.7 and 3.0.8 [7 Feb 2023] 106 107 * Fixed NULL dereference during PKCS7 data verification. 108 109 A NULL pointer can be dereferenced when signatures are being 110 verified on PKCS7 signed or signedAndEnveloped data. In case the hash 111 algorithm used for the signature is known to the OpenSSL library but 112 the implementation of the hash algorithm is not available the digest 113 initialization will fail. There is a missing check for the return 114 value from the initialization function which later leads to invalid 115 usage of the digest API most likely leading to a crash. 116 ([CVE-2023-0401]) 117 118 PKCS7 data is processed by the SMIME library calls and also by the 119 time stamp (TS) library calls. The TLS implementation in OpenSSL does 120 not call these functions however third party applications would be 121 affected if they call these functions to verify signatures on untrusted 122 data. 123 124 *Tomáš Mráz* 125 126 * Fixed X.400 address type confusion in X.509 GeneralName. 127 128 There is a type confusion vulnerability relating to X.400 address processing 129 inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING 130 but the public structure definition for GENERAL_NAME incorrectly specified 131 the type of the x400Address field as ASN1_TYPE. This field is subsequently 132 interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather 133 than an ASN1_STRING. 134 135 When CRL checking is enabled (i.e. the application sets the 136 X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to 137 pass arbitrary pointers to a memcmp call, enabling them to read memory 138 contents or enact a denial of service. 139 ([CVE-2023-0286]) 140 141 *Hugo Landau* 142 143 * Fixed NULL dereference validating DSA public key. 144 145 An invalid pointer dereference on read can be triggered when an 146 application tries to check a malformed DSA public key by the 147 EVP_PKEY_public_check() function. This will most likely lead 148 to an application crash. This function can be called on public 149 keys supplied from untrusted sources which could allow an attacker 150 to cause a denial of service attack. 151 152 The TLS implementation in OpenSSL does not call this function 153 but applications might call the function if there are additional 154 security requirements imposed by standards such as FIPS 140-3. 155 ([CVE-2023-0217]) 156 157 *Shane Lontis, Tomáš Mráz* 158 159 * Fixed Invalid pointer dereference in d2i_PKCS7 functions. 160 161 An invalid pointer dereference on read can be triggered when an 162 application tries to load malformed PKCS7 data with the 163 d2i_PKCS7(), d2i_PKCS7_bio() or d2i_PKCS7_fp() functions. 164 165 The result of the dereference is an application crash which could 166 lead to a denial of service attack. The TLS implementation in OpenSSL 167 does not call this function however third party applications might 168 call these functions on untrusted data. 169 ([CVE-2023-0216]) 170 171 *Tomáš Mráz* 172 173 * Fixed Use-after-free following BIO_new_NDEF. 174 175 The public API function BIO_new_NDEF is a helper function used for 176 streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL 177 to support the SMIME, CMS and PKCS7 streaming capabilities, but may also 178 be called directly by end user applications. 179 180 The function receives a BIO from the caller, prepends a new BIO_f_asn1 181 filter BIO onto the front of it to form a BIO chain, and then returns 182 the new head of the BIO chain to the caller. Under certain conditions, 183 for example if a CMS recipient public key is invalid, the new filter BIO 184 is freed and the function returns a NULL result indicating a failure. 185 However, in this case, the BIO chain is not properly cleaned up and the 186 BIO passed by the caller still retains internal pointers to the previously 187 freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO 188 then a use-after-free will occur. This will most likely result in a crash. 189 ([CVE-2023-0215]) 190 191 *Viktor Dukhovni, Matt Caswell* 192 193 * Fixed Double free after calling PEM_read_bio_ex. 194 195 The function PEM_read_bio_ex() reads a PEM file from a BIO and parses and 196 decodes the "name" (e.g. "CERTIFICATE"), any header data and the payload 197 data. If the function succeeds then the "name_out", "header" and "data" 198 arguments are populated with pointers to buffers containing the relevant 199 decoded data. The caller is responsible for freeing those buffers. It is 200 possible to construct a PEM file that results in 0 bytes of payload data. 201 In this case PEM_read_bio_ex() will return a failure code but will populate 202 the header argument with a pointer to a buffer that has already been freed. 203 If the caller also frees this buffer then a double free will occur. This 204 will most likely lead to a crash. 205 206 The functions PEM_read_bio() and PEM_read() are simple wrappers around 207 PEM_read_bio_ex() and therefore these functions are also directly affected. 208 209 These functions are also called indirectly by a number of other OpenSSL 210 functions including PEM_X509_INFO_read_bio_ex() and 211 SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL 212 internal uses of these functions are not vulnerable because the caller does 213 not free the header argument if PEM_read_bio_ex() returns a failure code. 214 ([CVE-2022-4450]) 215 216 *Kurt Roeckx, Matt Caswell* 217 218 * Fixed Timing Oracle in RSA Decryption. 219 220 A timing based side channel exists in the OpenSSL RSA Decryption 221 implementation which could be sufficient to recover a plaintext across 222 a network in a Bleichenbacher style attack. To achieve a successful 223 decryption an attacker would have to be able to send a very large number 224 of trial messages for decryption. The vulnerability affects all RSA padding 225 modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. 226 ([CVE-2022-4304]) 227 228 *Dmitry Belyavsky, Hubert Kario* 229 230 * Fixed X.509 Name Constraints Read Buffer Overflow. 231 232 A read buffer overrun can be triggered in X.509 certificate verification, 233 specifically in name constraint checking. The read buffer overrun might 234 result in a crash which could lead to a denial of service attack. 235 In a TLS client, this can be triggered by connecting to a malicious 236 server. In a TLS server, this can be triggered if the server requests 237 client authentication and a malicious client connects. 238 ([CVE-2022-4203]) 239 240 *Viktor Dukhovni* 241 242 * Fixed X.509 Policy Constraints Double Locking security issue. 243 244 If an X.509 certificate contains a malformed policy constraint and 245 policy processing is enabled, then a write lock will be taken twice 246 recursively. On some operating systems (most widely: Windows) this 247 results in a denial of service when the affected process hangs. Policy 248 processing being enabled on a publicly facing server is not considered 249 to be a common setup. 250 ([CVE-2022-3996]) 251 252 *Paul Dale* 253 254 * Our provider implementations of `OSSL_FUNC_KEYMGMT_EXPORT` and 255 `OSSL_FUNC_KEYMGMT_GET_PARAMS` for EC and SM2 keys now honor 256 `OSSL_PKEY_PARAM_EC_POINT_CONVERSION_FORMAT` as set (and 257 default to `POINT_CONVERSION_UNCOMPRESSED`) when exporting 258 `OSSL_PKEY_PARAM_PUB_KEY`, instead of unconditionally using 259 `POINT_CONVERSION_COMPRESSED` as in previous 3.x releases. 260 For symmetry, our implementation of `EVP_PKEY_ASN1_METHOD->export_to` 261 for legacy EC and SM2 keys is also changed similarly to honor the 262 equivalent conversion format flag as specified in the underlying 263 `EC_KEY` object being exported to a provider, when this function is 264 called through `EVP_PKEY_export()`. 265 266 *Nicola Tuveri* 267 268### Changes between 3.0.6 and 3.0.7 [1 Nov 2022] 269 270 * Fixed two buffer overflows in punycode decoding functions. 271 272 A buffer overrun can be triggered in X.509 certificate verification, 273 specifically in name constraint checking. Note that this occurs after 274 certificate chain signature verification and requires either a CA to 275 have signed the malicious certificate or for the application to continue 276 certificate verification despite failure to construct a path to a trusted 277 issuer. 278 279 In a TLS client, this can be triggered by connecting to a malicious 280 server. In a TLS server, this can be triggered if the server requests 281 client authentication and a malicious client connects. 282 283 An attacker can craft a malicious email address to overflow 284 an arbitrary number of bytes containing the `.` character (decimal 46) 285 on the stack. This buffer overflow could result in a crash (causing a 286 denial of service). 287 ([CVE-2022-3786]) 288 289 An attacker can craft a malicious email address to overflow four 290 attacker-controlled bytes on the stack. This buffer overflow could 291 result in a crash (causing a denial of service) or potentially remote code 292 execution depending on stack layout for any given platform/compiler. 293 ([CVE-2022-3602]) 294 295 *Paul Dale* 296 297 * Removed all references to invalid OSSL_PKEY_PARAM_RSA names for CRT 298 parameters in OpenSSL code. 299 Applications should not use the names OSSL_PKEY_PARAM_RSA_FACTOR, 300 OSSL_PKEY_PARAM_RSA_EXPONENT and OSSL_PKEY_PARAM_RSA_COEFFICIENT. 301 Use the numbered names such as OSSL_PKEY_PARAM_RSA_FACTOR1 instead. 302 Using these invalid names may cause algorithms to use slower methods 303 that ignore the CRT parameters. 304 305 *Shane Lontis* 306 307 * Fixed a regression introduced in 3.0.6 version raising errors on some stack 308 operations. 309 310 *Tomáš Mráz* 311 312 * Fixed a regression introduced in 3.0.6 version not refreshing the certificate 313 data to be signed before signing the certificate. 314 315 *Gibeom Gwon* 316 317 * Added RIPEMD160 to the default provider. 318 319 *Paul Dale* 320 321 * Ensured that the key share group sent or accepted for the key exchange 322 is allowed for the protocol version. 323 324 *Matt Caswell* 325 326### Changes between 3.0.5 and 3.0.6 [11 Oct 2022] 327 328 * OpenSSL supports creating a custom cipher via the legacy 329 EVP_CIPHER_meth_new() function and associated function calls. This function 330 was deprecated in OpenSSL 3.0 and application authors are instead encouraged 331 to use the new provider mechanism in order to implement custom ciphers. 332 333 OpenSSL versions 3.0.0 to 3.0.5 incorrectly handle legacy custom ciphers 334 passed to the EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() and 335 EVP_CipherInit_ex2() functions (as well as other similarly named encryption 336 and decryption initialisation functions). Instead of using the custom cipher 337 directly it incorrectly tries to fetch an equivalent cipher from the 338 available providers. An equivalent cipher is found based on the NID passed to 339 EVP_CIPHER_meth_new(). This NID is supposed to represent the unique NID for a 340 given cipher. However it is possible for an application to incorrectly pass 341 NID_undef as this value in the call to EVP_CIPHER_meth_new(). When NID_undef 342 is used in this way the OpenSSL encryption/decryption initialisation function 343 will match the NULL cipher as being equivalent and will fetch this from the 344 available providers. This will succeed if the default provider has been 345 loaded (or if a third party provider has been loaded that offers this 346 cipher). Using the NULL cipher means that the plaintext is emitted as the 347 ciphertext. 348 349 Applications are only affected by this issue if they call 350 EVP_CIPHER_meth_new() using NID_undef and subsequently use it in a call to an 351 encryption/decryption initialisation function. Applications that only use 352 SSL/TLS are not impacted by this issue. 353 ([CVE-2022-3358]) 354 355 *Matt Caswell* 356 357 * Fix LLVM vs Apple LLVM version numbering confusion that caused build failures 358 on MacOS 10.11 359 360 *Richard Levitte* 361 362 * Fixed the linux-mips64 Configure target which was missing the 363 SIXTY_FOUR_BIT bn_ops flag. This was causing heap corruption on that 364 platform. 365 366 *Adam Joseph* 367 368 * Fix handling of a ticket key callback that returns 0 in TLSv1.3 to not send a 369 ticket 370 371 *Matt Caswell* 372 373 * Correctly handle a retransmitted ClientHello in DTLS 374 375 *Matt Caswell* 376 377 * Fixed detection of ktls support in cross-compile environment on Linux 378 379 *Tomas Mraz* 380 381 * Fixed some regressions and test failures when running the 3.0.0 FIPS provider 382 against 3.0.x 383 384 *Paul Dale* 385 386 * Fixed SSL_pending() and SSL_has_pending() with DTLS which were failing to 387 report correct results in some cases 388 389 *Matt Caswell* 390 391 * Fix UWP builds by defining VirtualLock 392 393 *Charles Milette* 394 395 * For known safe primes use the minimum key length according to RFC 7919. 396 Longer private key sizes unnecessarily raise the cycles needed to compute the 397 shared secret without any increase of the real security. This fixes a 398 regression from 1.1.1 where these shorter keys were generated for the known 399 safe primes. 400 401 *Tomas Mraz* 402 403 * Added the loongarch64 target 404 405 *Shi Pujin* 406 407 * Fixed EC ASM flag passing. Flags for ASM implementations of EC curves were 408 only passed to the FIPS provider and not to the default or legacy provider. 409 410 *Juergen Christ* 411 412 * Fixed reported performance degradation on aarch64. Restored the 413 implementation prior to commit 2621751 ("aes/asm/aesv8-armx.pl: avoid 414 32-bit lane assignment in CTR mode") for 64bit targets only, since it is 415 reportedly 2-17% slower and the silicon errata only affects 32bit targets. 416 The new algorithm is still used for 32 bit targets. 417 418 *Bernd Edlinger* 419 420 * Added a missing header for memcmp that caused compilation failure on some 421 platforms 422 423 *Gregor Jasny* 424 425### Changes between 3.0.4 and 3.0.5 [5 Jul 2022] 426 427 * The OpenSSL 3.0.4 release introduced a serious bug in the RSA 428 implementation for X86_64 CPUs supporting the AVX512IFMA instructions. 429 This issue makes the RSA implementation with 2048 bit private keys 430 incorrect on such machines and memory corruption will happen during 431 the computation. As a consequence of the memory corruption an attacker 432 may be able to trigger a remote code execution on the machine performing 433 the computation. 434 435 SSL/TLS servers or other servers using 2048 bit RSA private keys running 436 on machines supporting AVX512IFMA instructions of the X86_64 architecture 437 are affected by this issue. 438 ([CVE-2022-2274]) 439 440 *Xi Ruoyao* 441 442 * AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimised 443 implementation would not encrypt the entirety of the data under some 444 circumstances. This could reveal sixteen bytes of data that was 445 preexisting in the memory that wasn't written. In the special case of 446 "in place" encryption, sixteen bytes of the plaintext would be revealed. 447 448 Since OpenSSL does not support OCB based cipher suites for TLS and DTLS, 449 they are both unaffected. 450 ([CVE-2022-2097]) 451 452 *Alex Chernyakhovsky, David Benjamin, Alejandro Sedeño* 453 454### Changes between 3.0.3 and 3.0.4 [21 Jun 2022] 455 456 * In addition to the c_rehash shell command injection identified in 457 CVE-2022-1292, further bugs where the c_rehash script does not 458 properly sanitise shell metacharacters to prevent command injection have been 459 fixed. 460 461 When the CVE-2022-1292 was fixed it was not discovered that there 462 are other places in the script where the file names of certificates 463 being hashed were possibly passed to a command executed through the shell. 464 465 This script is distributed by some operating systems in a manner where 466 it is automatically executed. On such operating systems, an attacker 467 could execute arbitrary commands with the privileges of the script. 468 469 Use of the c_rehash script is considered obsolete and should be replaced 470 by the OpenSSL rehash command line tool. 471 (CVE-2022-2068) 472 473 *Daniel Fiala, Tomáš Mráz* 474 475 * Case insensitive string comparison no longer uses locales. It has instead 476 been directly implemented. 477 478 *Paul Dale* 479 480### Changes between 3.0.2 and 3.0.3 [3 May 2022] 481 482 * Case insensitive string comparison is reimplemented via new locale-agnostic 483 comparison functions OPENSSL_str[n]casecmp always using the POSIX locale for 484 comparison. The previous implementation had problems when the Turkish locale 485 was used. 486 487 *Dmitry Belyavskiy* 488 489 * Fixed a bug in the c_rehash script which was not properly sanitising shell 490 metacharacters to prevent command injection. This script is distributed by 491 some operating systems in a manner where it is automatically executed. On 492 such operating systems, an attacker could execute arbitrary commands with the 493 privileges of the script. 494 495 Use of the c_rehash script is considered obsolete and should be replaced 496 by the OpenSSL rehash command line tool. 497 (CVE-2022-1292) 498 499 *Tomáš Mráz* 500 501 * Fixed a bug in the function `OCSP_basic_verify` that verifies the signer 502 certificate on an OCSP response. The bug caused the function in the case 503 where the (non-default) flag OCSP_NOCHECKS is used to return a postivie 504 response (meaning a successful verification) even in the case where the 505 response signing certificate fails to verify. 506 507 It is anticipated that most users of `OCSP_basic_verify` will not use the 508 OCSP_NOCHECKS flag. In this case the `OCSP_basic_verify` function will return 509 a negative value (indicating a fatal error) in the case of a certificate 510 verification failure. The normal expected return value in this case would be 511 0. 512 513 This issue also impacts the command line OpenSSL "ocsp" application. When 514 verifying an ocsp response with the "-no_cert_checks" option the command line 515 application will report that the verification is successful even though it 516 has in fact failed. In this case the incorrect successful response will also 517 be accompanied by error messages showing the failure and contradicting the 518 apparently successful result. 519 ([CVE-2022-1343]) 520 521 *Matt Caswell* 522 523 * Fixed a bug where the RC4-MD5 ciphersuite incorrectly used the 524 AAD data as the MAC key. This made the MAC key trivially predictable. 525 526 An attacker could exploit this issue by performing a man-in-the-middle attack 527 to modify data being sent from one endpoint to an OpenSSL 3.0 recipient such 528 that the modified data would still pass the MAC integrity check. 529 530 Note that data sent from an OpenSSL 3.0 endpoint to a non-OpenSSL 3.0 531 endpoint will always be rejected by the recipient and the connection will 532 fail at that point. Many application protocols require data to be sent from 533 the client to the server first. Therefore, in such a case, only an OpenSSL 534 3.0 server would be impacted when talking to a non-OpenSSL 3.0 client. 535 536 If both endpoints are OpenSSL 3.0 then the attacker could modify data being 537 sent in both directions. In this case both clients and servers could be 538 affected, regardless of the application protocol. 539 540 Note that in the absence of an attacker this bug means that an OpenSSL 3.0 541 endpoint communicating with a non-OpenSSL 3.0 endpoint will fail to complete 542 the handshake when using this ciphersuite. 543 544 The confidentiality of data is not impacted by this issue, i.e. an attacker 545 cannot decrypt data that has been encrypted using this ciphersuite - they can 546 only modify it. 547 548 In order for this attack to work both endpoints must legitimately negotiate 549 the RC4-MD5 ciphersuite. This ciphersuite is not compiled by default in 550 OpenSSL 3.0, and is not available within the default provider or the default 551 ciphersuite list. This ciphersuite will never be used if TLSv1.3 has been 552 negotiated. In order for an OpenSSL 3.0 endpoint to use this ciphersuite the 553 following must have occurred: 554 555 1) OpenSSL must have been compiled with the (non-default) compile time option 556 enable-weak-ssl-ciphers 557 558 2) OpenSSL must have had the legacy provider explicitly loaded (either 559 through application code or via configuration) 560 561 3) The ciphersuite must have been explicitly added to the ciphersuite list 562 563 4) The libssl security level must have been set to 0 (default is 1) 564 565 5) A version of SSL/TLS below TLSv1.3 must have been negotiated 566 567 6) Both endpoints must negotiate the RC4-MD5 ciphersuite in preference to any 568 others that both endpoints have in common 569 (CVE-2022-1434) 570 571 *Matt Caswell* 572 573 * Fix a bug in the OPENSSL_LH_flush() function that breaks reuse of the memory 574 occuppied by the removed hash table entries. 575 576 This function is used when decoding certificates or keys. If a long lived 577 process periodically decodes certificates or keys its memory usage will 578 expand without bounds and the process might be terminated by the operating 579 system causing a denial of service. Also traversing the empty hash table 580 entries will take increasingly more time. 581 582 Typically such long lived processes might be TLS clients or TLS servers 583 configured to accept client certificate authentication. 584 (CVE-2022-1473) 585 586 *Hugo Landau, Aliaksei Levin* 587 588 * The functions `OPENSSL_LH_stats` and `OPENSSL_LH_stats_bio` now only report 589 the `num_items`, `num_nodes` and `num_alloc_nodes` statistics. All other 590 statistics are no longer supported. For compatibility, these statistics are 591 still listed in the output but are now always reported as zero. 592 593 *Hugo Landau* 594 595### Changes between 3.0.1 and 3.0.2 [15 Mar 2022] 596 597 * Fixed a bug in the BN_mod_sqrt() function that can cause it to loop forever 598 for non-prime moduli. 599 600 Internally this function is used when parsing certificates that contain 601 elliptic curve public keys in compressed form or explicit elliptic curve 602 parameters with a base point encoded in compressed form. 603 604 It is possible to trigger the infinite loop by crafting a certificate that 605 has invalid explicit curve parameters. 606 607 Since certificate parsing happens prior to verification of the certificate 608 signature, any process that parses an externally supplied certificate may thus 609 be subject to a denial of service attack. The infinite loop can also be 610 reached when parsing crafted private keys as they can contain explicit 611 elliptic curve parameters. 612 613 Thus vulnerable situations include: 614 615 - TLS clients consuming server certificates 616 - TLS servers consuming client certificates 617 - Hosting providers taking certificates or private keys from customers 618 - Certificate authorities parsing certification requests from subscribers 619 - Anything else which parses ASN.1 elliptic curve parameters 620 621 Also any other applications that use the BN_mod_sqrt() where the attacker 622 can control the parameter values are vulnerable to this DoS issue. 623 ([CVE-2022-0778]) 624 625 *Tomáš Mráz* 626 627 * Add ciphersuites based on DHE_PSK (RFC 4279) and ECDHE_PSK (RFC 5489) 628 to the list of ciphersuites providing Perfect Forward Secrecy as 629 required by SECLEVEL >= 3. 630 631 *Dmitry Belyavskiy, Nicola Tuveri* 632 633 * Made the AES constant time code for no-asm configurations 634 optional due to the resulting 95% performance degradation. 635 The AES constant time code can be enabled, for no assembly 636 builds, with: ./config no-asm -DOPENSSL_AES_CONST_TIME 637 638 *Paul Dale* 639 640 * Fixed PEM_write_bio_PKCS8PrivateKey() to make it possible to use empty 641 passphrase strings. 642 643 *Darshan Sen* 644 645 * The negative return value handling of the certificate verification callback 646 was reverted. The replacement is to set the verification retry state with 647 the SSL_set_retry_verify() function. 648 649 *Tomáš Mráz* 650 651### Changes between 3.0.0 and 3.0.1 [14 Dec 2021] 652 653 * Fixed invalid handling of X509_verify_cert() internal errors in libssl 654 Internally libssl in OpenSSL calls X509_verify_cert() on the client side to 655 verify a certificate supplied by a server. That function may return a 656 negative return value to indicate an internal error (for example out of 657 memory). Such a negative return value is mishandled by OpenSSL and will cause 658 an IO function (such as SSL_connect() or SSL_do_handshake()) to not indicate 659 success and a subsequent call to SSL_get_error() to return the value 660 SSL_ERROR_WANT_RETRY_VERIFY. This return value is only supposed to be 661 returned by OpenSSL if the application has previously called 662 SSL_CTX_set_cert_verify_callback(). Since most applications do not do this 663 the SSL_ERROR_WANT_RETRY_VERIFY return value from SSL_get_error() will be 664 totally unexpected and applications may not behave correctly as a result. The 665 exact behaviour will depend on the application but it could result in 666 crashes, infinite loops or other similar incorrect responses. 667 668 This issue is made more serious in combination with a separate bug in OpenSSL 669 3.0 that will cause X509_verify_cert() to indicate an internal error when 670 processing a certificate chain. This will occur where a certificate does not 671 include the Subject Alternative Name extension but where a Certificate 672 Authority has enforced name constraints. This issue can occur even with valid 673 chains. 674 ([CVE-2021-4044]) 675 676 *Matt Caswell* 677 678 * Corrected a few file name and file reference bugs in the build, 679 installation and setup scripts, which lead to installation verification 680 failures. Slightly enhanced the installation verification script. 681 682 *Richard Levitte* 683 684 * Fixed EVP_PKEY_eq() to make it possible to use it with strictly private 685 keys. 686 687 *Richard Levitte* 688 689 * Fixed PVK encoder to properly query for the passphrase. 690 691 *Tomáš Mráz* 692 693 * Multiple fixes in the OSSL_HTTP API functions. 694 695 *David von Oheimb* 696 697 * Allow sign extension in OSSL_PARAM_allocate_from_text() for the 698 OSSL_PARAM_INTEGER data type and return error on negative numbers 699 used with the OSSL_PARAM_UNSIGNED_INTEGER data type. Make 700 OSSL_PARAM_BLD_push_BN{,_pad}() return an error on negative numbers. 701 702 *Richard Levitte* 703 704 * Allow copying uninitialized digest contexts with EVP_MD_CTX_copy_ex. 705 706 *Tomáš Mráz* 707 708 * Fixed detection of ARMv7 and ARM64 CPU features on FreeBSD. 709 710 *Allan Jude* 711 712 * Multiple threading fixes. 713 714 *Matt Caswell* 715 716 * Added NULL digest implementation to keep compatibility with 1.1.1 version. 717 718 *Tomáš Mráz* 719 720 * Allow fetching an operation from the provider that owns an unexportable key 721 as a fallback if that is still allowed by the property query. 722 723 *Richard Levitte* 724 725### Changes between 1.1.1 and 3.0.0 [7 sep 2021] 726 727 * TLS_MAX_VERSION, DTLS_MAX_VERSION and DTLS_MIN_VERSION constants are now 728 deprecated. 729 730 *Matt Caswell* 731 732 * The `OPENSSL_s390xcap` environment variable can be used to set bits in the 733 S390X capability vector to zero. This simplifies testing of different code 734 paths on S390X architecture. 735 736 *Patrick Steuer* 737 738 * Encrypting more than 2^64 TLS records with AES-GCM is disallowed 739 as per FIPS 140-2 IG A.5 "Key/IV Pair Uniqueness Requirements from 740 SP 800-38D". The communication will fail at this point. 741 742 *Paul Dale* 743 744 * The EC_GROUP_clear_free() function is deprecated as there is nothing 745 confidential in EC_GROUP data. 746 747 *Nicola Tuveri* 748 749 * The byte order mark (BOM) character is ignored if encountered at the 750 beginning of a PEM-formatted file. 751 752 *Dmitry Belyavskiy* 753 754 * Added CMS support for the Russian GOST algorithms. 755 756 *Dmitry Belyavskiy* 757 758 * Due to move of the implementation of cryptographic operations 759 to the providers, validation of various operation parameters can 760 be postponed until the actual operation is executed where previously 761 it happened immediately when an operation parameter was set. 762 763 For example when setting an unsupported curve with 764 EVP_PKEY_CTX_set_ec_paramgen_curve_nid() this function call will not 765 fail but later keygen operations with the EVP_PKEY_CTX will fail. 766 767 *OpenSSL team members and many third party contributors* 768 769 * The EVP_get_cipherbyname() function will return NULL for algorithms such as 770 "AES-128-SIV", "AES-128-CBC-CTS" and "CAMELLIA-128-CBC-CTS" which were 771 previously only accessible via low level interfaces. Use EVP_CIPHER_fetch() 772 instead to retrieve these algorithms from a provider. 773 774 *Shane Lontis* 775 776 * On build targets where the multilib postfix is set in the build 777 configuration the libdir directory was changing based on whether 778 the lib directory with the multilib postfix exists on the system 779 or not. This unpredictable behavior was removed and eventual 780 multilib postfix is now always added to the default libdir. Use 781 `--libdir=lib` to override the libdir if adding the postfix is 782 undesirable. 783 784 *Jan Lána* 785 786 * The triple DES key wrap functionality now conforms to RFC 3217 but is 787 no longer interoperable with OpenSSL 1.1.1. 788 789 *Paul Dale* 790 791 * The ERR_GET_FUNC() function was removed. With the loss of meaningful 792 function codes, this function can only cause problems for calling 793 applications. 794 795 *Paul Dale* 796 797 * Add a configurable flag to output date formats as ISO 8601. Does not 798 change the default date format. 799 800 *William Edmisten* 801 802 * Version of MSVC earlier than 1300 could get link warnings, which could 803 be suppressed if the undocumented -DI_CAN_LIVE_WITH_LNK4049 was set. 804 Support for this flag has been removed. 805 806 *Rich Salz* 807 808 * Rework and make DEBUG macros consistent. Remove unused -DCONF_DEBUG, 809 -DBN_CTX_DEBUG, and REF_PRINT. Add a new tracing category and use it for 810 printing reference counts. Rename -DDEBUG_UNUSED to -DUNUSED_RESULT_DEBUG 811 Fix BN_DEBUG_RAND so it compiles and, when set, force DEBUG_RAND to be set 812 also. Rename engine_debug_ref to be ENGINE_REF_PRINT also for consistency. 813 814 *Rich Salz* 815 816 * The signatures of the functions to get and set options on SSL and 817 SSL_CTX objects changed from "unsigned long" to "uint64_t" type. 818 Some source code changes may be required. 819 820 *Rich Salz* 821 822 * The public definitions of conf_method_st and conf_st have been 823 deprecated. They will be made opaque in a future release. 824 825 *Rich Salz and Tomáš Mráz* 826 827 * Client-initiated renegotiation is disabled by default. To allow it, use 828 the -client_renegotiation option, the SSL_OP_ALLOW_CLIENT_RENEGOTIATION 829 flag, or the "ClientRenegotiation" config parameter as appropriate. 830 831 *Rich Salz* 832 833 * Add "abspath" and "includedir" pragma's to config files, to prevent, 834 or modify relative pathname inclusion. 835 836 *Rich Salz* 837 838 * OpenSSL includes a cryptographic module that is intended to be FIPS 140-2 839 validated. Please consult the README-FIPS and 840 README-PROVIDERS files, as well as the migration guide. 841 842 *OpenSSL team members and many third party contributors* 843 844 * For the key types DH and DHX the allowed settable parameters are now different. 845 846 *Shane Lontis* 847 848 * The openssl commands that read keys, certificates, and CRLs now 849 automatically detect the PEM or DER format of the input files. 850 851 *David von Oheimb, Richard Levitte, and Tomáš Mráz* 852 853 * Added enhanced PKCS#12 APIs which accept a library context. 854 855 *Jon Spillett* 856 857 * The default manual page suffix ($MANSUFFIX) has been changed to "ossl" 858 859 *Matt Caswell* 860 861 * Added support for Kernel TLS (KTLS). 862 863 *Boris Pismenny, John Baldwin and Andrew Gallatin* 864 865 * Support for RFC 5746 secure renegotiation is now required by default for 866 SSL or TLS connections to succeed. 867 868 *Benjamin Kaduk* 869 870 * The signature of the `copy` functional parameter of the 871 EVP_PKEY_meth_set_copy() function has changed so its `src` argument is 872 now `const EVP_PKEY_CTX *` instead of `EVP_PKEY_CTX *`. Similarly 873 the signature of the `pub_decode` functional parameter of the 874 EVP_PKEY_asn1_set_public() function has changed so its `pub` argument is 875 now `const X509_PUBKEY *` instead of `X509_PUBKEY *`. 876 877 *David von Oheimb* 878 879 * The error return values from some control calls (ctrl) have changed. 880 881 *Paul Dale* 882 883 * A public key check is now performed during EVP_PKEY_derive_set_peer(). 884 885 *Shane Lontis* 886 887 * Many functions in the EVP_ namespace that are getters of values from 888 implementations or contexts were renamed to include get or get0 in their 889 names. Old names are provided as macro aliases for compatibility and 890 are not deprecated. 891 892 *Tomáš Mráz* 893 894 * The EVP_PKEY_CTRL_PKCS7_ENCRYPT, EVP_PKEY_CTRL_PKCS7_DECRYPT, 895 EVP_PKEY_CTRL_PKCS7_SIGN, EVP_PKEY_CTRL_CMS_ENCRYPT, 896 EVP_PKEY_CTRL_CMS_DECRYPT, and EVP_PKEY_CTRL_CMS_SIGN control operations 897 are deprecated. 898 899 *Tomáš Mráz* 900 901 * The EVP_PKEY_public_check() and EVP_PKEY_param_check() functions now work for 902 more key types. 903 904 * The output from the command line applications may have minor 905 changes. 906 907 *Paul Dale* 908 909 * The output from numerous "printing" may have minor changes. 910 911 *David von Oheimb* 912 913 * Windows thread synchronization uses read/write primitives (SRWLock) when 914 supported by the OS, otherwise CriticalSection continues to be used. 915 916 *Vincent Drake* 917 918 * Add filter BIO BIO_f_readbuffer() that allows BIO_tell() and BIO_seek() to 919 work on read only BIO source/sinks that do not support these functions. 920 This allows piping or redirection of a file BIO using stdin to be buffered 921 into memory. This is used internally in OSSL_DECODER_from_bio(). 922 923 *Shane Lontis* 924 925 * OSSL_STORE_INFO_get_type() may now return an additional value. In 1.1.1 926 this function would return one of the values OSSL_STORE_INFO_NAME, 927 OSSL_STORE_INFO_PKEY, OSSL_STORE_INFO_PARAMS, OSSL_STORE_INFO_CERT or 928 OSSL_STORE_INFO_CRL. Decoded public keys would previously have been reported 929 as type OSSL_STORE_INFO_PKEY in 1.1.1. In 3.0 decoded public keys are now 930 reported as having the new type OSSL_STORE_INFO_PUBKEY. Applications 931 using this function should be amended to handle the changed return value. 932 933 *Richard Levitte* 934 935 * Improved adherence to Enhanced Security Services (ESS, RFC 2634 and RFC 5035) 936 for the TSP and CMS Advanced Electronic Signatures (CAdES) implementations. 937 As required by RFC 5035 check both ESSCertID and ESSCertIDv2 if both present. 938 Correct the semantics of checking the validation chain in case ESSCertID{,v2} 939 contains more than one certificate identifier: This means that all 940 certificates referenced there MUST be part of the validation chain. 941 942 *David von Oheimb* 943 944 * The implementation of older EVP ciphers related to CAST, IDEA, SEED, RC2, RC4, 945 RC5, DESX and DES have been moved to the legacy provider. 946 947 *Matt Caswell* 948 949 * The implementation of the EVP digests MD2, MD4, MDC2, WHIRLPOOL and 950 RIPEMD-160 have been moved to the legacy provider. 951 952 *Matt Caswell* 953 954 * The deprecated function EVP_PKEY_get0() now returns NULL being called for a 955 provided key. 956 957 *Dmitry Belyavskiy* 958 959 * The deprecated functions EVP_PKEY_get0_RSA(), 960 EVP_PKEY_get0_DSA(), EVP_PKEY_get0_EC_KEY(), EVP_PKEY_get0_DH(), 961 EVP_PKEY_get0_hmac(), EVP_PKEY_get0_poly1305() and EVP_PKEY_get0_siphash() as 962 well as the similarly named "get1" functions behave differently in 963 OpenSSL 3.0. 964 965 *Matt Caswell* 966 967 * A number of functions handling low-level keys or engines were deprecated 968 including EVP_PKEY_set1_engine(), EVP_PKEY_get0_engine(), EVP_PKEY_assign(), 969 EVP_PKEY_get0(), EVP_PKEY_get0_hmac(), EVP_PKEY_get0_poly1305() and 970 EVP_PKEY_get0_siphash(). 971 972 *Matt Caswell* 973 974 * PKCS#5 PBKDF1 key derivation has been moved from PKCS5_PBE_keyivgen() into 975 the legacy crypto provider as an EVP_KDF. Applications requiring this KDF 976 will need to load the legacy crypto provider. This includes these PBE 977 algorithms which use this KDF: 978 - NID_pbeWithMD2AndDES_CBC 979 - NID_pbeWithMD5AndDES_CBC 980 - NID_pbeWithSHA1AndRC2_CBC 981 - NID_pbeWithMD2AndRC2_CBC 982 - NID_pbeWithMD5AndRC2_CBC 983 - NID_pbeWithSHA1AndDES_CBC 984 985 *Jon Spillett* 986 987 * Deprecated obsolete BIO_set_callback(), BIO_get_callback(), and 988 BIO_debug_callback() functions. 989 990 *Tomáš Mráz* 991 992 * Deprecated obsolete EVP_PKEY_CTX_get0_dh_kdf_ukm() and 993 EVP_PKEY_CTX_get0_ecdh_kdf_ukm() functions. 994 995 *Tomáš Mráz* 996 997 * The RAND_METHOD APIs have been deprecated. 998 999 *Paul Dale* 1000 1001 * The SRP APIs have been deprecated. 1002 1003 *Matt Caswell* 1004 1005 * Add a compile time option to prevent the caching of provider fetched 1006 algorithms. This is enabled by including the no-cached-fetch option 1007 at configuration time. 1008 1009 *Paul Dale* 1010 1011 * pkcs12 now uses defaults of PBKDF2, AES and SHA-256, with a MAC iteration 1012 count of PKCS12_DEFAULT_ITER. 1013 1014 *Tomáš Mráz and Sahana Prasad* 1015 1016 * The openssl speed command does not use low-level API calls anymore. 1017 1018 *Tomáš Mráz* 1019 1020 * Parallel dual-prime 1024-bit modular exponentiation for AVX512_IFMA 1021 capable processors. 1022 1023 *Ilya Albrekht, Sergey Kirillov, Andrey Matyukov (Intel Corp)* 1024 1025 * Combining the Configure options no-ec and no-dh no longer disables TLSv1.3. 1026 1027 *Matt Caswell* 1028 1029 * Implemented support for fully "pluggable" TLSv1.3 groups. This means that 1030 providers may supply their own group implementations (using either the "key 1031 exchange" or the "key encapsulation" methods) which will automatically be 1032 detected and used by libssl. 1033 1034 *Matt Caswell, Nicola Tuveri* 1035 1036 * The undocumented function X509_certificate_type() has been deprecated; 1037 1038 *Rich Salz* 1039 1040 * Deprecated the obsolete BN_pseudo_rand() and BN_pseudo_rand_range(). 1041 1042 *Tomáš Mráz* 1043 1044 * Removed RSA padding mode for SSLv23 (which was only used for 1045 SSLv2). This includes the functions RSA_padding_check_SSLv23() and 1046 RSA_padding_add_SSLv23() and the `-ssl` option in the deprecated 1047 `rsautl` command. 1048 1049 *Rich Salz* 1050 1051 * Deprecated the obsolete X9.31 RSA key generation related functions. 1052 1053 * While a callback function set via `SSL_CTX_set_cert_verify_callback()` 1054 is not allowed to return a value > 1, this is no more taken as failure. 1055 1056 *Viktor Dukhovni and David von Oheimb* 1057 1058 * Deprecated the obsolete X9.31 RSA key generation related functions 1059 BN_X931_generate_Xpq(), BN_X931_derive_prime_ex(), and 1060 BN_X931_generate_prime_ex(). 1061 1062 *Tomáš Mráz* 1063 1064 * The default key generation method for the regular 2-prime RSA keys was 1065 changed to the FIPS 186-4 B.3.6 method. 1066 1067 *Shane Lontis* 1068 1069 * Deprecated the BN_is_prime_ex() and BN_is_prime_fasttest_ex() functions. 1070 1071 *Kurt Roeckx* 1072 1073 * Deprecated EVP_MD_CTX_set_update_fn() and EVP_MD_CTX_update_fn(). 1074 1075 *Rich Salz* 1076 1077 * Deprecated the type OCSP_REQ_CTX and the functions OCSP_REQ_CTX_*() and 1078 replaced with OSSL_HTTP_REQ_CTX and the functions OSSL_HTTP_REQ_CTX_*(). 1079 1080 *Rich Salz, Richard Levitte, and David von Oheimb* 1081 1082 * Deprecated `X509_http_nbio()` and `X509_CRL_http_nbio()`. 1083 1084 *David von Oheimb* 1085 1086 * Deprecated `OCSP_parse_url()`. 1087 1088 *David von Oheimb* 1089 1090 * Validation of SM2 keys has been separated from the validation of regular EC 1091 keys. 1092 1093 *Nicola Tuveri* 1094 1095 * Behavior of the `pkey` app is changed, when using the `-check` or `-pubcheck` 1096 switches: a validation failure triggers an early exit, returning a failure 1097 exit status to the parent process. 1098 1099 *Nicola Tuveri* 1100 1101 * Changed behavior of SSL_CTX_set_ciphersuites() and SSL_set_ciphersuites() 1102 to ignore unknown ciphers. 1103 1104 *Otto Hollmann* 1105 1106 * The `-cipher-commands` and `-digest-commands` options 1107 of the command line utility `list` have been deprecated. 1108 Instead use the `-cipher-algorithms` and `-digest-algorithms` options. 1109 1110 *Dmitry Belyavskiy* 1111 1112 * Added convenience functions for generating asymmetric key pairs: 1113 The 'quick' one-shot (yet somewhat limited) function L<EVP_PKEY_Q_keygen(3)> 1114 and macros for the most common cases: <EVP_RSA_gen(3)> and L<EVP_EC_gen(3)>. 1115 1116 *David von Oheimb* 1117 1118 * All of the low level EC_KEY functions have been deprecated. 1119 1120 *Shane Lontis, Paul Dale, Richard Levitte, and Tomáš Mráz* 1121 1122 * Deprecated all the libcrypto and libssl error string loading 1123 functions. 1124 1125 *Richard Levitte* 1126 1127 * The functions SSL_CTX_set_tmp_dh_callback and SSL_set_tmp_dh_callback, as 1128 well as the macros SSL_CTX_set_tmp_dh() and SSL_set_tmp_dh() have been 1129 deprecated. 1130 1131 *Matt Caswell* 1132 1133 * The `-crypt` option to the `passwd` command line tool has been removed. 1134 1135 *Paul Dale* 1136 1137 * The -C option to the `x509`, `dhparam`, `dsaparam`, and `ecparam` commands 1138 were removed. 1139 1140 *Rich Salz* 1141 1142 * Add support for AES Key Wrap inverse ciphers to the EVP layer. 1143 1144 *Shane Lontis* 1145 1146 * Deprecated EVP_PKEY_set1_tls_encodedpoint() and 1147 EVP_PKEY_get1_tls_encodedpoint(). 1148 1149 *Matt Caswell* 1150 1151 * The security callback, which can be customised by application code, supports 1152 the security operation SSL_SECOP_TMP_DH. One location of the "other" parameter 1153 was incorrectly passing a DH object. It now passed an EVP_PKEY in all cases. 1154 1155 *Matt Caswell* 1156 1157 * Add PKCS7_get_octet_string() and PKCS7_type_is_other() to the public 1158 interface. Their functionality remains unchanged. 1159 1160 *Jordan Montgomery* 1161 1162 * Added new option for 'openssl list', '-providers', which will display the 1163 list of loaded providers, their names, version and status. It optionally 1164 displays their gettable parameters. 1165 1166 *Paul Dale* 1167 1168 * Removed EVP_PKEY_set_alias_type(). 1169 1170 *Richard Levitte* 1171 1172 * Deprecated `EVP_PKEY_CTX_set_rsa_keygen_pubexp()` and introduced 1173 `EVP_PKEY_CTX_set1_rsa_keygen_pubexp()`, which is now preferred. 1174 1175 *Jeremy Walch* 1176 1177 * Changed all "STACK" functions to be macros instead of inline functions. Macro 1178 parameters are still checked for type safety at compile time via helper 1179 inline functions. 1180 1181 *Matt Caswell* 1182 1183 * Remove the RAND_DRBG API 1184 1185 *Paul Dale and Matthias St. Pierre* 1186 1187 * Allow `SSL_set1_host()` and `SSL_add1_host()` to take IP literal addresses 1188 as well as actual hostnames. 1189 1190 *David Woodhouse* 1191 1192 * The 'MinProtocol' and 'MaxProtocol' configuration commands now silently 1193 ignore TLS protocol version bounds when configuring DTLS-based contexts, and 1194 conversely, silently ignore DTLS protocol version bounds when configuring 1195 TLS-based contexts. The commands can be repeated to set bounds of both 1196 types. The same applies with the corresponding "min_protocol" and 1197 "max_protocol" command-line switches, in case some application uses both TLS 1198 and DTLS. 1199 1200 SSL_CTX instances that are created for a fixed protocol version (e.g. 1201 `TLSv1_server_method()`) also silently ignore version bounds. Previously 1202 attempts to apply bounds to these protocol versions would result in an 1203 error. Now only the "version-flexible" SSL_CTX instances are subject to 1204 limits in configuration files in command-line options. 1205 1206 *Viktor Dukhovni* 1207 1208 * Deprecated the `ENGINE` API. Engines should be replaced with providers 1209 going forward. 1210 1211 *Paul Dale* 1212 1213 * Reworked the recorded ERR codes to make better space for system errors. 1214 To distinguish them, the macro `ERR_SYSTEM_ERROR()` indicates if the 1215 given code is a system error (true) or an OpenSSL error (false). 1216 1217 *Richard Levitte* 1218 1219 * Reworked the test perl framework to better allow parallel testing. 1220 1221 *Nicola Tuveri and David von Oheimb* 1222 1223 * Added ciphertext stealing algorithms AES-128-CBC-CTS, AES-192-CBC-CTS and 1224 AES-256-CBC-CTS to the providers. CS1, CS2 and CS3 variants are supported. 1225 1226 *Shane Lontis* 1227 1228 * 'Configure' has been changed to figure out the configuration target if 1229 none is given on the command line. Consequently, the 'config' script is 1230 now only a mere wrapper. All documentation is changed to only mention 1231 'Configure'. 1232 1233 *Rich Salz and Richard Levitte* 1234 1235 * Added a library context `OSSL_LIB_CTX` that applications as well as 1236 other libraries can use to form a separate context within which 1237 libcrypto operations are performed. 1238 1239 *Richard Levitte* 1240 1241 * Added various `_ex` functions to the OpenSSL API that support using 1242 a non-default `OSSL_LIB_CTX`. 1243 1244 *OpenSSL team* 1245 1246 * Handshake now fails if Extended Master Secret extension is dropped 1247 on renegotiation. 1248 1249 *Tomáš Mráz* 1250 1251 * Dropped interactive mode from the `openssl` program. 1252 1253 *Richard Levitte* 1254 1255 * Deprecated `EVP_PKEY_cmp()` and `EVP_PKEY_cmp_parameters()`. 1256 1257 *David von Oheimb and Shane Lontis* 1258 1259 * Deprecated `EC_METHOD_get_field_type()`. 1260 1261 *Billy Bob Brumley* 1262 1263 * Deprecated EC_GFp_simple_method(), EC_GFp_mont_method(), 1264 EC_GF2m_simple_method(), EC_GFp_nist_method(), EC_GFp_nistp224_method() 1265 EC_GFp_nistp256_method(), and EC_GFp_nistp521_method(). 1266 1267 *Billy Bob Brumley* 1268 1269 * Deprecated EC_GROUP_new(), EC_GROUP_method_of(), and EC_POINT_method_of(). 1270 1271 *Billy Bob Brumley* 1272 1273 * Add CAdES-BES signature verification support, mostly derived 1274 from ESSCertIDv2 TS (RFC 5816) contribution by Marek Klein. 1275 1276 *Filipe Raimundo da Silva* 1277 1278 * Add CAdES-BES signature scheme and attributes support (RFC 5126) to CMS API. 1279 1280 *Antonio Iacono* 1281 1282 * Added the AuthEnvelopedData content type structure (RFC 5083) with AES-GCM 1283 parameter (RFC 5084) for the Cryptographic Message Syntax (CMS). 1284 1285 *Jakub Zelenka* 1286 1287 * Deprecated EC_POINT_make_affine() and EC_POINTs_make_affine(). 1288 1289 *Billy Bob Brumley* 1290 1291 * Deprecated EC_GROUP_precompute_mult(), EC_GROUP_have_precompute_mult(), and 1292 EC_KEY_precompute_mult(). 1293 1294 *Billy Bob Brumley* 1295 1296 * Deprecated EC_POINTs_mul(). 1297 1298 *Billy Bob Brumley* 1299 1300 * Removed FIPS_mode() and FIPS_mode_set(). 1301 1302 *Shane Lontis* 1303 1304 * The SSL option SSL_OP_IGNORE_UNEXPECTED_EOF is introduced. 1305 1306 *Dmitry Belyavskiy* 1307 1308 * Deprecated EC_POINT_set_Jprojective_coordinates_GFp() and 1309 EC_POINT_get_Jprojective_coordinates_GFp(). 1310 1311 *Billy Bob Brumley* 1312 1313 * Added OSSL_PARAM_BLD to the public interface. This allows OSSL_PARAM 1314 arrays to be more easily constructed via a series of utility functions. 1315 Create a parameter builder using OSSL_PARAM_BLD_new(), add parameters using 1316 the various push functions and finally convert to a passable OSSL_PARAM 1317 array using OSSL_PARAM_BLD_to_param(). 1318 1319 *Paul Dale* 1320 1321 * The security strength of SHA1 and MD5 based signatures in TLS has been 1322 reduced. 1323 1324 *Kurt Roeckx* 1325 1326 * Added EVP_PKEY_set_type_by_keymgmt(), to initialise an EVP_PKEY to 1327 contain a provider side internal key. 1328 1329 *Richard Levitte* 1330 1331 * ASN1_verify(), ASN1_digest() and ASN1_sign() have been deprecated. 1332 1333 *Richard Levitte* 1334 1335 * Project text documents not yet having a proper file name extension 1336 (`HACKING`, `LICENSE`, `NOTES*`, `README*`, `VERSION`) have been renamed to 1337 `*.md` as far as reasonable, else `*.txt`, for better use with file managers. 1338 1339 *David von Oheimb* 1340 1341 * The main project documents (README, NEWS, CHANGES, INSTALL, SUPPORT) 1342 have been converted to Markdown with the goal to produce documents 1343 which not only look pretty when viewed online in the browser, but 1344 remain well readable inside a plain text editor. 1345 1346 To achieve this goal, a 'minimalistic' Markdown style has been applied 1347 which avoids formatting elements that interfere too much with the 1348 reading flow in the text file. For example, it 1349 1350 * avoids [ATX headings][] and uses [setext headings][] instead 1351 (which works for `<h1>` and `<h2>` headings only). 1352 * avoids [inline links][] and uses [reference links][] instead. 1353 * avoids [fenced code blocks][] and uses [indented code blocks][] instead. 1354 1355 [ATX headings]: https://github.github.com/gfm/#atx-headings 1356 [setext headings]: https://github.github.com/gfm/#setext-headings 1357 [inline links]: https://github.github.com/gfm/#inline-link 1358 [reference links]: https://github.github.com/gfm/#reference-link 1359 [fenced code blocks]: https://github.github.com/gfm/#fenced-code-blocks 1360 [indented code blocks]: https://github.github.com/gfm/#indented-code-blocks 1361 1362 *Matthias St. Pierre* 1363 1364 * The test suite is changed to preserve results of each test recipe. 1365 A new directory test-runs/ with subdirectories named like the 1366 test recipes are created in the build tree for this purpose. 1367 1368 *Richard Levitte* 1369 1370 * Added an implementation of CMP and CRMF (RFC 4210, RFC 4211 RFC 6712). 1371 This adds `crypto/cmp/`, `crpyto/crmf/`, `apps/cmp.c`, and `test/cmp_*`. 1372 See L<openssl-cmp(1)> and L<OSSL_CMP_exec_IR_ses(3)> as starting points. 1373 1374 *David von Oheimb, Martin Peylo* 1375 1376 * Generalized the HTTP client code from `crypto/ocsp/` into `crpyto/http/`. 1377 It supports arbitrary request and response content types, GET redirection, 1378 TLS, connections via HTTP(S) proxies, connections and exchange via 1379 user-defined BIOs (allowing implicit connections), persistent connections, 1380 and timeout checks. See L<OSSL_HTTP_transfer(3)> etc. for details. 1381 The legacy OCSP-focused (and only partly documented) API 1382 is retained for backward compatibility, while most of it is deprecated. 1383 1384 *David von Oheimb* 1385 1386 * Added `util/check-format.pl`, a tool for checking adherence to the 1387 OpenSSL coding style <https://www.openssl.org/policies/codingstyle.html>. 1388 The checks performed are incomplete and yield some false positives. 1389 Still the tool should be useful for detecting most typical glitches. 1390 1391 *David von Oheimb* 1392 1393 * `BIO_do_connect()` and `BIO_do_handshake()` have been extended: 1394 If domain name resolution yields multiple IP addresses all of them are tried 1395 after `connect()` failures. 1396 1397 *David von Oheimb* 1398 1399 * All of the low level RSA functions have been deprecated. 1400 1401 *Paul Dale* 1402 1403 * X509 certificates signed using SHA1 are no longer allowed at security 1404 level 1 and above. 1405 1406 *Kurt Roeckx* 1407 1408 * The command line utilities dhparam, dsa, gendsa and dsaparam have been 1409 modified to use PKEY APIs. These commands are now in maintenance mode 1410 and no new features will be added to them. 1411 1412 *Paul Dale* 1413 1414 * The command line utility rsautl has been deprecated. 1415 1416 *Paul Dale* 1417 1418 * The command line utilities genrsa and rsa have been modified to use PKEY 1419 APIs. They now write PKCS#8 keys by default. These commands are now in 1420 maintenance mode and no new features will be added to them. 1421 1422 *Paul Dale* 1423 1424 * All of the low level DH functions have been deprecated. 1425 1426 *Paul Dale and Matt Caswell* 1427 1428 * All of the low level DSA functions have been deprecated. 1429 1430 *Paul Dale* 1431 1432 * Reworked the treatment of EC EVP_PKEYs with the SM2 curve to 1433 automatically become EVP_PKEY_SM2 rather than EVP_PKEY_EC. 1434 1435 *Richard Levitte* 1436 1437 * Deprecated low level ECDH and ECDSA functions. 1438 1439 *Paul Dale* 1440 1441 * Deprecated EVP_PKEY_decrypt_old() and EVP_PKEY_encrypt_old(). 1442 1443 *Richard Levitte* 1444 1445 * Enhanced the documentation of EVP_PKEY_get_size(), EVP_PKEY_get_bits() 1446 and EVP_PKEY_get_security_bits(). Especially EVP_PKEY_get_size() needed 1447 a new formulation to include all the things it can be used for, 1448 as well as words of caution. 1449 1450 *Richard Levitte* 1451 1452 * The SSL_CTX_set_tlsext_ticket_key_cb(3) function has been deprecated. 1453 1454 *Paul Dale* 1455 1456 * All of the low level HMAC functions have been deprecated. 1457 1458 *Paul Dale and David von Oheimb* 1459 1460 * Over two thousand fixes were made to the documentation, including: 1461 - Common options (such as -rand/-writerand, TLS version control, etc) 1462 were refactored and point to newly-enhanced descriptions in openssl.pod. 1463 - Added style conformance for all options (with help from Richard Levitte), 1464 documented all reported missing options, added a CI build to check 1465 that all options are documented and that no unimplemented options 1466 are documented. 1467 - Documented some internals, such as all use of environment variables. 1468 - Addressed all internal broken L<> references. 1469 1470 *Rich Salz* 1471 1472 * All of the low level CMAC functions have been deprecated. 1473 1474 *Paul Dale* 1475 1476 * The low-level MD2, MD4, MD5, MDC2, RIPEMD160 and Whirlpool digest 1477 functions have been deprecated. 1478 1479 *Paul Dale and David von Oheimb* 1480 1481 * Corrected the documentation of the return values from the `EVP_DigestSign*` 1482 set of functions. The documentation mentioned negative values for some 1483 errors, but this was never the case, so the mention of negative values 1484 was removed. 1485 1486 Code that followed the documentation and thereby check with something 1487 like `EVP_DigestSignInit(...) <= 0` will continue to work undisturbed. 1488 1489 *Richard Levitte* 1490 1491 * All of the low level cipher functions have been deprecated. 1492 1493 *Matt Caswell and Paul Dale* 1494 1495 * Removed include/openssl/opensslconf.h.in and replaced it with 1496 include/openssl/configuration.h.in, which differs in not including 1497 <openssl/macros.h>. A short header include/openssl/opensslconf.h 1498 was added to include both. 1499 1500 This allows internal hacks where one might need to modify the set 1501 of configured macros, for example this if deprecated symbols are 1502 still supposed to be available internally: 1503 1504 #include <openssl/configuration.h> 1505 1506 #undef OPENSSL_NO_DEPRECATED 1507 #define OPENSSL_SUPPRESS_DEPRECATED 1508 1509 #include <openssl/macros.h> 1510 1511 This should not be used by applications that use the exported 1512 symbols, as that will lead to linking errors. 1513 1514 *Richard Levitte* 1515 1516 * Fixed an overflow bug in the x64_64 Montgomery squaring procedure 1517 used in exponentiation with 512-bit moduli. No EC algorithms are 1518 affected. Analysis suggests that attacks against 2-prime RSA1024, 1519 3-prime RSA1536, and DSA1024 as a result of this defect would be very 1520 difficult to perform and are not believed likely. Attacks against DH512 1521 are considered just feasible. However, for an attack the target would 1522 have to re-use the DH512 private key, which is not recommended anyway. 1523 Also applications directly using the low-level API BN_mod_exp may be 1524 affected if they use BN_FLG_CONSTTIME. 1525 ([CVE-2019-1551]) 1526 1527 *Andy Polyakov* 1528 1529 * Most memory-debug features have been deprecated, and the functionality 1530 replaced with no-ops. 1531 1532 *Rich Salz* 1533 1534 * Added documentation for the STACK API. 1535 1536 *Rich Salz* 1537 1538 * Introduced a new method type and API, OSSL_ENCODER, to represent 1539 generic encoders. These do the same sort of job that PEM writers 1540 and d2i functions do, but with support for methods supplied by 1541 providers, and the possibility for providers to support other 1542 formats as well. 1543 1544 *Richard Levitte* 1545 1546 * Introduced a new method type and API, OSSL_DECODER, to represent 1547 generic decoders. These do the same sort of job that PEM readers 1548 and i2d functions do, but with support for methods supplied by 1549 providers, and the possibility for providers to support other 1550 formats as well. 1551 1552 *Richard Levitte* 1553 1554 * Added a .pragma directive to the syntax of configuration files, to 1555 allow varying behavior in a supported and predictable manner. 1556 Currently added pragma: 1557 1558 .pragma dollarid:on 1559 1560 This allows dollar signs to be a keyword character unless it's 1561 followed by a opening brace or parenthesis. This is useful for 1562 platforms where dollar signs are commonly used in names, such as 1563 volume names and system directory names on VMS. 1564 1565 *Richard Levitte* 1566 1567 * Added functionality to create an EVP_PKEY from user data. 1568 1569 *Richard Levitte* 1570 1571 * Change the interpretation of the '--api' configuration option to 1572 mean that this is a desired API compatibility level with no 1573 further meaning. The previous interpretation, that this would 1574 also mean to remove all deprecated symbols up to and including 1575 the given version, no requires that 'no-deprecated' is also used 1576 in the configuration. 1577 1578 When building applications, the desired API compatibility level 1579 can be set with the OPENSSL_API_COMPAT macro like before. For 1580 API compatibility version below 3.0, the old style numerical 1581 value is valid as before, such as -DOPENSSL_API_COMPAT=0x10100000L. 1582 For version 3.0 and on, the value is expected to be the decimal 1583 value calculated from the major and minor version like this: 1584 1585 MAJOR * 10000 + MINOR * 100 1586 1587 Examples: 1588 1589 -DOPENSSL_API_COMPAT=30000 For 3.0 1590 -DOPENSSL_API_COMPAT=30200 For 3.2 1591 1592 To hide declarations that are deprecated up to and including the 1593 given API compatibility level, -DOPENSSL_NO_DEPRECATED must be 1594 given when building the application as well. 1595 1596 *Richard Levitte* 1597 1598 * Added the X509_LOOKUP_METHOD called X509_LOOKUP_store, to allow 1599 access to certificate and CRL stores via URIs and OSSL_STORE 1600 loaders. 1601 1602 This adds the following functions: 1603 1604 - X509_LOOKUP_store() 1605 - X509_STORE_load_file() 1606 - X509_STORE_load_path() 1607 - X509_STORE_load_store() 1608 - SSL_add_store_cert_subjects_to_stack() 1609 - SSL_CTX_set_default_verify_store() 1610 - SSL_CTX_load_verify_file() 1611 - SSL_CTX_load_verify_dir() 1612 - SSL_CTX_load_verify_store() 1613 1614 *Richard Levitte* 1615 1616 * Added a new method to gather entropy on VMS, based on SYS$GET_ENTROPY. 1617 The presence of this system service is determined at run-time. 1618 1619 *Richard Levitte* 1620 1621 * Added functionality to create an EVP_PKEY context based on data 1622 for methods from providers. This takes an algorithm name and a 1623 property query string and simply stores them, with the intent 1624 that any operation that uses this context will use those strings 1625 to fetch the needed methods implicitly, thereby making the port 1626 of application written for pre-3.0 OpenSSL easier. 1627 1628 *Richard Levitte* 1629 1630 * The undocumented function NCONF_WIN32() has been deprecated; for 1631 conversion details see the HISTORY section of doc/man5/config.pod 1632 1633 *Rich Salz* 1634 1635 * Introduced the new functions EVP_DigestSignInit_ex() and 1636 EVP_DigestVerifyInit_ex(). The macros EVP_DigestSignUpdate() and 1637 EVP_DigestVerifyUpdate() have been converted to functions. See the man 1638 pages for further details. 1639 1640 *Matt Caswell* 1641 1642 * Over two thousand fixes were made to the documentation, including: 1643 adding missing command flags, better style conformance, documentation 1644 of internals, etc. 1645 1646 *Rich Salz, Richard Levitte* 1647 1648 * s390x assembly pack: add hardware-support for P-256, P-384, P-521, 1649 X25519, X448, Ed25519 and Ed448. 1650 1651 *Patrick Steuer* 1652 1653 * Print all values for a PKCS#12 attribute with 'openssl pkcs12', not just 1654 the first value. 1655 1656 *Jon Spillett* 1657 1658 * Deprecated the public definition of `ERR_STATE` as well as the function 1659 `ERR_get_state()`. This is done in preparation of making `ERR_STATE` an 1660 opaque type. 1661 1662 *Richard Levitte* 1663 1664 * Added ERR functionality to give callers access to the stored function 1665 names that have replaced the older function code based functions. 1666 1667 New functions are ERR_peek_error_func(), ERR_peek_last_error_func(), 1668 ERR_peek_error_data(), ERR_peek_last_error_data(), ERR_get_error_all(), 1669 ERR_peek_error_all() and ERR_peek_last_error_all(). 1670 1671 Deprecate ERR functions ERR_get_error_line(), ERR_get_error_line_data(), 1672 ERR_peek_error_line_data(), ERR_peek_last_error_line_data() and 1673 ERR_func_error_string(). 1674 1675 *Richard Levitte* 1676 1677 * Extended testing to be verbose for failing tests only. The make variables 1678 VERBOSE_FAILURE or VF can be used to enable this: 1679 1680 $ make VF=1 test # Unix 1681 $ mms /macro=(VF=1) test ! OpenVMS 1682 $ nmake VF=1 test # Windows 1683 1684 *Richard Levitte* 1685 1686 * Added the `-copy_extensions` option to the `x509` command for use with 1687 `-req` and `-x509toreq`. When given with the `copy` or `copyall` argument, 1688 all extensions in the request are copied to the certificate or vice versa. 1689 1690 *David von Oheimb*, *Kirill Stefanenkov <kirill_stefanenkov@rambler.ru>* 1691 1692 * Added the `-copy_extensions` option to the `req` command for use with 1693 `-x509`. When given with the `copy` or `copyall` argument, 1694 all extensions in the certification request are copied to the certificate. 1695 1696 *David von Oheimb* 1697 1698 * The `x509`, `req`, and `ca` commands now make sure that X.509v3 certificates 1699 they generate are by default RFC 5280 compliant in the following sense: 1700 There is a subjectKeyIdentifier extension with a hash value of the public key 1701 and for not self-signed certs there is an authorityKeyIdentifier extension 1702 with a keyIdentifier field or issuer information identifying the signing key. 1703 This is done unless some configuration overrides the new default behavior, 1704 such as `subjectKeyIdentifier = none` and `authorityKeyIdentifier = none`. 1705 1706 *David von Oheimb* 1707 1708 * Added several checks to `X509_verify_cert()` according to requirements in 1709 RFC 5280 in case `X509_V_FLAG_X509_STRICT` is set 1710 (which may be done by using the CLI option `-x509_strict`): 1711 * The basicConstraints of CA certificates must be marked critical. 1712 * CA certificates must explicitly include the keyUsage extension. 1713 * If a pathlenConstraint is given the key usage keyCertSign must be allowed. 1714 * The issuer name of any certificate must not be empty. 1715 * The subject name of CA certs, certs with keyUsage crlSign, 1716 and certs without subjectAlternativeName must not be empty. 1717 * If a subjectAlternativeName extension is given it must not be empty. 1718 * The signatureAlgorithm field and the cert signature must be consistent. 1719 * Any given authorityKeyIdentifier and any given subjectKeyIdentifier 1720 must not be marked critical. 1721 * The authorityKeyIdentifier must be given for X.509v3 certs 1722 unless they are self-signed. 1723 * The subjectKeyIdentifier must be given for all X.509v3 CA certs. 1724 1725 *David von Oheimb* 1726 1727 * Certificate verification using `X509_verify_cert()` meanwhile rejects EC keys 1728 with explicit curve parameters (specifiedCurve) as required by RFC 5480. 1729 1730 *Tomáš Mráz* 1731 1732 * For built-in EC curves, ensure an EC_GROUP built from the curve name is 1733 used even when parsing explicit parameters, when loading a encoded key 1734 or calling `EC_GROUP_new_from_ecpkparameters()`/ 1735 `EC_GROUP_new_from_ecparameters()`. 1736 This prevents bypass of security hardening and performance gains, 1737 especially for curves with specialized EC_METHODs. 1738 By default, if a key encoded with explicit parameters is loaded and later 1739 encoded, the output is still encoded with explicit parameters, even if 1740 internally a "named" EC_GROUP is used for computation. 1741 1742 *Nicola Tuveri* 1743 1744 * Compute ECC cofactors if not provided during EC_GROUP construction. Before 1745 this change, EC_GROUP_set_generator would accept order and/or cofactor as 1746 NULL. After this change, only the cofactor parameter can be NULL. It also 1747 does some minimal sanity checks on the passed order. 1748 ([CVE-2019-1547]) 1749 1750 *Billy Bob Brumley* 1751 1752 * Fixed a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey. 1753 An attack is simple, if the first CMS_recipientInfo is valid but the 1754 second CMS_recipientInfo is chosen ciphertext. If the second 1755 recipientInfo decodes to PKCS #1 v1.5 form plaintext, the correct 1756 encryption key will be replaced by garbage, and the message cannot be 1757 decoded, but if the RSA decryption fails, the correct encryption key is 1758 used and the recipient will not notice the attack. 1759 As a work around for this potential attack the length of the decrypted 1760 key must be equal to the cipher default key length, in case the 1761 certifiate is not given and all recipientInfo are tried out. 1762 The old behaviour can be re-enabled in the CMS code by setting the 1763 CMS_DEBUG_DECRYPT flag. 1764 1765 *Bernd Edlinger* 1766 1767 * Early start up entropy quality from the DEVRANDOM seed source has been 1768 improved for older Linux systems. The RAND subsystem will wait for 1769 /dev/random to be producing output before seeding from /dev/urandom. 1770 The seeded state is stored for future library initialisations using 1771 a system global shared memory segment. The shared memory identifier 1772 can be configured by defining OPENSSL_RAND_SEED_DEVRANDOM_SHM_ID to 1773 the desired value. The default identifier is 114. 1774 1775 *Paul Dale* 1776 1777 * Revised BN_generate_prime_ex to not avoid factors 2..17863 in p-1 1778 when primes for RSA keys are computed. 1779 Since we previously always generated primes == 2 (mod 3) for RSA keys, 1780 the 2-prime and 3-prime RSA modules were easy to distinguish, since 1781 `N = p*q = 1 (mod 3)`, but `N = p*q*r = 2 (mod 3)`. Therefore fingerprinting 1782 2-prime vs. 3-prime RSA keys was possible by computing N mod 3. 1783 This avoids possible fingerprinting of newly generated RSA modules. 1784 1785 *Bernd Edlinger* 1786 1787 * Correct the extended master secret constant on EBCDIC systems. Without this 1788 fix TLS connections between an EBCDIC system and a non-EBCDIC system that 1789 negotiate EMS will fail. Unfortunately this also means that TLS connections 1790 between EBCDIC systems with this fix, and EBCDIC systems without this 1791 fix will fail if they negotiate EMS. 1792 1793 *Matt Caswell* 1794 1795 * Changed the library initialisation so that the config file is now loaded 1796 by default. This was already the case for libssl. It now occurs for both 1797 libcrypto and libssl. Use the OPENSSL_INIT_NO_LOAD_CONFIG option to 1798 `OPENSSL_init_crypto()` to suppress automatic loading of a config file. 1799 1800 *Matt Caswell* 1801 1802 * Introduced new error raising macros, `ERR_raise()` and `ERR_raise_data()`, 1803 where the former acts as a replacement for `ERR_put_error()`, and the 1804 latter replaces the combination `ERR_put_error()` + `ERR_add_error_data()`. 1805 `ERR_raise_data()` adds more flexibility by taking a format string and 1806 an arbitrary number of arguments following it, to be processed with 1807 `BIO_snprintf()`. 1808 1809 *Richard Levitte* 1810 1811 * Introduced a new function, `OSSL_PROVIDER_available()`, which can be used 1812 to check if a named provider is loaded and available. When called, it 1813 will also activate all fallback providers if such are still present. 1814 1815 *Richard Levitte* 1816 1817 * Enforce a minimum DH modulus size of 512 bits. 1818 1819 *Bernd Edlinger* 1820 1821 * Changed DH parameters to generate the order q subgroup instead of 2q. 1822 Previously generated DH parameters are still accepted by DH_check 1823 but DH_generate_key works around that by clearing bit 0 of the 1824 private key for those. This avoids leaking bit 0 of the private key. 1825 1826 *Bernd Edlinger* 1827 1828 * Significantly reduce secure memory usage by the randomness pools. 1829 1830 *Paul Dale* 1831 1832 * `{CRYPTO,OPENSSL}_mem_debug_{push,pop}` are now no-ops and have been 1833 deprecated. 1834 1835 *Rich Salz* 1836 1837 * A new type, EVP_KEYEXCH, has been introduced to represent key exchange 1838 algorithms. An implementation of a key exchange algorithm can be obtained 1839 by using the function EVP_KEYEXCH_fetch(). An EVP_KEYEXCH algorithm can be 1840 used in a call to EVP_PKEY_derive_init_ex() which works in a similar way to 1841 the older EVP_PKEY_derive_init() function. See the man pages for the new 1842 functions for further details. 1843 1844 *Matt Caswell* 1845 1846 * The EVP_PKEY_CTX_set_dh_pad() macro has now been converted to a function. 1847 1848 *Matt Caswell* 1849 1850 * Removed the function names from error messages and deprecated the 1851 xxx_F_xxx define's. 1852 1853 *Richard Levitte* 1854 1855 * Removed NextStep support and the macro OPENSSL_UNISTD 1856 1857 *Rich Salz* 1858 1859 * Removed DES_check_key. Also removed OPENSSL_IMPLEMENT_GLOBAL, 1860 OPENSSL_GLOBAL_REF, OPENSSL_DECLARE_GLOBAL. 1861 Also removed "export var as function" capability; we do not export 1862 variables, only functions. 1863 1864 *Rich Salz* 1865 1866 * RC5_32_set_key has been changed to return an int type, with 0 indicating 1867 an error and 1 indicating success. In previous versions of OpenSSL this 1868 was a void type. If a key was set longer than the maximum possible this 1869 would crash. 1870 1871 *Matt Caswell* 1872 1873 * Support SM2 signing and verification schemes with X509 certificate. 1874 1875 *Paul Yang* 1876 1877 * Use SHA256 as the default digest for TS query in the `ts` app. 1878 1879 *Tomáš Mráz* 1880 1881 * Change PBKDF2 to conform to SP800-132 instead of the older PKCS5 RFC2898. 1882 1883 *Shane Lontis* 1884 1885 * Default cipher lists/suites are now available via a function, the 1886 #defines are deprecated. 1887 1888 *Todd Short* 1889 1890 * Add target VC-WIN32-UWP, VC-WIN64A-UWP, VC-WIN32-ARM-UWP and 1891 VC-WIN64-ARM-UWP in Windows OneCore target for making building libraries 1892 for Windows Store apps easier. Also, the "no-uplink" option has been added. 1893 1894 *Kenji Mouri* 1895 1896 * Join the directories crypto/x509 and crypto/x509v3 1897 1898 *Richard Levitte* 1899 1900 * Added command 'openssl kdf' that uses the EVP_KDF API. 1901 1902 *Shane Lontis* 1903 1904 * Added command 'openssl mac' that uses the EVP_MAC API. 1905 1906 *Shane Lontis* 1907 1908 * Added OPENSSL_info() to get diverse built-in OpenSSL data, such 1909 as default directories. Also added the command 'openssl info' 1910 for scripting purposes. 1911 1912 *Richard Levitte* 1913 1914 * The functions AES_ige_encrypt() and AES_bi_ige_encrypt() have been 1915 deprecated. 1916 1917 *Matt Caswell* 1918 1919 * Add prediction resistance to the DRBG reseeding process. 1920 1921 *Paul Dale* 1922 1923 * Limit the number of blocks in a data unit for AES-XTS to 2^20 as 1924 mandated by IEEE Std 1619-2018. 1925 1926 *Paul Dale* 1927 1928 * Added newline escaping functionality to a filename when using openssl dgst. 1929 This output format is to replicate the output format found in the `*sum` 1930 checksum programs. This aims to preserve backward compatibility. 1931 1932 *Matt Eaton, Richard Levitte, and Paul Dale* 1933 1934 * Removed the heartbeat message in DTLS feature, as it has very 1935 little usage and doesn't seem to fulfill a valuable purpose. 1936 The configuration option is now deprecated. 1937 1938 *Richard Levitte* 1939 1940 * Changed the output of 'openssl {digestname} < file' to display the 1941 digest name in its output. 1942 1943 *Richard Levitte* 1944 1945 * Added a new generic trace API which provides support for enabling 1946 instrumentation through trace output. 1947 1948 *Richard Levitte & Matthias St. Pierre* 1949 1950 * Added build tests for C++. These are generated files that only do one 1951 thing, to include one public OpenSSL head file each. This tests that 1952 the public header files can be usefully included in a C++ application. 1953 1954 This test isn't enabled by default. It can be enabled with the option 1955 'enable-buildtest-c++'. 1956 1957 *Richard Levitte* 1958 1959 * Added KB KDF (EVP_KDF_KB) to EVP_KDF. 1960 1961 *Robbie Harwood* 1962 1963 * Added SSH KDF (EVP_KDF_SSHKDF) and KRB5 KDF (EVP_KDF_KRB5KDF) to EVP_KDF. 1964 1965 *Simo Sorce* 1966 1967 * Added Single Step KDF (EVP_KDF_SS), X963 KDF, and X942 KDF to EVP_KDF. 1968 1969 *Shane Lontis* 1970 1971 * Added KMAC to EVP_MAC. 1972 1973 *Shane Lontis* 1974 1975 * Added property based algorithm implementation selection framework to 1976 the core. 1977 1978 *Paul Dale* 1979 1980 * Added SCA hardening for modular field inversion in EC_GROUP through 1981 a new dedicated field_inv() pointer in EC_METHOD. 1982 This also addresses a leakage affecting conversions from projective 1983 to affine coordinates. 1984 1985 *Billy Bob Brumley, Nicola Tuveri* 1986 1987 * Added EVP_KDF, an EVP layer KDF API, to simplify adding KDF and PRF 1988 implementations. This includes an EVP_PKEY to EVP_KDF bridge for 1989 those algorithms that were already supported through the EVP_PKEY API 1990 (scrypt, TLS1 PRF and HKDF). The low-level KDF functions for PBKDF2 1991 and scrypt are now wrappers that call EVP_KDF. 1992 1993 *David Makepeace* 1994 1995 * Build devcrypto engine as a dynamic engine. 1996 1997 *Eneas U de Queiroz* 1998 1999 * Add keyed BLAKE2 to EVP_MAC. 2000 2001 *Antoine Salon* 2002 2003 * Fix a bug in the computation of the endpoint-pair shared secret used 2004 by DTLS over SCTP. This breaks interoperability with older versions 2005 of OpenSSL like OpenSSL 1.1.0 and OpenSSL 1.0.2. There is a runtime 2006 switch SSL_MODE_DTLS_SCTP_LABEL_LENGTH_BUG (off by default) enabling 2007 interoperability with such broken implementations. However, enabling 2008 this switch breaks interoperability with correct implementations. 2009 2010 * Fix a use after free bug in d2i_X509_PUBKEY when overwriting a 2011 re-used X509_PUBKEY object if the second PUBKEY is malformed. 2012 2013 *Bernd Edlinger* 2014 2015 * Move strictness check from EVP_PKEY_asn1_new() to EVP_PKEY_asn1_add0(). 2016 2017 *Richard Levitte* 2018 2019 * Changed the license to the Apache License v2.0. 2020 2021 *Richard Levitte* 2022 2023 * Switch to a new version scheme using three numbers MAJOR.MINOR.PATCH. 2024 2025 - Major releases (indicated by incrementing the MAJOR release number) 2026 may introduce incompatible API/ABI changes. 2027 - Minor releases (indicated by incrementing the MINOR release number) 2028 may introduce new features but retain API/ABI compatibility. 2029 - Patch releases (indicated by incrementing the PATCH number) 2030 are intended for bug fixes and other improvements of existing 2031 features only (like improving performance or adding documentation) 2032 and retain API/ABI compatibility. 2033 2034 *Richard Levitte* 2035 2036 * Add support for RFC5297 SIV mode (siv128), including AES-SIV. 2037 2038 *Todd Short* 2039 2040 * Remove the 'dist' target and add a tarball building script. The 2041 'dist' target has fallen out of use, and it shouldn't be 2042 necessary to configure just to create a source distribution. 2043 2044 *Richard Levitte* 2045 2046 * Recreate the OS390-Unix config target. It no longer relies on a 2047 special script like it did for OpenSSL pre-1.1.0. 2048 2049 *Richard Levitte* 2050 2051 * Instead of having the source directories listed in Configure, add 2052 a 'build.info' keyword SUBDIRS to indicate what sub-directories to 2053 look into. 2054 2055 *Richard Levitte* 2056 2057 * Add GMAC to EVP_MAC. 2058 2059 *Paul Dale* 2060 2061 * Ported the HMAC, CMAC and SipHash EVP_PKEY_METHODs to EVP_MAC. 2062 2063 *Richard Levitte* 2064 2065 * Added EVP_MAC, an EVP layer MAC API, to simplify adding MAC 2066 implementations. This includes a generic EVP_PKEY to EVP_MAC bridge, 2067 to facilitate the continued use of MACs through raw private keys in 2068 functionality such as `EVP_DigestSign*` and `EVP_DigestVerify*`. 2069 2070 *Richard Levitte* 2071 2072 * Deprecate ECDH_KDF_X9_62(). 2073 2074 *Antoine Salon* 2075 2076 * Added EVP_PKEY_ECDH_KDF_X9_63 and ecdh_KDF_X9_63() as replacements for 2077 the EVP_PKEY_ECDH_KDF_X9_62 KDF type and ECDH_KDF_X9_62(). The old names 2078 are retained for backwards compatibility. 2079 2080 *Antoine Salon* 2081 2082 * AES-XTS mode now enforces that its two keys are different to mitigate 2083 the attacked described in "Efficient Instantiations of Tweakable 2084 Blockciphers and Refinements to Modes OCB and PMAC" by Phillip Rogaway. 2085 Details of this attack can be obtained from: 2086 <http://web.cs.ucdavis.edu/%7Erogaway/papers/offsets.pdf> 2087 2088 *Paul Dale* 2089 2090 * Rename the object files, i.e. give them other names than in previous 2091 versions. Their names now include the name of the final product, as 2092 well as its type mnemonic (bin, lib, shlib). 2093 2094 *Richard Levitte* 2095 2096 * Added new option for 'openssl list', '-objects', which will display the 2097 list of built in objects, i.e. OIDs with names. 2098 2099 *Richard Levitte* 2100 2101 * Added the options `-crl_lastupdate` and `-crl_nextupdate` to `openssl ca`, 2102 allowing the `lastUpdate` and `nextUpdate` fields in the generated CRL to 2103 be set explicitly. 2104 2105 *Chris Novakovic* 2106 2107 * Added support for Linux Kernel TLS data-path. The Linux Kernel data-path 2108 improves application performance by removing data copies and providing 2109 applications with zero-copy system calls such as sendfile and splice. 2110 2111 *Boris Pismenny* 2112 2113 * The SSL option SSL_OP_CLEANSE_PLAINTEXT is introduced. 2114 2115 *Martin Elshuber* 2116 2117 * `PKCS12_parse` now maintains the order of the parsed certificates 2118 when outputting them via `*ca` (rather than reversing it). 2119 2120 *David von Oheimb* 2121 2122 * Deprecated pthread fork support methods. 2123 2124 *Randall S. Becker* 2125 2126 * Added support for FFDHE key exchange in TLS 1.3. 2127 2128 *Raja Ashok* 2129 2130 * Added a new concept for OpenSSL plugability: providers. This 2131 functionality is designed to replace the ENGINE API and ENGINE 2132 implementations, and to be much more dynamic, allowing provider 2133 authors to introduce new algorithms among other things, as long as 2134 there's an API that supports the algorithm type. 2135 2136 With this concept comes a new core API for interaction between 2137 libcrypto and provider implementations. Public libcrypto functions 2138 that want to use providers do so through this core API. 2139 2140 The main documentation for this core API is found in 2141 doc/man7/provider.pod, doc/man7/provider-base.pod, and they in turn 2142 refer to other manuals describing the API specific for supported 2143 algorithm types (also called operations). 2144 2145 *The OpenSSL team* 2146 2147OpenSSL 1.1.1 2148------------- 2149 2150### Changes between 1.1.1l and 1.1.1m [xx XXX xxxx] 2151 2152 * Avoid loading of a dynamic engine twice. 2153 2154 *Bernd Edlinger* 2155 2156 * Prioritise DANE TLSA issuer certs over peer certs 2157 2158 *Viktor Dukhovni* 2159 2160 * Fixed random API for MacOS prior to 10.12 2161 2162 These MacOS versions don't support the CommonCrypto APIs 2163 2164 *Lenny Primak* 2165 2166### Changes between 1.1.1k and 1.1.1l [24 Aug 2021] 2167 2168 * Fixed an SM2 Decryption Buffer Overflow. 2169 2170 In order to decrypt SM2 encrypted data an application is expected to 2171 call the API function EVP_PKEY_decrypt(). Typically an application will 2172 call this function twice. The first time, on entry, the "out" parameter 2173 can be NULL and, on exit, the "outlen" parameter is populated with the 2174 buffer size required to hold the decrypted plaintext. The application 2175 can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() 2176 again, but this time passing a non-NULL value for the "out" parameter. 2177 2178 A bug in the implementation of the SM2 decryption code means that the 2179 calculation of the buffer size required to hold the plaintext returned 2180 by the first call to EVP_PKEY_decrypt() can be smaller than the actual 2181 size required by the second call. This can lead to a buffer overflow 2182 when EVP_PKEY_decrypt() is called by the application a second time with 2183 a buffer that is too small. 2184 2185 A malicious attacker who is able present SM2 content for decryption to 2186 an application could cause attacker chosen data to overflow the buffer 2187 by up to a maximum of 62 bytes altering the contents of other data held 2188 after the buffer, possibly changing application behaviour or causing 2189 the application to crash. The location of the buffer is application 2190 dependent but is typically heap allocated. 2191 ([CVE-2021-3711]) 2192 2193 *Matt Caswell* 2194 2195 * Fixed various read buffer overruns processing ASN.1 strings 2196 2197 ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING 2198 structure which contains a buffer holding the string data and a field 2199 holding the buffer length. This contrasts with normal C strings which 2200 are repesented as a buffer for the string data which is terminated 2201 with a NUL (0) byte. 2202 2203 Although not a strict requirement, ASN.1 strings that are parsed using 2204 OpenSSL's own "d2i" functions (and other similar parsing functions) as 2205 well as any string whose value has been set with the ASN1_STRING_set() 2206 function will additionally NUL terminate the byte array in the 2207 ASN1_STRING structure. 2208 2209 However, it is possible for applications to directly construct valid 2210 ASN1_STRING structures which do not NUL terminate the byte array by 2211 directly setting the "data" and "length" fields in the ASN1_STRING 2212 array. This can also happen by using the ASN1_STRING_set0() function. 2213 2214 Numerous OpenSSL functions that print ASN.1 data have been found to 2215 assume that the ASN1_STRING byte array will be NUL terminated, even 2216 though this is not guaranteed for strings that have been directly 2217 constructed. Where an application requests an ASN.1 structure to be 2218 printed, and where that ASN.1 structure contains ASN1_STRINGs that have 2219 been directly constructed by the application without NUL terminating 2220 the "data" field, then a read buffer overrun can occur. 2221 2222 The same thing can also occur during name constraints processing 2223 of certificates (for example if a certificate has been directly 2224 constructed by the application instead of loading it via the OpenSSL 2225 parsing functions, and the certificate contains non NUL terminated 2226 ASN1_STRING structures). It can also occur in the X509_get1_email(), 2227 X509_REQ_get1_email() and X509_get1_ocsp() functions. 2228 2229 If a malicious actor can cause an application to directly construct an 2230 ASN1_STRING and then process it through one of the affected OpenSSL 2231 functions then this issue could be hit. This might result in a crash 2232 (causing a Denial of Service attack). It could also result in the 2233 disclosure of private memory contents (such as private keys, or 2234 sensitive plaintext). 2235 ([CVE-2021-3712]) 2236 2237 *Matt Caswell* 2238 2239### Changes between 1.1.1j and 1.1.1k [25 Mar 2021] 2240 2241 * Fixed a problem with verifying a certificate chain when using the 2242 X509_V_FLAG_X509_STRICT flag. This flag enables additional security checks of 2243 the certificates present in a certificate chain. It is not set by default. 2244 2245 Starting from OpenSSL version 1.1.1h a check to disallow certificates in 2246 the chain that have explicitly encoded elliptic curve parameters was added 2247 as an additional strict check. 2248 2249 An error in the implementation of this check meant that the result of a 2250 previous check to confirm that certificates in the chain are valid CA 2251 certificates was overwritten. This effectively bypasses the check 2252 that non-CA certificates must not be able to issue other certificates. 2253 2254 If a "purpose" has been configured then there is a subsequent opportunity 2255 for checks that the certificate is a valid CA. All of the named "purpose" 2256 values implemented in libcrypto perform this check. Therefore, where 2257 a purpose is set the certificate chain will still be rejected even when the 2258 strict flag has been used. A purpose is set by default in libssl client and 2259 server certificate verification routines, but it can be overridden or 2260 removed by an application. 2261 2262 In order to be affected, an application must explicitly set the 2263 X509_V_FLAG_X509_STRICT verification flag and either not set a purpose 2264 for the certificate verification or, in the case of TLS client or server 2265 applications, override the default purpose. 2266 ([CVE-2021-3450]) 2267 2268 *Tomáš Mráz* 2269 2270 * Fixed an issue where an OpenSSL TLS server may crash if sent a maliciously 2271 crafted renegotiation ClientHello message from a client. If a TLSv1.2 2272 renegotiation ClientHello omits the signature_algorithms extension (where it 2273 was present in the initial ClientHello), but includes a 2274 signature_algorithms_cert extension then a NULL pointer dereference will 2275 result, leading to a crash and a denial of service attack. 2276 2277 A server is only vulnerable if it has TLSv1.2 and renegotiation enabled 2278 (which is the default configuration). OpenSSL TLS clients are not impacted by 2279 this issue. 2280 ([CVE-2021-3449]) 2281 2282 *Peter Kästle and Samuel Sapalski* 2283 2284### Changes between 1.1.1i and 1.1.1j [16 Feb 2021] 2285 2286 * Fixed the X509_issuer_and_serial_hash() function. It attempts to 2287 create a unique hash value based on the issuer and serial number data 2288 contained within an X509 certificate. However it was failing to correctly 2289 handle any errors that may occur while parsing the issuer field (which might 2290 occur if the issuer field is maliciously constructed). This may subsequently 2291 result in a NULL pointer deref and a crash leading to a potential denial of 2292 service attack. 2293 ([CVE-2021-23841]) 2294 2295 *Matt Caswell* 2296 2297 * Fixed the RSA_padding_check_SSLv23() function and the RSA_SSLV23_PADDING 2298 padding mode to correctly check for rollback attacks. This is considered a 2299 bug in OpenSSL 1.1.1 because it does not support SSLv2. In 1.0.2 this is 2300 CVE-2021-23839. 2301 2302 *Matt Caswell* 2303 2304 Fixed the EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate 2305 functions. Previously they could overflow the output length argument in some 2306 cases where the input length is close to the maximum permissable length for 2307 an integer on the platform. In such cases the return value from the function 2308 call would be 1 (indicating success), but the output length value would be 2309 negative. This could cause applications to behave incorrectly or crash. 2310 ([CVE-2021-23840]) 2311 2312 *Matt Caswell* 2313 2314 * Fixed SRP_Calc_client_key so that it runs in constant time. The previous 2315 implementation called BN_mod_exp without setting BN_FLG_CONSTTIME. This 2316 could be exploited in a side channel attack to recover the password. Since 2317 the attack is local host only this is outside of the current OpenSSL 2318 threat model and therefore no CVE is assigned. 2319 2320 Thanks to Mohammed Sabt and Daniel De Almeida Braga for reporting this 2321 issue. 2322 2323 *Matt Caswell* 2324 2325### Changes between 1.1.1h and 1.1.1i [8 Dec 2020] 2326 2327 * Fixed NULL pointer deref in the GENERAL_NAME_cmp function 2328 This function could crash if both GENERAL_NAMEs contain an EDIPARTYNAME. 2329 If an attacker can control both items being compared then this could lead 2330 to a possible denial of service attack. OpenSSL itself uses the 2331 GENERAL_NAME_cmp function for two purposes: 2332 1) Comparing CRL distribution point names between an available CRL and a 2333 CRL distribution point embedded in an X509 certificate 2334 2) When verifying that a timestamp response token signer matches the 2335 timestamp authority name (exposed via the API functions 2336 TS_RESP_verify_response and TS_RESP_verify_token) 2337 ([CVE-2020-1971]) 2338 2339 *Matt Caswell* 2340 2341### Changes between 1.1.1g and 1.1.1h [22 Sep 2020] 2342 2343 * Certificates with explicit curve parameters are now disallowed in 2344 verification chains if the X509_V_FLAG_X509_STRICT flag is used. 2345 2346 *Tomáš Mráz* 2347 2348 * The 'MinProtocol' and 'MaxProtocol' configuration commands now silently 2349 ignore TLS protocol version bounds when configuring DTLS-based contexts, and 2350 conversely, silently ignore DTLS protocol version bounds when configuring 2351 TLS-based contexts. The commands can be repeated to set bounds of both 2352 types. The same applies with the corresponding "min_protocol" and 2353 "max_protocol" command-line switches, in case some application uses both TLS 2354 and DTLS. 2355 2356 SSL_CTX instances that are created for a fixed protocol version (e.g. 2357 TLSv1_server_method()) also silently ignore version bounds. Previously 2358 attempts to apply bounds to these protocol versions would result in an 2359 error. Now only the "version-flexible" SSL_CTX instances are subject to 2360 limits in configuration files in command-line options. 2361 2362 *Viktor Dukhovni* 2363 2364 * Handshake now fails if Extended Master Secret extension is dropped 2365 on renegotiation. 2366 2367 *Tomáš Mráz* 2368 2369 * The Oracle Developer Studio compiler will start reporting deprecated APIs 2370 2371### Changes between 1.1.1f and 1.1.1g [21 Apr 2020] 2372 2373 * Fixed segmentation fault in SSL_check_chain() 2374 Server or client applications that call the SSL_check_chain() function 2375 during or after a TLS 1.3 handshake may crash due to a NULL pointer 2376 dereference as a result of incorrect handling of the 2377 "signature_algorithms_cert" TLS extension. The crash occurs if an invalid 2378 or unrecognised signature algorithm is received from the peer. This could 2379 be exploited by a malicious peer in a Denial of Service attack. 2380 ([CVE-2020-1967]) 2381 2382 *Benjamin Kaduk* 2383 2384 * Added AES consttime code for no-asm configurations 2385 an optional constant time support for AES was added 2386 when building openssl for no-asm. 2387 Enable with: ./config no-asm -DOPENSSL_AES_CONST_TIME 2388 Disable with: ./config no-asm -DOPENSSL_NO_AES_CONST_TIME 2389 At this time this feature is by default disabled. 2390 It will be enabled by default in 3.0. 2391 2392 *Bernd Edlinger* 2393 2394### Changes between 1.1.1e and 1.1.1f [31 Mar 2020] 2395 2396 * Revert the change of EOF detection while reading in libssl to avoid 2397 regressions in applications depending on the current way of reporting 2398 the EOF. As the existing method is not fully accurate the change to 2399 reporting the EOF via SSL_ERROR_SSL is kept on the current development 2400 branch and will be present in the 3.0 release. 2401 2402 *Tomáš Mráz* 2403 2404 * Revised BN_generate_prime_ex to not avoid factors 3..17863 in p-1 2405 when primes for RSA keys are computed. 2406 Since we previously always generated primes == 2 (mod 3) for RSA keys, 2407 the 2-prime and 3-prime RSA modules were easy to distinguish, since 2408 N = p*q = 1 (mod 3), but N = p*q*r = 2 (mod 3). Therefore fingerprinting 2409 2-prime vs. 3-prime RSA keys was possible by computing N mod 3. 2410 This avoids possible fingerprinting of newly generated RSA modules. 2411 2412 *Bernd Edlinger* 2413 2414### Changes between 1.1.1d and 1.1.1e [17 Mar 2020] 2415 2416 * Properly detect EOF while reading in libssl. Previously if we hit an EOF 2417 while reading in libssl then we would report an error back to the 2418 application (SSL_ERROR_SYSCALL) but errno would be 0. We now add 2419 an error to the stack (which means we instead return SSL_ERROR_SSL) and 2420 therefore give a hint as to what went wrong. 2421 2422 *Matt Caswell* 2423 2424 * Check that ed25519 and ed448 are allowed by the security level. Previously 2425 signature algorithms not using an MD were not being checked that they were 2426 allowed by the security level. 2427 2428 *Kurt Roeckx* 2429 2430 * Fixed SSL_get_servername() behaviour. The behaviour of SSL_get_servername() 2431 was not quite right. The behaviour was not consistent between resumption 2432 and normal handshakes, and also not quite consistent with historical 2433 behaviour. The behaviour in various scenarios has been clarified and 2434 it has been updated to make it match historical behaviour as closely as 2435 possible. 2436 2437 *Matt Caswell* 2438 2439 * *[VMS only]* The header files that the VMS compilers include automatically, 2440 `__DECC_INCLUDE_PROLOGUE.H` and `__DECC_INCLUDE_EPILOGUE.H`, use pragmas 2441 that the C++ compiler doesn't understand. This is a shortcoming in the 2442 compiler, but can be worked around with `__cplusplus` guards. 2443 2444 C++ applications that use OpenSSL libraries must be compiled using the 2445 qualifier `/NAMES=(AS_IS,SHORTENED)` to be able to use all the OpenSSL 2446 functions. Otherwise, only functions with symbols of less than 31 2447 characters can be used, as the linker will not be able to successfully 2448 resolve symbols with longer names. 2449 2450 *Richard Levitte* 2451 2452 * Added a new method to gather entropy on VMS, based on SYS$GET_ENTROPY. 2453 The presence of this system service is determined at run-time. 2454 2455 *Richard Levitte* 2456 2457 * Print all values for a PKCS#12 attribute with 'openssl pkcs12', not just 2458 the first value. 2459 2460 *Jon Spillett* 2461 2462### Changes between 1.1.1c and 1.1.1d [10 Sep 2019] 2463 2464 * Fixed a fork protection issue. OpenSSL 1.1.1 introduced a rewritten random 2465 number generator (RNG). This was intended to include protection in the 2466 event of a fork() system call in order to ensure that the parent and child 2467 processes did not share the same RNG state. However this protection was not 2468 being used in the default case. 2469 2470 A partial mitigation for this issue is that the output from a high 2471 precision timer is mixed into the RNG state so the likelihood of a parent 2472 and child process sharing state is significantly reduced. 2473 2474 If an application already calls OPENSSL_init_crypto() explicitly using 2475 OPENSSL_INIT_ATFORK then this problem does not occur at all. 2476 ([CVE-2019-1549]) 2477 2478 *Matthias St. Pierre* 2479 2480 * For built-in EC curves, ensure an EC_GROUP built from the curve name is 2481 used even when parsing explicit parameters, when loading a encoded key 2482 or calling `EC_GROUP_new_from_ecpkparameters()`/ 2483 `EC_GROUP_new_from_ecparameters()`. 2484 This prevents bypass of security hardening and performance gains, 2485 especially for curves with specialized EC_METHODs. 2486 By default, if a key encoded with explicit parameters is loaded and later 2487 encoded, the output is still encoded with explicit parameters, even if 2488 internally a "named" EC_GROUP is used for computation. 2489 2490 *Nicola Tuveri* 2491 2492 * Compute ECC cofactors if not provided during EC_GROUP construction. Before 2493 this change, EC_GROUP_set_generator would accept order and/or cofactor as 2494 NULL. After this change, only the cofactor parameter can be NULL. It also 2495 does some minimal sanity checks on the passed order. 2496 ([CVE-2019-1547]) 2497 2498 *Billy Bob Brumley* 2499 2500 * Fixed a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey. 2501 An attack is simple, if the first CMS_recipientInfo is valid but the 2502 second CMS_recipientInfo is chosen ciphertext. If the second 2503 recipientInfo decodes to PKCS #1 v1.5 form plaintext, the correct 2504 encryption key will be replaced by garbage, and the message cannot be 2505 decoded, but if the RSA decryption fails, the correct encryption key is 2506 used and the recipient will not notice the attack. 2507 As a work around for this potential attack the length of the decrypted 2508 key must be equal to the cipher default key length, in case the 2509 certifiate is not given and all recipientInfo are tried out. 2510 The old behaviour can be re-enabled in the CMS code by setting the 2511 CMS_DEBUG_DECRYPT flag. 2512 ([CVE-2019-1563]) 2513 2514 *Bernd Edlinger* 2515 2516 * Early start up entropy quality from the DEVRANDOM seed source has been 2517 improved for older Linux systems. The RAND subsystem will wait for 2518 /dev/random to be producing output before seeding from /dev/urandom. 2519 The seeded state is stored for future library initialisations using 2520 a system global shared memory segment. The shared memory identifier 2521 can be configured by defining OPENSSL_RAND_SEED_DEVRANDOM_SHM_ID to 2522 the desired value. The default identifier is 114. 2523 2524 *Paul Dale* 2525 2526 * Correct the extended master secret constant on EBCDIC systems. Without this 2527 fix TLS connections between an EBCDIC system and a non-EBCDIC system that 2528 negotiate EMS will fail. Unfortunately this also means that TLS connections 2529 between EBCDIC systems with this fix, and EBCDIC systems without this 2530 fix will fail if they negotiate EMS. 2531 2532 *Matt Caswell* 2533 2534 * Use Windows installation paths in the mingw builds 2535 2536 Mingw isn't a POSIX environment per se, which means that Windows 2537 paths should be used for installation. 2538 ([CVE-2019-1552]) 2539 2540 *Richard Levitte* 2541 2542 * Changed DH_check to accept parameters with order q and 2q subgroups. 2543 With order 2q subgroups the bit 0 of the private key is not secret 2544 but DH_generate_key works around that by clearing bit 0 of the 2545 private key for those. This avoids leaking bit 0 of the private key. 2546 2547 *Bernd Edlinger* 2548 2549 * Significantly reduce secure memory usage by the randomness pools. 2550 2551 *Paul Dale* 2552 2553 * Revert the DEVRANDOM_WAIT feature for Linux systems 2554 2555 The DEVRANDOM_WAIT feature added a select() call to wait for the 2556 /dev/random device to become readable before reading from the 2557 /dev/urandom device. 2558 2559 It turned out that this change had negative side effects on 2560 performance which were not acceptable. After some discussion it 2561 was decided to revert this feature and leave it up to the OS 2562 resp. the platform maintainer to ensure a proper initialization 2563 during early boot time. 2564 2565 *Matthias St. Pierre* 2566 2567### Changes between 1.1.1b and 1.1.1c [28 May 2019] 2568 2569 * Add build tests for C++. These are generated files that only do one 2570 thing, to include one public OpenSSL head file each. This tests that 2571 the public header files can be usefully included in a C++ application. 2572 2573 This test isn't enabled by default. It can be enabled with the option 2574 'enable-buildtest-c++'. 2575 2576 *Richard Levitte* 2577 2578 * Enable SHA3 pre-hashing for ECDSA and DSA. 2579 2580 *Patrick Steuer* 2581 2582 * Change the default RSA, DSA and DH size to 2048 bit instead of 1024. 2583 This changes the size when using the `genpkey` command when no size is given. 2584 It fixes an omission in earlier changes that changed all RSA, DSA and DH 2585 generation commands to use 2048 bits by default. 2586 2587 *Kurt Roeckx* 2588 2589 * Reorganize the manual pages to consistently have RETURN VALUES, 2590 EXAMPLES, SEE ALSO and HISTORY come in that order, and adjust 2591 util/fix-doc-nits accordingly. 2592 2593 *Paul Yang, Joshua Lock* 2594 2595 * Add the missing accessor EVP_PKEY_get0_engine() 2596 2597 *Matt Caswell* 2598 2599 * Have commands like `s_client` and `s_server` output the signature scheme 2600 along with other cipher suite parameters when debugging. 2601 2602 *Lorinczy Zsigmond* 2603 2604 * Make OPENSSL_config() error agnostic again. 2605 2606 *Richard Levitte* 2607 2608 * Do the error handling in RSA decryption constant time. 2609 2610 *Bernd Edlinger* 2611 2612 * Prevent over long nonces in ChaCha20-Poly1305. 2613 2614 ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input 2615 for every encryption operation. RFC 7539 specifies that the nonce value 2616 (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length 2617 and front pads the nonce with 0 bytes if it is less than 12 2618 bytes. However it also incorrectly allows a nonce to be set of up to 16 2619 bytes. In this case only the last 12 bytes are significant and any 2620 additional leading bytes are ignored. 2621 2622 It is a requirement of using this cipher that nonce values are 2623 unique. Messages encrypted using a reused nonce value are susceptible to 2624 serious confidentiality and integrity attacks. If an application changes 2625 the default nonce length to be longer than 12 bytes and then makes a 2626 change to the leading bytes of the nonce expecting the new value to be a 2627 new unique nonce then such an application could inadvertently encrypt 2628 messages with a reused nonce. 2629 2630 Additionally the ignored bytes in a long nonce are not covered by the 2631 integrity guarantee of this cipher. Any application that relies on the 2632 integrity of these ignored leading bytes of a long nonce may be further 2633 affected. Any OpenSSL internal use of this cipher, including in SSL/TLS, 2634 is safe because no such use sets such a long nonce value. However user 2635 applications that use this cipher directly and set a non-default nonce 2636 length to be longer than 12 bytes may be vulnerable. 2637 2638 This issue was reported to OpenSSL on 16th of March 2019 by Joran Dirk 2639 Greef of Ronomon. 2640 ([CVE-2019-1543]) 2641 2642 *Matt Caswell* 2643 2644 * Add DEVRANDOM_WAIT feature for Linux systems 2645 2646 On older Linux systems where the getrandom() system call is not available, 2647 OpenSSL normally uses the /dev/urandom device for seeding its CSPRNG. 2648 Contrary to getrandom(), the /dev/urandom device will not block during 2649 early boot when the kernel CSPRNG has not been seeded yet. 2650 2651 To mitigate this known weakness, use select() to wait for /dev/random to 2652 become readable before reading from /dev/urandom. 2653 2654 * Ensure that SM2 only uses SM3 as digest algorithm 2655 2656 *Paul Yang* 2657 2658### Changes between 1.1.1a and 1.1.1b [26 Feb 2019] 2659 2660 * Change the info callback signals for the start and end of a post-handshake 2661 message exchange in TLSv1.3. In 1.1.1/1.1.1a we used SSL_CB_HANDSHAKE_START 2662 and SSL_CB_HANDSHAKE_DONE. Experience has shown that many applications get 2663 confused by this and assume that a TLSv1.2 renegotiation has started. This 2664 can break KeyUpdate handling. Instead we no longer signal the start and end 2665 of a post handshake message exchange (although the messages themselves are 2666 still signalled). This could break some applications that were expecting 2667 the old signals. However without this KeyUpdate is not usable for many 2668 applications. 2669 2670 *Matt Caswell* 2671 2672### Changes between 1.1.1 and 1.1.1a [20 Nov 2018] 2673 2674 * Timing vulnerability in DSA signature generation 2675 2676 The OpenSSL DSA signature algorithm has been shown to be vulnerable to a 2677 timing side channel attack. An attacker could use variations in the signing 2678 algorithm to recover the private key. 2679 2680 This issue was reported to OpenSSL on 16th October 2018 by Samuel Weiser. 2681 ([CVE-2018-0734]) 2682 2683 *Paul Dale* 2684 2685 * Timing vulnerability in ECDSA signature generation 2686 2687 The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a 2688 timing side channel attack. An attacker could use variations in the signing 2689 algorithm to recover the private key. 2690 2691 This issue was reported to OpenSSL on 25th October 2018 by Samuel Weiser. 2692 ([CVE-2018-0735]) 2693 2694 *Paul Dale* 2695 2696 * Fixed the issue that RAND_add()/RAND_seed() silently discards random input 2697 if its length exceeds 4096 bytes. The limit has been raised to a buffer size 2698 of two gigabytes and the error handling improved. 2699 2700 This issue was reported to OpenSSL by Dr. Falko Strenzke. It has been 2701 categorized as a normal bug, not a security issue, because the DRBG reseeds 2702 automatically and is fully functional even without additional randomness 2703 provided by the application. 2704 2705### Changes between 1.1.0i and 1.1.1 [11 Sep 2018] 2706 2707 * Add a new ClientHello callback. Provides a callback interface that gives 2708 the application the ability to adjust the nascent SSL object at the 2709 earliest stage of ClientHello processing, immediately after extensions have 2710 been collected but before they have been processed. In particular, this 2711 callback can adjust the supported TLS versions in response to the contents 2712 of the ClientHello 2713 2714 *Benjamin Kaduk* 2715 2716 * Add SM2 base algorithm support. 2717 2718 *Jack Lloyd* 2719 2720 * s390x assembly pack: add (improved) hardware-support for the following 2721 cryptographic primitives: sha3, shake, aes-gcm, aes-ccm, aes-ctr, aes-ofb, 2722 aes-cfb/cfb8, aes-ecb. 2723 2724 *Patrick Steuer* 2725 2726 * Make EVP_PKEY_asn1_new() a bit stricter about its input. A NULL pem_str 2727 parameter is no longer accepted, as it leads to a corrupt table. NULL 2728 pem_str is reserved for alias entries only. 2729 2730 *Richard Levitte* 2731 2732 * Use the new ec_scalar_mul_ladder scaffold to implement a specialized ladder 2733 step for prime curves. The new implementation is based on formulae from 2734 differential addition-and-doubling in homogeneous projective coordinates 2735 from Izu-Takagi "A fast parallel elliptic curve multiplication resistant 2736 against side channel attacks" and Brier-Joye "Weierstrass Elliptic Curves 2737 and Side-Channel Attacks" Eq. (8) for y-coordinate recovery, modified 2738 to work in projective coordinates. 2739 2740 *Billy Bob Brumley, Nicola Tuveri* 2741 2742 * Change generating and checking of primes so that the error rate of not 2743 being prime depends on the intended use based on the size of the input. 2744 For larger primes this will result in more rounds of Miller-Rabin. 2745 The maximal error rate for primes with more than 1080 bits is lowered 2746 to 2^-128. 2747 2748 *Kurt Roeckx, Annie Yousar* 2749 2750 * Increase the number of Miller-Rabin rounds for DSA key generating to 64. 2751 2752 *Kurt Roeckx* 2753 2754 * The 'tsget' script is renamed to 'tsget.pl', to avoid confusion when 2755 moving between systems, and to avoid confusion when a Windows build is 2756 done with mingw vs with MSVC. For POSIX installs, there's still a 2757 symlink or copy named 'tsget' to avoid that confusion as well. 2758 2759 *Richard Levitte* 2760 2761 * Revert blinding in ECDSA sign and instead make problematic addition 2762 length-invariant. Switch even to fixed-length Montgomery multiplication. 2763 2764 *Andy Polyakov* 2765 2766 * Use the new ec_scalar_mul_ladder scaffold to implement a specialized ladder 2767 step for binary curves. The new implementation is based on formulae from 2768 differential addition-and-doubling in mixed Lopez-Dahab projective 2769 coordinates, modified to independently blind the operands. 2770 2771 *Billy Bob Brumley, Sohaib ul Hassan, Nicola Tuveri* 2772 2773 * Add a scaffold to optionally enhance the Montgomery ladder implementation 2774 for `ec_scalar_mul_ladder` (formerly `ec_mul_consttime`) allowing 2775 EC_METHODs to implement their own specialized "ladder step", to take 2776 advantage of more favorable coordinate systems or more efficient 2777 differential addition-and-doubling algorithms. 2778 2779 *Billy Bob Brumley, Sohaib ul Hassan, Nicola Tuveri* 2780 2781 * Modified the random device based seed sources to keep the relevant 2782 file descriptors open rather than reopening them on each access. 2783 This allows such sources to operate in a chroot() jail without 2784 the associated device nodes being available. This behaviour can be 2785 controlled using RAND_keep_random_devices_open(). 2786 2787 *Paul Dale* 2788 2789 * Numerous side-channel attack mitigations have been applied. This may have 2790 performance impacts for some algorithms for the benefit of improved 2791 security. Specific changes are noted in this change log by their respective 2792 authors. 2793 2794 *Matt Caswell* 2795 2796 * AIX shared library support overhaul. Switch to AIX "natural" way of 2797 handling shared libraries, which means collecting shared objects of 2798 different versions and bitnesses in one common archive. This allows to 2799 mitigate conflict between 1.0 and 1.1 side-by-side installations. It 2800 doesn't affect the way 3rd party applications are linked, only how 2801 multi-version installation is managed. 2802 2803 *Andy Polyakov* 2804 2805 * Make ec_group_do_inverse_ord() more robust and available to other 2806 EC cryptosystems, so that irrespective of BN_FLG_CONSTTIME, SCA 2807 mitigations are applied to the fallback BN_mod_inverse(). 2808 When using this function rather than BN_mod_inverse() directly, new 2809 EC cryptosystem implementations are then safer-by-default. 2810 2811 *Billy Bob Brumley* 2812 2813 * Add coordinate blinding for EC_POINT and implement projective 2814 coordinate blinding for generic prime curves as a countermeasure to 2815 chosen point SCA attacks. 2816 2817 *Sohaib ul Hassan, Nicola Tuveri, Billy Bob Brumley* 2818 2819 * Add blinding to ECDSA and DSA signatures to protect against side channel 2820 attacks discovered by Keegan Ryan (NCC Group). 2821 2822 *Matt Caswell* 2823 2824 * Enforce checking in the `pkeyutl` command to ensure that the input 2825 length does not exceed the maximum supported digest length when performing 2826 a sign, verify or verifyrecover operation. 2827 2828 *Matt Caswell* 2829 2830 * SSL_MODE_AUTO_RETRY is enabled by default. Applications that use blocking 2831 I/O in combination with something like select() or poll() will hang. This 2832 can be turned off again using SSL_CTX_clear_mode(). 2833 Many applications do not properly handle non-application data records, and 2834 TLS 1.3 sends more of such records. Setting SSL_MODE_AUTO_RETRY works 2835 around the problems in those applications, but can also break some. 2836 It's recommended to read the manpages about SSL_read(), SSL_write(), 2837 SSL_get_error(), SSL_shutdown(), SSL_CTX_set_mode() and 2838 SSL_CTX_set_read_ahead() again. 2839 2840 *Kurt Roeckx* 2841 2842 * When unlocking a pass phrase protected PEM file or PKCS#8 container, we 2843 now allow empty (zero character) pass phrases. 2844 2845 *Richard Levitte* 2846 2847 * Apply blinding to binary field modular inversion and remove patent 2848 pending (OPENSSL_SUN_GF2M_DIV) BN_GF2m_mod_div implementation. 2849 2850 *Billy Bob Brumley* 2851 2852 * Deprecate ec2_mult.c and unify scalar multiplication code paths for 2853 binary and prime elliptic curves. 2854 2855 *Billy Bob Brumley* 2856 2857 * Remove ECDSA nonce padding: EC_POINT_mul is now responsible for 2858 constant time fixed point multiplication. 2859 2860 *Billy Bob Brumley* 2861 2862 * Revise elliptic curve scalar multiplication with timing attack 2863 defenses: ec_wNAF_mul redirects to a constant time implementation 2864 when computing fixed point and variable point multiplication (which 2865 in OpenSSL are mostly used with secret scalars in keygen, sign, 2866 ECDH derive operations). 2867 *Billy Bob Brumley, Nicola Tuveri, Cesar Pereida García, 2868 Sohaib ul Hassan* 2869 2870 * Updated CONTRIBUTING 2871 2872 *Rich Salz* 2873 2874 * Updated DRBG / RAND to request nonce and additional low entropy 2875 randomness from the system. 2876 2877 *Matthias St. Pierre* 2878 2879 * Updated 'openssl rehash' to use OpenSSL consistent default. 2880 2881 *Richard Levitte* 2882 2883 * Moved the load of the ssl_conf module to libcrypto, which helps 2884 loading engines that libssl uses before libssl is initialised. 2885 2886 *Matt Caswell* 2887 2888 * Added EVP_PKEY_sign() and EVP_PKEY_verify() for EdDSA 2889 2890 *Matt Caswell* 2891 2892 * Fixed X509_NAME_ENTRY_set to get multi-valued RDNs right in all cases. 2893 2894 *Ingo Schwarze, Rich Salz* 2895 2896 * Added output of accepting IP address and port for 'openssl s_server' 2897 2898 *Richard Levitte* 2899 2900 * Added a new API for TLSv1.3 ciphersuites: 2901 SSL_CTX_set_ciphersuites() 2902 SSL_set_ciphersuites() 2903 2904 *Matt Caswell* 2905 2906 * Memory allocation failures consistently add an error to the error 2907 stack. 2908 2909 *Rich Salz* 2910 2911 * Don't use OPENSSL_ENGINES and OPENSSL_CONF environment values 2912 in libcrypto when run as setuid/setgid. 2913 2914 *Bernd Edlinger* 2915 2916 * Load any config file by default when libssl is used. 2917 2918 *Matt Caswell* 2919 2920 * Added new public header file <openssl/rand_drbg.h> and documentation 2921 for the RAND_DRBG API. See manual page RAND_DRBG(7) for an overview. 2922 2923 *Matthias St. Pierre* 2924 2925 * QNX support removed (cannot find contributors to get their approval 2926 for the license change). 2927 2928 *Rich Salz* 2929 2930 * TLSv1.3 replay protection for early data has been implemented. See the 2931 SSL_read_early_data() man page for further details. 2932 2933 *Matt Caswell* 2934 2935 * Separated TLSv1.3 ciphersuite configuration out from TLSv1.2 ciphersuite 2936 configuration. TLSv1.3 ciphersuites are not compatible with TLSv1.2 and 2937 below. Similarly TLSv1.2 ciphersuites are not compatible with TLSv1.3. 2938 In order to avoid issues where legacy TLSv1.2 ciphersuite configuration 2939 would otherwise inadvertently disable all TLSv1.3 ciphersuites the 2940 configuration has been separated out. See the ciphers man page or the 2941 SSL_CTX_set_ciphersuites() man page for more information. 2942 2943 *Matt Caswell* 2944 2945 * On POSIX (BSD, Linux, ...) systems the ocsp(1) command running 2946 in responder mode now supports the new "-multi" option, which 2947 spawns the specified number of child processes to handle OCSP 2948 requests. The "-timeout" option now also limits the OCSP 2949 responder's patience to wait to receive the full client request 2950 on a newly accepted connection. Child processes are respawned 2951 as needed, and the CA index file is automatically reloaded 2952 when changed. This makes it possible to run the "ocsp" responder 2953 as a long-running service, making the OpenSSL CA somewhat more 2954 feature-complete. In this mode, most diagnostic messages logged 2955 after entering the event loop are logged via syslog(3) rather than 2956 written to stderr. 2957 2958 *Viktor Dukhovni* 2959 2960 * Added support for X448 and Ed448. Heavily based on original work by 2961 Mike Hamburg. 2962 2963 *Matt Caswell* 2964 2965 * Extend OSSL_STORE with capabilities to search and to narrow the set of 2966 objects loaded. This adds the functions OSSL_STORE_expect() and 2967 OSSL_STORE_find() as well as needed tools to construct searches and 2968 get the search data out of them. 2969 2970 *Richard Levitte* 2971 2972 * Support for TLSv1.3 added. Note that users upgrading from an earlier 2973 version of OpenSSL should review their configuration settings to ensure 2974 that they are still appropriate for TLSv1.3. For further information see: 2975 <https://wiki.openssl.org/index.php/TLS1.3> 2976 2977 *Matt Caswell* 2978 2979 * Grand redesign of the OpenSSL random generator 2980 2981 The default RAND method now utilizes an AES-CTR DRBG according to 2982 NIST standard SP 800-90Ar1. The new random generator is essentially 2983 a port of the default random generator from the OpenSSL FIPS 2.0 2984 object module. It is a hybrid deterministic random bit generator 2985 using an AES-CTR bit stream and which seeds and reseeds itself 2986 automatically using trusted system entropy sources. 2987 2988 Some of its new features are: 2989 - Support for multiple DRBG instances with seed chaining. 2990 - The default RAND method makes use of a DRBG. 2991 - There is a public and private DRBG instance. 2992 - The DRBG instances are fork-safe. 2993 - Keep all global DRBG instances on the secure heap if it is enabled. 2994 - The public and private DRBG instance are per thread for lock free 2995 operation 2996 2997 *Paul Dale, Benjamin Kaduk, Kurt Roeckx, Rich Salz, Matthias St. Pierre* 2998 2999 * Changed Configure so it only says what it does and doesn't dump 3000 so much data. Instead, ./configdata.pm should be used as a script 3001 to display all sorts of configuration data. 3002 3003 *Richard Levitte* 3004 3005 * Added processing of "make variables" to Configure. 3006 3007 *Richard Levitte* 3008 3009 * Added SHA512/224 and SHA512/256 algorithm support. 3010 3011 *Paul Dale* 3012 3013 * The last traces of Netware support, first removed in 1.1.0, have 3014 now been removed. 3015 3016 *Rich Salz* 3017 3018 * Get rid of Makefile.shared, and in the process, make the processing 3019 of certain files (rc.obj, or the .def/.map/.opt files produced from 3020 the ordinal files) more visible and hopefully easier to trace and 3021 debug (or make silent). 3022 3023 *Richard Levitte* 3024 3025 * Make it possible to have environment variable assignments as 3026 arguments to config / Configure. 3027 3028 *Richard Levitte* 3029 3030 * Add multi-prime RSA (RFC 8017) support. 3031 3032 *Paul Yang* 3033 3034 * Add SM3 implemented according to GB/T 32905-2016 3035 *Jack Lloyd <jack.lloyd@ribose.com>,* 3036 *Ronald Tse <ronald.tse@ribose.com>,* 3037 *Erick Borsboom <erick.borsboom@ribose.com>* 3038 3039 * Add 'Maximum Fragment Length' TLS extension negotiation and support 3040 as documented in RFC6066. 3041 Based on a patch from Tomasz Moń 3042 3043 *Filipe Raimundo da Silva* 3044 3045 * Add SM4 implemented according to GB/T 32907-2016. 3046 *Jack Lloyd <jack.lloyd@ribose.com>,* 3047 *Ronald Tse <ronald.tse@ribose.com>,* 3048 *Erick Borsboom <erick.borsboom@ribose.com>* 3049 3050 * Reimplement -newreq-nodes and ERR_error_string_n; the 3051 original author does not agree with the license change. 3052 3053 *Rich Salz* 3054 3055 * Add ARIA AEAD TLS support. 3056 3057 *Jon Spillett* 3058 3059 * Some macro definitions to support VS6 have been removed. Visual 3060 Studio 6 has not worked since 1.1.0 3061 3062 *Rich Salz* 3063 3064 * Add ERR_clear_last_mark(), to allow callers to clear the last mark 3065 without clearing the errors. 3066 3067 *Richard Levitte* 3068 3069 * Add "atfork" functions. If building on a system that without 3070 pthreads, see doc/man3/OPENSSL_fork_prepare.pod for application 3071 requirements. The RAND facility now uses/requires this. 3072 3073 *Rich Salz* 3074 3075 * Add SHA3. 3076 3077 *Andy Polyakov* 3078 3079 * The UI API becomes a permanent and integral part of libcrypto, i.e. 3080 not possible to disable entirely. However, it's still possible to 3081 disable the console reading UI method, UI_OpenSSL() (use UI_null() 3082 as a fallback). 3083 3084 To disable, configure with 'no-ui-console'. 'no-ui' is still 3085 possible to use as an alias. Check at compile time with the 3086 macro OPENSSL_NO_UI_CONSOLE. The macro OPENSSL_NO_UI is still 3087 possible to check and is an alias for OPENSSL_NO_UI_CONSOLE. 3088 3089 *Richard Levitte* 3090 3091 * Add a STORE module, which implements a uniform and URI based reader of 3092 stores that can contain keys, certificates, CRLs and numerous other 3093 objects. The main API is loosely based on a few stdio functions, 3094 and includes OSSL_STORE_open, OSSL_STORE_load, OSSL_STORE_eof, 3095 OSSL_STORE_error and OSSL_STORE_close. 3096 The implementation uses backends called "loaders" to implement arbitrary 3097 URI schemes. There is one built in "loader" for the 'file' scheme. 3098 3099 *Richard Levitte* 3100 3101 * Add devcrypto engine. This has been implemented against cryptodev-linux, 3102 then adjusted to work on FreeBSD 8.4 as well. 3103 Enable by configuring with 'enable-devcryptoeng'. This is done by default 3104 on BSD implementations, as cryptodev.h is assumed to exist on all of them. 3105 3106 *Richard Levitte* 3107 3108 * Module names can prefixed with OSSL_ or OPENSSL_. This affects 3109 util/mkerr.pl, which is adapted to allow those prefixes, leading to 3110 error code calls like this: 3111 3112 OSSL_FOOerr(OSSL_FOO_F_SOMETHING, OSSL_FOO_R_WHATEVER); 3113 3114 With this change, we claim the namespaces OSSL and OPENSSL in a manner 3115 that can be encoded in C. For the foreseeable future, this will only 3116 affect new modules. 3117 3118 *Richard Levitte and Tim Hudson* 3119 3120 * Removed BSD cryptodev engine. 3121 3122 *Rich Salz* 3123 3124 * Add a build target 'build_all_generated', to build all generated files 3125 and only that. This can be used to prepare everything that requires 3126 things like perl for a system that lacks perl and then move everything 3127 to that system and do the rest of the build there. 3128 3129 *Richard Levitte* 3130 3131 * In the UI interface, make it possible to duplicate the user data. This 3132 can be used by engines that need to retain the data for a longer time 3133 than just the call where this user data is passed. 3134 3135 *Richard Levitte* 3136 3137 * Ignore the '-named_curve auto' value for compatibility of applications 3138 with OpenSSL 1.0.2. 3139 3140 *Tomáš Mráz <tmraz@fedoraproject.org>* 3141 3142 * Fragmented SSL/TLS alerts are no longer accepted. An alert message is 2 3143 bytes long. In theory it is permissible in SSLv3 - TLSv1.2 to fragment such 3144 alerts across multiple records (some of which could be empty). In practice 3145 it make no sense to send an empty alert record, or to fragment one. TLSv1.3 3146 prohibits this altogether and other libraries (BoringSSL, NSS) do not 3147 support this at all. Supporting it adds significant complexity to the 3148 record layer, and its removal is unlikely to cause interoperability 3149 issues. 3150 3151 *Matt Caswell* 3152 3153 * Add the ASN.1 types INT32, UINT32, INT64, UINT64 and variants prefixed 3154 with Z. These are meant to replace LONG and ZLONG and to be size safe. 3155 The use of LONG and ZLONG is discouraged and scheduled for deprecation 3156 in OpenSSL 1.2.0. 3157 3158 *Richard Levitte* 3159 3160 * Add the 'z' and 'j' modifiers to BIO_printf() et al formatting string, 3161 'z' is to be used for [s]size_t, and 'j' - with [u]int64_t. 3162 3163 *Richard Levitte, Andy Polyakov* 3164 3165 * Add EC_KEY_get0_engine(), which does for EC_KEY what RSA_get0_engine() 3166 does for RSA, etc. 3167 3168 *Richard Levitte* 3169 3170 * Have 'config' recognise 64-bit mingw and choose 'mingw64' as the target 3171 platform rather than 'mingw'. 3172 3173 *Richard Levitte* 3174 3175 * The functions X509_STORE_add_cert and X509_STORE_add_crl return 3176 success if they are asked to add an object which already exists 3177 in the store. This change cascades to other functions which load 3178 certificates and CRLs. 3179 3180 *Paul Dale* 3181 3182 * x86_64 assembly pack: annotate code with DWARF CFI directives to 3183 facilitate stack unwinding even from assembly subroutines. 3184 3185 *Andy Polyakov* 3186 3187 * Remove VAX C specific definitions of OPENSSL_EXPORT, OPENSSL_EXTERN. 3188 Also remove OPENSSL_GLOBAL entirely, as it became a no-op. 3189 3190 *Richard Levitte* 3191 3192 * Remove the VMS-specific reimplementation of gmtime from crypto/o_times.c. 3193 VMS C's RTL has a fully up to date gmtime() and gmtime_r() since V7.1, 3194 which is the minimum version we support. 3195 3196 *Richard Levitte* 3197 3198 * Certificate time validation (X509_cmp_time) enforces stricter 3199 compliance with RFC 5280. Fractional seconds and timezone offsets 3200 are no longer allowed. 3201 3202 *Emilia Käsper* 3203 3204 * Add support for ARIA 3205 3206 *Paul Dale* 3207 3208 * s_client will now send the Server Name Indication (SNI) extension by 3209 default unless the new "-noservername" option is used. The server name is 3210 based on the host provided to the "-connect" option unless overridden by 3211 using "-servername". 3212 3213 *Matt Caswell* 3214 3215 * Add support for SipHash 3216 3217 *Todd Short* 3218 3219 * OpenSSL now fails if it receives an unrecognised record type in TLS1.0 3220 or TLS1.1. Previously this only happened in SSLv3 and TLS1.2. This is to 3221 prevent issues where no progress is being made and the peer continually 3222 sends unrecognised record types, using up resources processing them. 3223 3224 *Matt Caswell* 3225 3226 * 'openssl passwd' can now produce SHA256 and SHA512 based output, 3227 using the algorithm defined in 3228 <https://www.akkadia.org/drepper/SHA-crypt.txt> 3229 3230 *Richard Levitte* 3231 3232 * Heartbeat support has been removed; the ABI is changed for now. 3233 3234 *Richard Levitte, Rich Salz* 3235 3236 * Support for SSL_OP_NO_ENCRYPT_THEN_MAC in SSL_CONF_cmd. 3237 3238 *Emilia Käsper* 3239 3240 * The RSA "null" method, which was partially supported to avoid patent 3241 issues, has been replaced to always returns NULL. 3242 3243 *Rich Salz* 3244 3245OpenSSL 1.1.0 3246------------- 3247 3248### Changes between 1.1.0k and 1.1.0l [10 Sep 2019] 3249 3250 * For built-in EC curves, ensure an EC_GROUP built from the curve name is 3251 used even when parsing explicit parameters, when loading a encoded key 3252 or calling `EC_GROUP_new_from_ecpkparameters()`/ 3253 `EC_GROUP_new_from_ecparameters()`. 3254 This prevents bypass of security hardening and performance gains, 3255 especially for curves with specialized EC_METHODs. 3256 By default, if a key encoded with explicit parameters is loaded and later 3257 encoded, the output is still encoded with explicit parameters, even if 3258 internally a "named" EC_GROUP is used for computation. 3259 3260 *Nicola Tuveri* 3261 3262 * Compute ECC cofactors if not provided during EC_GROUP construction. Before 3263 this change, EC_GROUP_set_generator would accept order and/or cofactor as 3264 NULL. After this change, only the cofactor parameter can be NULL. It also 3265 does some minimal sanity checks on the passed order. 3266 ([CVE-2019-1547]) 3267 3268 *Billy Bob Brumley* 3269 3270 * Fixed a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey. 3271 An attack is simple, if the first CMS_recipientInfo is valid but the 3272 second CMS_recipientInfo is chosen ciphertext. If the second 3273 recipientInfo decodes to PKCS #1 v1.5 form plaintext, the correct 3274 encryption key will be replaced by garbage, and the message cannot be 3275 decoded, but if the RSA decryption fails, the correct encryption key is 3276 used and the recipient will not notice the attack. 3277 As a work around for this potential attack the length of the decrypted 3278 key must be equal to the cipher default key length, in case the 3279 certifiate is not given and all recipientInfo are tried out. 3280 The old behaviour can be re-enabled in the CMS code by setting the 3281 CMS_DEBUG_DECRYPT flag. 3282 ([CVE-2019-1563]) 3283 3284 *Bernd Edlinger* 3285 3286 * Use Windows installation paths in the mingw builds 3287 3288 Mingw isn't a POSIX environment per se, which means that Windows 3289 paths should be used for installation. 3290 ([CVE-2019-1552]) 3291 3292 *Richard Levitte* 3293 3294### Changes between 1.1.0j and 1.1.0k [28 May 2019] 3295 3296 * Change the default RSA, DSA and DH size to 2048 bit instead of 1024. 3297 This changes the size when using the `genpkey` command when no size is given. 3298 It fixes an omission in earlier changes that changed all RSA, DSA and DH 3299 generation commands to use 2048 bits by default. 3300 3301 *Kurt Roeckx* 3302 3303 * Prevent over long nonces in ChaCha20-Poly1305. 3304 3305 ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input 3306 for every encryption operation. RFC 7539 specifies that the nonce value 3307 (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length 3308 and front pads the nonce with 0 bytes if it is less than 12 3309 bytes. However it also incorrectly allows a nonce to be set of up to 16 3310 bytes. In this case only the last 12 bytes are significant and any 3311 additional leading bytes are ignored. 3312 3313 It is a requirement of using this cipher that nonce values are 3314 unique. Messages encrypted using a reused nonce value are susceptible to 3315 serious confidentiality and integrity attacks. If an application changes 3316 the default nonce length to be longer than 12 bytes and then makes a 3317 change to the leading bytes of the nonce expecting the new value to be a 3318 new unique nonce then such an application could inadvertently encrypt 3319 messages with a reused nonce. 3320 3321 Additionally the ignored bytes in a long nonce are not covered by the 3322 integrity guarantee of this cipher. Any application that relies on the 3323 integrity of these ignored leading bytes of a long nonce may be further 3324 affected. Any OpenSSL internal use of this cipher, including in SSL/TLS, 3325 is safe because no such use sets such a long nonce value. However user 3326 applications that use this cipher directly and set a non-default nonce 3327 length to be longer than 12 bytes may be vulnerable. 3328 3329 This issue was reported to OpenSSL on 16th of March 2019 by Joran Dirk 3330 Greef of Ronomon. 3331 ([CVE-2019-1543]) 3332 3333 *Matt Caswell* 3334 3335 * Added SCA hardening for modular field inversion in EC_GROUP through 3336 a new dedicated field_inv() pointer in EC_METHOD. 3337 This also addresses a leakage affecting conversions from projective 3338 to affine coordinates. 3339 3340 *Billy Bob Brumley, Nicola Tuveri* 3341 3342 * Fix a use after free bug in d2i_X509_PUBKEY when overwriting a 3343 re-used X509_PUBKEY object if the second PUBKEY is malformed. 3344 3345 *Bernd Edlinger* 3346 3347 * Move strictness check from EVP_PKEY_asn1_new() to EVP_PKEY_asn1_add0(). 3348 3349 *Richard Levitte* 3350 3351 * Remove the 'dist' target and add a tarball building script. The 3352 'dist' target has fallen out of use, and it shouldn't be 3353 necessary to configure just to create a source distribution. 3354 3355 *Richard Levitte* 3356 3357### Changes between 1.1.0i and 1.1.0j [20 Nov 2018] 3358 3359 * Timing vulnerability in DSA signature generation 3360 3361 The OpenSSL DSA signature algorithm has been shown to be vulnerable to a 3362 timing side channel attack. An attacker could use variations in the signing 3363 algorithm to recover the private key. 3364 3365 This issue was reported to OpenSSL on 16th October 2018 by Samuel Weiser. 3366 ([CVE-2018-0734]) 3367 3368 *Paul Dale* 3369 3370 * Timing vulnerability in ECDSA signature generation 3371 3372 The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a 3373 timing side channel attack. An attacker could use variations in the signing 3374 algorithm to recover the private key. 3375 3376 This issue was reported to OpenSSL on 25th October 2018 by Samuel Weiser. 3377 ([CVE-2018-0735]) 3378 3379 *Paul Dale* 3380 3381 * Add coordinate blinding for EC_POINT and implement projective 3382 coordinate blinding for generic prime curves as a countermeasure to 3383 chosen point SCA attacks. 3384 3385 *Sohaib ul Hassan, Nicola Tuveri, Billy Bob Brumley* 3386 3387### Changes between 1.1.0h and 1.1.0i [14 Aug 2018] 3388 3389 * Client DoS due to large DH parameter 3390 3391 During key agreement in a TLS handshake using a DH(E) based ciphersuite a 3392 malicious server can send a very large prime value to the client. This will 3393 cause the client to spend an unreasonably long period of time generating a 3394 key for this prime resulting in a hang until the client has finished. This 3395 could be exploited in a Denial Of Service attack. 3396 3397 This issue was reported to OpenSSL on 5th June 2018 by Guido Vranken 3398 ([CVE-2018-0732]) 3399 3400 *Guido Vranken* 3401 3402 * Cache timing vulnerability in RSA Key Generation 3403 3404 The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to 3405 a cache timing side channel attack. An attacker with sufficient access to 3406 mount cache timing attacks during the RSA key generation process could 3407 recover the private key. 3408 3409 This issue was reported to OpenSSL on 4th April 2018 by Alejandro Cabrera 3410 Aldaya, Billy Brumley, Cesar Pereida Garcia and Luis Manuel Alvarez Tapia. 3411 ([CVE-2018-0737]) 3412 3413 *Billy Brumley* 3414 3415 * Make EVP_PKEY_asn1_new() a bit stricter about its input. A NULL pem_str 3416 parameter is no longer accepted, as it leads to a corrupt table. NULL 3417 pem_str is reserved for alias entries only. 3418 3419 *Richard Levitte* 3420 3421 * Revert blinding in ECDSA sign and instead make problematic addition 3422 length-invariant. Switch even to fixed-length Montgomery multiplication. 3423 3424 *Andy Polyakov* 3425 3426 * Change generating and checking of primes so that the error rate of not 3427 being prime depends on the intended use based on the size of the input. 3428 For larger primes this will result in more rounds of Miller-Rabin. 3429 The maximal error rate for primes with more than 1080 bits is lowered 3430 to 2^-128. 3431 3432 *Kurt Roeckx, Annie Yousar* 3433 3434 * Increase the number of Miller-Rabin rounds for DSA key generating to 64. 3435 3436 *Kurt Roeckx* 3437 3438 * Add blinding to ECDSA and DSA signatures to protect against side channel 3439 attacks discovered by Keegan Ryan (NCC Group). 3440 3441 *Matt Caswell* 3442 3443 * When unlocking a pass phrase protected PEM file or PKCS#8 container, we 3444 now allow empty (zero character) pass phrases. 3445 3446 *Richard Levitte* 3447 3448 * Certificate time validation (X509_cmp_time) enforces stricter 3449 compliance with RFC 5280. Fractional seconds and timezone offsets 3450 are no longer allowed. 3451 3452 *Emilia Käsper* 3453 3454 * Fixed a text canonicalisation bug in CMS 3455 3456 Where a CMS detached signature is used with text content the text goes 3457 through a canonicalisation process first prior to signing or verifying a 3458 signature. This process strips trailing space at the end of lines, converts 3459 line terminators to CRLF and removes additional trailing line terminators 3460 at the end of a file. A bug in the canonicalisation process meant that 3461 some characters, such as form-feed, were incorrectly treated as whitespace 3462 and removed. This is contrary to the specification (RFC5485). This fix 3463 could mean that detached text data signed with an earlier version of 3464 OpenSSL 1.1.0 may fail to verify using the fixed version, or text data 3465 signed with a fixed OpenSSL may fail to verify with an earlier version of 3466 OpenSSL 1.1.0. A workaround is to only verify the canonicalised text data 3467 and use the "-binary" flag (for the "cms" command line application) or set 3468 the SMIME_BINARY/PKCS7_BINARY/CMS_BINARY flags (if using CMS_verify()). 3469 3470 *Matt Caswell* 3471 3472### Changes between 1.1.0g and 1.1.0h [27 Mar 2018] 3473 3474 * Constructed ASN.1 types with a recursive definition could exceed the stack 3475 3476 Constructed ASN.1 types with a recursive definition (such as can be found 3477 in PKCS7) could eventually exceed the stack given malicious input with 3478 excessive recursion. This could result in a Denial Of Service attack. There 3479 are no such structures used within SSL/TLS that come from untrusted sources 3480 so this is considered safe. 3481 3482 This issue was reported to OpenSSL on 4th January 2018 by the OSS-fuzz 3483 project. 3484 ([CVE-2018-0739]) 3485 3486 *Matt Caswell* 3487 3488 * Incorrect CRYPTO_memcmp on HP-UX PA-RISC 3489 3490 Because of an implementation bug the PA-RISC CRYPTO_memcmp function is 3491 effectively reduced to only comparing the least significant bit of each 3492 byte. This allows an attacker to forge messages that would be considered as 3493 authenticated in an amount of tries lower than that guaranteed by the 3494 security claims of the scheme. The module can only be compiled by the 3495 HP-UX assembler, so that only HP-UX PA-RISC targets are affected. 3496 3497 This issue was reported to OpenSSL on 2nd March 2018 by Peter Waltenberg 3498 (IBM). 3499 ([CVE-2018-0733]) 3500 3501 *Andy Polyakov* 3502 3503 * Add a build target 'build_all_generated', to build all generated files 3504 and only that. This can be used to prepare everything that requires 3505 things like perl for a system that lacks perl and then move everything 3506 to that system and do the rest of the build there. 3507 3508 *Richard Levitte* 3509 3510 * Backport SSL_OP_NO_RENGOTIATION 3511 3512 OpenSSL 1.0.2 and below had the ability to disable renegotiation using the 3513 (undocumented) SSL3_FLAGS_NO_RENEGOTIATE_CIPHERS flag. Due to the opacity 3514 changes this is no longer possible in 1.1.0. Therefore the new 3515 SSL_OP_NO_RENEGOTIATION option from 1.1.1-dev has been backported to 3516 1.1.0 to provide equivalent functionality. 3517 3518 Note that if an application built against 1.1.0h headers (or above) is run 3519 using an older version of 1.1.0 (prior to 1.1.0h) then the option will be 3520 accepted but nothing will happen, i.e. renegotiation will not be prevented. 3521 3522 *Matt Caswell* 3523 3524 * Removed the OS390-Unix config target. It relied on a script that doesn't 3525 exist. 3526 3527 *Rich Salz* 3528 3529 * rsaz_1024_mul_avx2 overflow bug on x86_64 3530 3531 There is an overflow bug in the AVX2 Montgomery multiplication procedure 3532 used in exponentiation with 1024-bit moduli. No EC algorithms are affected. 3533 Analysis suggests that attacks against RSA and DSA as a result of this 3534 defect would be very difficult to perform and are not believed likely. 3535 Attacks against DH1024 are considered just feasible, because most of the 3536 work necessary to deduce information about a private key may be performed 3537 offline. The amount of resources required for such an attack would be 3538 significant. However, for an attack on TLS to be meaningful, the server 3539 would have to share the DH1024 private key among multiple clients, which is 3540 no longer an option since CVE-2016-0701. 3541 3542 This only affects processors that support the AVX2 but not ADX extensions 3543 like Intel Haswell (4th generation). 3544 3545 This issue was reported to OpenSSL by David Benjamin (Google). The issue 3546 was originally found via the OSS-Fuzz project. 3547 ([CVE-2017-3738]) 3548 3549 *Andy Polyakov* 3550 3551### Changes between 1.1.0f and 1.1.0g [2 Nov 2017] 3552 3553 * bn_sqrx8x_internal carry bug on x86_64 3554 3555 There is a carry propagating bug in the x86_64 Montgomery squaring 3556 procedure. No EC algorithms are affected. Analysis suggests that attacks 3557 against RSA and DSA as a result of this defect would be very difficult to 3558 perform and are not believed likely. Attacks against DH are considered just 3559 feasible (although very difficult) because most of the work necessary to 3560 deduce information about a private key may be performed offline. The amount 3561 of resources required for such an attack would be very significant and 3562 likely only accessible to a limited number of attackers. An attacker would 3563 additionally need online access to an unpatched system using the target 3564 private key in a scenario with persistent DH parameters and a private 3565 key that is shared between multiple clients. 3566 3567 This only affects processors that support the BMI1, BMI2 and ADX extensions 3568 like Intel Broadwell (5th generation) and later or AMD Ryzen. 3569 3570 This issue was reported to OpenSSL by the OSS-Fuzz project. 3571 ([CVE-2017-3736]) 3572 3573 *Andy Polyakov* 3574 3575 * Malformed X.509 IPAddressFamily could cause OOB read 3576 3577 If an X.509 certificate has a malformed IPAddressFamily extension, 3578 OpenSSL could do a one-byte buffer overread. The most likely result 3579 would be an erroneous display of the certificate in text format. 3580 3581 This issue was reported to OpenSSL by the OSS-Fuzz project. 3582 ([CVE-2017-3735]) 3583 3584 *Rich Salz* 3585 3586### Changes between 1.1.0e and 1.1.0f [25 May 2017] 3587 3588 * Have 'config' recognise 64-bit mingw and choose 'mingw64' as the target 3589 platform rather than 'mingw'. 3590 3591 *Richard Levitte* 3592 3593 * Remove the VMS-specific reimplementation of gmtime from crypto/o_times.c. 3594 VMS C's RTL has a fully up to date gmtime() and gmtime_r() since V7.1, 3595 which is the minimum version we support. 3596 3597 *Richard Levitte* 3598 3599### Changes between 1.1.0d and 1.1.0e [16 Feb 2017] 3600 3601 * Encrypt-Then-Mac renegotiation crash 3602 3603 During a renegotiation handshake if the Encrypt-Then-Mac extension is 3604 negotiated where it was not in the original handshake (or vice-versa) then 3605 this can cause OpenSSL to crash (dependant on ciphersuite). Both clients 3606 and servers are affected. 3607 3608 This issue was reported to OpenSSL by Joe Orton (Red Hat). 3609 ([CVE-2017-3733]) 3610 3611 *Matt Caswell* 3612 3613### Changes between 1.1.0c and 1.1.0d [26 Jan 2017] 3614 3615 * Truncated packet could crash via OOB read 3616 3617 If one side of an SSL/TLS path is running on a 32-bit host and a specific 3618 cipher is being used, then a truncated packet can cause that host to 3619 perform an out-of-bounds read, usually resulting in a crash. 3620 3621 This issue was reported to OpenSSL by Robert Święcki of Google. 3622 ([CVE-2017-3731]) 3623 3624 *Andy Polyakov* 3625 3626 * Bad (EC)DHE parameters cause a client crash 3627 3628 If a malicious server supplies bad parameters for a DHE or ECDHE key 3629 exchange then this can result in the client attempting to dereference a 3630 NULL pointer leading to a client crash. This could be exploited in a Denial 3631 of Service attack. 3632 3633 This issue was reported to OpenSSL by Guido Vranken. 3634 ([CVE-2017-3730]) 3635 3636 *Matt Caswell* 3637 3638 * BN_mod_exp may produce incorrect results on x86_64 3639 3640 There is a carry propagating bug in the x86_64 Montgomery squaring 3641 procedure. No EC algorithms are affected. Analysis suggests that attacks 3642 against RSA and DSA as a result of this defect would be very difficult to 3643 perform and are not believed likely. Attacks against DH are considered just 3644 feasible (although very difficult) because most of the work necessary to 3645 deduce information about a private key may be performed offline. The amount 3646 of resources required for such an attack would be very significant and 3647 likely only accessible to a limited number of attackers. An attacker would 3648 additionally need online access to an unpatched system using the target 3649 private key in a scenario with persistent DH parameters and a private 3650 key that is shared between multiple clients. For example this can occur by 3651 default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very 3652 similar to CVE-2015-3193 but must be treated as a separate problem. 3653 3654 This issue was reported to OpenSSL by the OSS-Fuzz project. 3655 ([CVE-2017-3732]) 3656 3657 *Andy Polyakov* 3658 3659### Changes between 1.1.0b and 1.1.0c [10 Nov 2016] 3660 3661 * ChaCha20/Poly1305 heap-buffer-overflow 3662 3663 TLS connections using `*-CHACHA20-POLY1305` ciphersuites are susceptible to 3664 a DoS attack by corrupting larger payloads. This can result in an OpenSSL 3665 crash. This issue is not considered to be exploitable beyond a DoS. 3666 3667 This issue was reported to OpenSSL by Robert Święcki (Google Security Team) 3668 ([CVE-2016-7054]) 3669 3670 *Richard Levitte* 3671 3672 * CMS Null dereference 3673 3674 Applications parsing invalid CMS structures can crash with a NULL pointer 3675 dereference. This is caused by a bug in the handling of the ASN.1 CHOICE 3676 type in OpenSSL 1.1.0 which can result in a NULL value being passed to the 3677 structure callback if an attempt is made to free certain invalid encodings. 3678 Only CHOICE structures using a callback which do not handle NULL value are 3679 affected. 3680 3681 This issue was reported to OpenSSL by Tyler Nighswander of ForAllSecure. 3682 ([CVE-2016-7053]) 3683 3684 *Stephen Henson* 3685 3686 * Montgomery multiplication may produce incorrect results 3687 3688 There is a carry propagating bug in the Broadwell-specific Montgomery 3689 multiplication procedure that handles input lengths divisible by, but 3690 longer than 256 bits. Analysis suggests that attacks against RSA, DSA 3691 and DH private keys are impossible. This is because the subroutine in 3692 question is not used in operations with the private key itself and an input 3693 of the attacker's direct choice. Otherwise the bug can manifest itself as 3694 transient authentication and key negotiation failures or reproducible 3695 erroneous outcome of public-key operations with specially crafted input. 3696 Among EC algorithms only Brainpool P-512 curves are affected and one 3697 presumably can attack ECDH key negotiation. Impact was not analyzed in 3698 detail, because pre-requisites for attack are considered unlikely. Namely 3699 multiple clients have to choose the curve in question and the server has to 3700 share the private key among them, neither of which is default behaviour. 3701 Even then only clients that chose the curve will be affected. 3702 3703 This issue was publicly reported as transient failures and was not 3704 initially recognized as a security issue. Thanks to Richard Morgan for 3705 providing reproducible case. 3706 ([CVE-2016-7055]) 3707 3708 *Andy Polyakov* 3709 3710 * Removed automatic addition of RPATH in shared libraries and executables, 3711 as this was a remainder from OpenSSL 1.0.x and isn't needed any more. 3712 3713 *Richard Levitte* 3714 3715### Changes between 1.1.0a and 1.1.0b [26 Sep 2016] 3716 3717 * Fix Use After Free for large message sizes 3718 3719 The patch applied to address CVE-2016-6307 resulted in an issue where if a 3720 message larger than approx 16k is received then the underlying buffer to 3721 store the incoming message is reallocated and moved. Unfortunately a 3722 dangling pointer to the old location is left which results in an attempt to 3723 write to the previously freed location. This is likely to result in a 3724 crash, however it could potentially lead to execution of arbitrary code. 3725 3726 This issue only affects OpenSSL 1.1.0a. 3727 3728 This issue was reported to OpenSSL by Robert Święcki. 3729 ([CVE-2016-6309]) 3730 3731 *Matt Caswell* 3732 3733### Changes between 1.1.0 and 1.1.0a [22 Sep 2016] 3734 3735 * OCSP Status Request extension unbounded memory growth 3736 3737 A malicious client can send an excessively large OCSP Status Request 3738 extension. If that client continually requests renegotiation, sending a 3739 large OCSP Status Request extension each time, then there will be unbounded 3740 memory growth on the server. This will eventually lead to a Denial Of 3741 Service attack through memory exhaustion. Servers with a default 3742 configuration are vulnerable even if they do not support OCSP. Builds using 3743 the "no-ocsp" build time option are not affected. 3744 3745 This issue was reported to OpenSSL by Shi Lei (Gear Team, Qihoo 360 Inc.) 3746 ([CVE-2016-6304]) 3747 3748 *Matt Caswell* 3749 3750 * SSL_peek() hang on empty record 3751 3752 OpenSSL 1.1.0 SSL/TLS will hang during a call to SSL_peek() if the peer 3753 sends an empty record. This could be exploited by a malicious peer in a 3754 Denial Of Service attack. 3755 3756 This issue was reported to OpenSSL by Alex Gaynor. 3757 ([CVE-2016-6305]) 3758 3759 *Matt Caswell* 3760 3761 * Excessive allocation of memory in tls_get_message_header() and 3762 dtls1_preprocess_fragment() 3763 3764 A (D)TLS message includes 3 bytes for its length in the header for the 3765 message. This would allow for messages up to 16Mb in length. Messages of 3766 this length are excessive and OpenSSL includes a check to ensure that a 3767 peer is sending reasonably sized messages in order to avoid too much memory 3768 being consumed to service a connection. A flaw in the logic of version 3769 1.1.0 means that memory for the message is allocated too early, prior to 3770 the excessive message length check. Due to way memory is allocated in 3771 OpenSSL this could mean an attacker could force up to 21Mb to be allocated 3772 to service a connection. This could lead to a Denial of Service through 3773 memory exhaustion. However, the excessive message length check still takes 3774 place, and this would cause the connection to immediately fail. Assuming 3775 that the application calls SSL_free() on the failed connection in a timely 3776 manner then the 21Mb of allocated memory will then be immediately freed 3777 again. Therefore the excessive memory allocation will be transitory in 3778 nature. This then means that there is only a security impact if: 3779 3780 1) The application does not call SSL_free() in a timely manner in the event 3781 that the connection fails 3782 or 3783 2) The application is working in a constrained environment where there is 3784 very little free memory 3785 or 3786 3) The attacker initiates multiple connection attempts such that there are 3787 multiple connections in a state where memory has been allocated for the 3788 connection; SSL_free() has not yet been called; and there is insufficient 3789 memory to service the multiple requests. 3790 3791 Except in the instance of (1) above any Denial Of Service is likely to be 3792 transitory because as soon as the connection fails the memory is 3793 subsequently freed again in the SSL_free() call. However there is an 3794 increased risk during this period of application crashes due to the lack of 3795 memory - which would then mean a more serious Denial of Service. 3796 3797 This issue was reported to OpenSSL by Shi Lei (Gear Team, Qihoo 360 Inc.) 3798 (CVE-2016-6307 and CVE-2016-6308) 3799 3800 *Matt Caswell* 3801 3802 * solaris-x86-cc, i.e. 32-bit configuration with vendor compiler, 3803 had to be removed. Primary reason is that vendor assembler can't 3804 assemble our modules with -KPIC flag. As result it, assembly 3805 support, was not even available as option. But its lack means 3806 lack of side-channel resistant code, which is incompatible with 3807 security by todays standards. Fortunately gcc is readily available 3808 prepackaged option, which we firmly point at... 3809 3810 *Andy Polyakov* 3811 3812### Changes between 1.0.2h and 1.1.0 [25 Aug 2016] 3813 3814 * Windows command-line tool supports UTF-8 opt-in option for arguments 3815 and console input. Setting OPENSSL_WIN32_UTF8 environment variable 3816 (to any value) allows Windows user to access PKCS#12 file generated 3817 with Windows CryptoAPI and protected with non-ASCII password, as well 3818 as files generated under UTF-8 locale on Linux also protected with 3819 non-ASCII password. 3820 3821 *Andy Polyakov* 3822 3823 * To mitigate the SWEET32 attack ([CVE-2016-2183]), 3DES cipher suites 3824 have been disabled by default and removed from DEFAULT, just like RC4. 3825 See the RC4 item below to re-enable both. 3826 3827 *Rich Salz* 3828 3829 * The method for finding the storage location for the Windows RAND seed file 3830 has changed. First we check %RANDFILE%. If that is not set then we check 3831 the directories %HOME%, %USERPROFILE% and %SYSTEMROOT% in that order. If 3832 all else fails we fall back to C:\. 3833 3834 *Matt Caswell* 3835 3836 * The EVP_EncryptUpdate() function has had its return type changed from void 3837 to int. A return of 0 indicates and error while a return of 1 indicates 3838 success. 3839 3840 *Matt Caswell* 3841 3842 * The flags RSA_FLAG_NO_CONSTTIME, DSA_FLAG_NO_EXP_CONSTTIME and 3843 DH_FLAG_NO_EXP_CONSTTIME which previously provided the ability to switch 3844 off the constant time implementation for RSA, DSA and DH have been made 3845 no-ops and deprecated. 3846 3847 *Matt Caswell* 3848 3849 * Windows RAND implementation was simplified to only get entropy by 3850 calling CryptGenRandom(). Various other RAND-related tickets 3851 were also closed. 3852 3853 *Joseph Wylie Yandle, Rich Salz* 3854 3855 * The stack and lhash API's were renamed to start with `OPENSSL_SK_` 3856 and `OPENSSL_LH_`, respectively. The old names are available 3857 with API compatibility. They new names are now completely documented. 3858 3859 *Rich Salz* 3860 3861 * Unify TYPE_up_ref(obj) methods signature. 3862 SSL_CTX_up_ref(), SSL_up_ref(), X509_up_ref(), EVP_PKEY_up_ref(), 3863 X509_CRL_up_ref(), X509_OBJECT_up_ref_count() methods are now returning an 3864 int (instead of void) like all others TYPE_up_ref() methods. 3865 So now these methods also check the return value of CRYPTO_atomic_add(), 3866 and the validity of object reference counter. 3867 3868 *fdasilvayy@gmail.com* 3869 3870 * With Windows Visual Studio builds, the .pdb files are installed 3871 alongside the installed libraries and executables. For a static 3872 library installation, ossl_static.pdb is the associate compiler 3873 generated .pdb file to be used when linking programs. 3874 3875 *Richard Levitte* 3876 3877 * Remove openssl.spec. Packaging files belong with the packagers. 3878 3879 *Richard Levitte* 3880 3881 * Automatic Darwin/OSX configuration has had a refresh, it will now 3882 recognise x86_64 architectures automatically. You can still decide 3883 to build for a different bitness with the environment variable 3884 KERNEL_BITS (can be 32 or 64), for example: 3885 3886 KERNEL_BITS=32 ./config 3887 3888 *Richard Levitte* 3889 3890 * Change default algorithms in pkcs8 utility to use PKCS#5 v2.0, 3891 256 bit AES and HMAC with SHA256. 3892 3893 *Steve Henson* 3894 3895 * Remove support for MIPS o32 ABI on IRIX (and IRIX only). 3896 3897 *Andy Polyakov* 3898 3899 * Triple-DES ciphers have been moved from HIGH to MEDIUM. 3900 3901 *Rich Salz* 3902 3903 * To enable users to have their own config files and build file templates, 3904 Configure looks in the directory indicated by the environment variable 3905 OPENSSL_LOCAL_CONFIG_DIR as well as the in-source Configurations/ 3906 directory. On VMS, OPENSSL_LOCAL_CONFIG_DIR is expected to be a logical 3907 name and is used as is. 3908 3909 *Richard Levitte* 3910 3911 * The following datatypes were made opaque: X509_OBJECT, X509_STORE_CTX, 3912 X509_STORE, X509_LOOKUP, and X509_LOOKUP_METHOD. The unused type 3913 X509_CERT_FILE_CTX was removed. 3914 3915 *Rich Salz* 3916 3917 * "shared" builds are now the default. To create only static libraries use 3918 the "no-shared" Configure option. 3919 3920 *Matt Caswell* 3921 3922 * Remove the no-aes, no-hmac, no-rsa, no-sha and no-md5 Configure options. 3923 All of these option have not worked for some while and are fundamental 3924 algorithms. 3925 3926 *Matt Caswell* 3927 3928 * Make various cleanup routines no-ops and mark them as deprecated. Most 3929 global cleanup functions are no longer required because they are handled 3930 via auto-deinit (see OPENSSL_init_crypto and OPENSSL_init_ssl man pages). 3931 Explicitly de-initing can cause problems (e.g. where a library that uses 3932 OpenSSL de-inits, but an application is still using it). The affected 3933 functions are CONF_modules_free(), ENGINE_cleanup(), OBJ_cleanup(), 3934 EVP_cleanup(), BIO_sock_cleanup(), CRYPTO_cleanup_all_ex_data(), 3935 RAND_cleanup(), SSL_COMP_free_compression_methods(), ERR_free_strings() and 3936 COMP_zlib_cleanup(). 3937 3938 *Matt Caswell* 3939 3940 * --strict-warnings no longer enables runtime debugging options 3941 such as REF_DEBUG. Instead, debug options are automatically 3942 enabled with '--debug' builds. 3943 3944 *Andy Polyakov, Emilia Käsper* 3945 3946 * Made DH and DH_METHOD opaque. The structures for managing DH objects 3947 have been moved out of the public header files. New functions for managing 3948 these have been added. 3949 3950 *Matt Caswell* 3951 3952 * Made RSA and RSA_METHOD opaque. The structures for managing RSA 3953 objects have been moved out of the public header files. New 3954 functions for managing these have been added. 3955 3956 *Richard Levitte* 3957 3958 * Made DSA and DSA_METHOD opaque. The structures for managing DSA objects 3959 have been moved out of the public header files. New functions for managing 3960 these have been added. 3961 3962 *Matt Caswell* 3963 3964 * Made BIO and BIO_METHOD opaque. The structures for managing BIOs have been 3965 moved out of the public header files. New functions for managing these 3966 have been added. 3967 3968 *Matt Caswell* 3969 3970 * Removed no-rijndael as a config option. Rijndael is an old name for AES. 3971 3972 *Matt Caswell* 3973 3974 * Removed the mk1mf build scripts. 3975 3976 *Richard Levitte* 3977 3978 * Headers are now wrapped, if necessary, with OPENSSL_NO_xxx, so 3979 it is always safe to #include a header now. 3980 3981 *Rich Salz* 3982 3983 * Removed the aged BC-32 config and all its supporting scripts 3984 3985 *Richard Levitte* 3986 3987 * Removed support for Ultrix, Netware, and OS/2. 3988 3989 *Rich Salz* 3990 3991 * Add support for HKDF. 3992 3993 *Alessandro Ghedini* 3994 3995 * Add support for blake2b and blake2s 3996 3997 *Bill Cox* 3998 3999 * Added support for "pipelining". Ciphers that have the 4000 EVP_CIPH_FLAG_PIPELINE flag set have a capability to process multiple 4001 encryptions/decryptions simultaneously. There are currently no built-in 4002 ciphers with this property but the expectation is that engines will be able 4003 to offer it to significantly improve throughput. Support has been extended 4004 into libssl so that multiple records for a single connection can be 4005 processed in one go (for >=TLS 1.1). 4006 4007 *Matt Caswell* 4008 4009 * Added the AFALG engine. This is an async capable engine which is able to 4010 offload work to the Linux kernel. In this initial version it only supports 4011 AES128-CBC. The kernel must be version 4.1.0 or greater. 4012 4013 *Catriona Lucey* 4014 4015 * OpenSSL now uses a new threading API. It is no longer necessary to 4016 set locking callbacks to use OpenSSL in a multi-threaded environment. There 4017 are two supported threading models: pthreads and windows threads. It is 4018 also possible to configure OpenSSL at compile time for "no-threads". The 4019 old threading API should no longer be used. The functions have been 4020 replaced with "no-op" compatibility macros. 4021 4022 *Alessandro Ghedini, Matt Caswell* 4023 4024 * Modify behavior of ALPN to invoke callback after SNI/servername 4025 callback, such that updates to the SSL_CTX affect ALPN. 4026 4027 *Todd Short* 4028 4029 * Add SSL_CIPHER queries for authentication and key-exchange. 4030 4031 *Todd Short* 4032 4033 * Changes to the DEFAULT cipherlist: 4034 - Prefer (EC)DHE handshakes over plain RSA. 4035 - Prefer AEAD ciphers over legacy ciphers. 4036 - Prefer ECDSA over RSA when both certificates are available. 4037 - Prefer TLSv1.2 ciphers/PRF. 4038 - Remove DSS, SEED, IDEA, CAMELLIA, and AES-CCM from the 4039 default cipherlist. 4040 4041 *Emilia Käsper* 4042 4043 * Change the ECC default curve list to be this, in order: x25519, 4044 secp256r1, secp521r1, secp384r1. 4045 4046 *Rich Salz* 4047 4048 * RC4 based libssl ciphersuites are now classed as "weak" ciphers and are 4049 disabled by default. They can be re-enabled using the 4050 enable-weak-ssl-ciphers option to Configure. 4051 4052 *Matt Caswell* 4053 4054 * If the server has ALPN configured, but supports no protocols that the 4055 client advertises, send a fatal "no_application_protocol" alert. 4056 This behaviour is SHALL in RFC 7301, though it isn't universally 4057 implemented by other servers. 4058 4059 *Emilia Käsper* 4060 4061 * Add X25519 support. 4062 Add ASN.1 and EVP_PKEY methods for X25519. This includes support 4063 for public and private key encoding using the format documented in 4064 draft-ietf-curdle-pkix-02. The corresponding EVP_PKEY method supports 4065 key generation and key derivation. 4066 4067 TLS support complies with draft-ietf-tls-rfc4492bis-08 and uses 4068 X25519(29). 4069 4070 *Steve Henson* 4071 4072 * Deprecate SRP_VBASE_get_by_user. 4073 SRP_VBASE_get_by_user had inconsistent memory management behaviour. 4074 In order to fix an unavoidable memory leak ([CVE-2016-0798]), 4075 SRP_VBASE_get_by_user was changed to ignore the "fake user" SRP 4076 seed, even if the seed is configured. 4077 4078 Users should use SRP_VBASE_get1_by_user instead. Note that in 4079 SRP_VBASE_get1_by_user, caller must free the returned value. Note 4080 also that even though configuring the SRP seed attempts to hide 4081 invalid usernames by continuing the handshake with fake 4082 credentials, this behaviour is not constant time and no strong 4083 guarantees are made that the handshake is indistinguishable from 4084 that of a valid user. 4085 4086 *Emilia Käsper* 4087 4088 * Configuration change; it's now possible to build dynamic engines 4089 without having to build shared libraries and vice versa. This 4090 only applies to the engines in `engines/`, those in `crypto/engine/` 4091 will always be built into libcrypto (i.e. "static"). 4092 4093 Building dynamic engines is enabled by default; to disable, use 4094 the configuration option "disable-dynamic-engine". 4095 4096 The only requirements for building dynamic engines are the 4097 presence of the DSO module and building with position independent 4098 code, so they will also automatically be disabled if configuring 4099 with "disable-dso" or "disable-pic". 4100 4101 The macros OPENSSL_NO_STATIC_ENGINE and OPENSSL_NO_DYNAMIC_ENGINE 4102 are also taken away from openssl/opensslconf.h, as they are 4103 irrelevant. 4104 4105 *Richard Levitte* 4106 4107 * Configuration change; if there is a known flag to compile 4108 position independent code, it will always be applied on the 4109 libcrypto and libssl object files, and never on the application 4110 object files. This means other libraries that use routines from 4111 libcrypto / libssl can be made into shared libraries regardless 4112 of how OpenSSL was configured. 4113 4114 If this isn't desirable, the configuration options "disable-pic" 4115 or "no-pic" can be used to disable the use of PIC. This will 4116 also disable building shared libraries and dynamic engines. 4117 4118 *Richard Levitte* 4119 4120 * Removed JPAKE code. It was experimental and has no wide use. 4121 4122 *Rich Salz* 4123 4124 * The INSTALL_PREFIX Makefile variable has been renamed to 4125 DESTDIR. That makes for less confusion on what this variable 4126 is for. Also, the configuration option --install_prefix is 4127 removed. 4128 4129 *Richard Levitte* 4130 4131 * Heartbeat for TLS has been removed and is disabled by default 4132 for DTLS; configure with enable-heartbeats. Code that uses the 4133 old #define's might need to be updated. 4134 4135 *Emilia Käsper, Rich Salz* 4136 4137 * Rename REF_CHECK to REF_DEBUG. 4138 4139 *Rich Salz* 4140 4141 * New "unified" build system 4142 4143 The "unified" build system is aimed to be a common system for all 4144 platforms we support. With it comes new support for VMS. 4145 4146 This system builds supports building in a different directory tree 4147 than the source tree. It produces one Makefile (for unix family 4148 or lookalikes), or one descrip.mms (for VMS). 4149 4150 The source of information to make the Makefile / descrip.mms is 4151 small files called 'build.info', holding the necessary 4152 information for each directory with source to compile, and a 4153 template in Configurations, like unix-Makefile.tmpl or 4154 descrip.mms.tmpl. 4155 4156 With this change, the library names were also renamed on Windows 4157 and on VMS. They now have names that are closer to the standard 4158 on Unix, and include the major version number, and in certain 4159 cases, the architecture they are built for. See "Notes on shared 4160 libraries" in INSTALL. 4161 4162 We rely heavily on the perl module Text::Template. 4163 4164 *Richard Levitte* 4165 4166 * Added support for auto-initialisation and de-initialisation of the library. 4167 OpenSSL no longer requires explicit init or deinit routines to be called, 4168 except in certain circumstances. See the OPENSSL_init_crypto() and 4169 OPENSSL_init_ssl() man pages for further information. 4170 4171 *Matt Caswell* 4172 4173 * The arguments to the DTLSv1_listen function have changed. Specifically the 4174 "peer" argument is now expected to be a BIO_ADDR object. 4175 4176 * Rewrite of BIO networking library. The BIO library lacked consistent 4177 support of IPv6, and adding it required some more extensive 4178 modifications. This introduces the BIO_ADDR and BIO_ADDRINFO types, 4179 which hold all types of addresses and chains of address information. 4180 It also introduces a new API, with functions like BIO_socket, 4181 BIO_connect, BIO_listen, BIO_lookup and a rewrite of BIO_accept. 4182 The source/sink BIOs BIO_s_connect, BIO_s_accept and BIO_s_datagram 4183 have been adapted accordingly. 4184 4185 *Richard Levitte* 4186 4187 * RSA_padding_check_PKCS1_type_1 now accepts inputs with and without 4188 the leading 0-byte. 4189 4190 *Emilia Käsper* 4191 4192 * CRIME protection: disable compression by default, even if OpenSSL is 4193 compiled with zlib enabled. Applications can still enable compression 4194 by calling SSL_CTX_clear_options(ctx, SSL_OP_NO_COMPRESSION), or by 4195 using the SSL_CONF library to configure compression. 4196 4197 *Emilia Käsper* 4198 4199 * The signature of the session callback configured with 4200 SSL_CTX_sess_set_get_cb was changed. The read-only input buffer 4201 was explicitly marked as `const unsigned char*` instead of 4202 `unsigned char*`. 4203 4204 *Emilia Käsper* 4205 4206 * Always DPURIFY. Remove the use of uninitialized memory in the 4207 RNG, and other conditional uses of DPURIFY. This makes -DPURIFY a no-op. 4208 4209 *Emilia Käsper* 4210 4211 * Removed many obsolete configuration items, including 4212 DES_PTR, DES_RISC1, DES_RISC2, DES_INT 4213 MD2_CHAR, MD2_INT, MD2_LONG 4214 BF_PTR, BF_PTR2 4215 IDEA_SHORT, IDEA_LONG 4216 RC2_SHORT, RC2_LONG, RC4_LONG, RC4_CHUNK, RC4_INDEX 4217 4218 *Rich Salz, with advice from Andy Polyakov* 4219 4220 * Many BN internals have been moved to an internal header file. 4221 4222 *Rich Salz with help from Andy Polyakov* 4223 4224 * Configuration and writing out the results from it has changed. 4225 Files such as Makefile include/openssl/opensslconf.h and are now 4226 produced through general templates, such as Makefile.in and 4227 crypto/opensslconf.h.in and some help from the perl module 4228 Text::Template. 4229 4230 Also, the center of configuration information is no longer 4231 Makefile. Instead, Configure produces a perl module in 4232 configdata.pm which holds most of the config data (in the hash 4233 table %config), the target data that comes from the target 4234 configuration in one of the `Configurations/*.conf` files (in 4235 %target). 4236 4237 *Richard Levitte* 4238 4239 * To clarify their intended purposes, the Configure options 4240 --prefix and --openssldir change their semantics, and become more 4241 straightforward and less interdependent. 4242 4243 --prefix shall be used exclusively to give the location INSTALLTOP 4244 where programs, scripts, libraries, include files and manuals are 4245 going to be installed. The default is now /usr/local. 4246 4247 --openssldir shall be used exclusively to give the default 4248 location OPENSSLDIR where certificates, private keys, CRLs are 4249 managed. This is also where the default openssl.cnf gets 4250 installed. 4251 If the directory given with this option is a relative path, the 4252 values of both the --prefix value and the --openssldir value will 4253 be combined to become OPENSSLDIR. 4254 The default for --openssldir is INSTALLTOP/ssl. 4255 4256 Anyone who uses --openssldir to specify where OpenSSL is to be 4257 installed MUST change to use --prefix instead. 4258 4259 *Richard Levitte* 4260 4261 * The GOST engine was out of date and therefore it has been removed. An up 4262 to date GOST engine is now being maintained in an external repository. 4263 See: <https://wiki.openssl.org/index.php/Binaries>. Libssl still retains 4264 support for GOST ciphersuites (these are only activated if a GOST engine 4265 is present). 4266 4267 *Matt Caswell* 4268 4269 * EGD is no longer supported by default; use enable-egd when 4270 configuring. 4271 4272 *Ben Kaduk and Rich Salz* 4273 4274 * The distribution now has Makefile.in files, which are used to 4275 create Makefile's when Configure is run. *Configure must be run 4276 before trying to build now.* 4277 4278 *Rich Salz* 4279 4280 * The return value for SSL_CIPHER_description() for error conditions 4281 has changed. 4282 4283 *Rich Salz* 4284 4285 * Support for RFC6698/RFC7671 DANE TLSA peer authentication. 4286 4287 Obtaining and performing DNSSEC validation of TLSA records is 4288 the application's responsibility. The application provides 4289 the TLSA records of its choice to OpenSSL, and these are then 4290 used to authenticate the peer. 4291 4292 The TLSA records need not even come from DNS. They can, for 4293 example, be used to implement local end-entity certificate or 4294 trust-anchor "pinning", where the "pin" data takes the form 4295 of TLSA records, which can augment or replace verification 4296 based on the usual WebPKI public certification authorities. 4297 4298 *Viktor Dukhovni* 4299 4300 * Revert default OPENSSL_NO_DEPRECATED setting. Instead OpenSSL 4301 continues to support deprecated interfaces in default builds. 4302 However, applications are strongly advised to compile their 4303 source files with -DOPENSSL_API_COMPAT=0x10100000L, which hides 4304 the declarations of all interfaces deprecated in 0.9.8, 1.0.0 4305 or the 1.1.0 releases. 4306 4307 In environments in which all applications have been ported to 4308 not use any deprecated interfaces OpenSSL's Configure script 4309 should be used with the --api=1.1.0 option to entirely remove 4310 support for the deprecated features from the library and 4311 unconditionally disable them in the installed headers. 4312 Essentially the same effect can be achieved with the "no-deprecated" 4313 argument to Configure, except that this will always restrict 4314 the build to just the latest API, rather than a fixed API 4315 version. 4316 4317 As applications are ported to future revisions of the API, 4318 they should update their compile-time OPENSSL_API_COMPAT define 4319 accordingly, but in most cases should be able to continue to 4320 compile with later releases. 4321 4322 The OPENSSL_API_COMPAT versions for 1.0.0, and 0.9.8 are 4323 0x10000000L and 0x00908000L, respectively. However those 4324 versions did not support the OPENSSL_API_COMPAT feature, and 4325 so applications are not typically tested for explicit support 4326 of just the undeprecated features of either release. 4327 4328 *Viktor Dukhovni* 4329 4330 * Add support for setting the minimum and maximum supported protocol. 4331 It can bet set via the SSL_set_min_proto_version() and 4332 SSL_set_max_proto_version(), or via the SSL_CONF's MinProtocol and 4333 MaxProtocol. It's recommended to use the new APIs to disable 4334 protocols instead of disabling individual protocols using 4335 SSL_set_options() or SSL_CONF's Protocol. This change also 4336 removes support for disabling TLS 1.2 in the OpenSSL TLS 4337 client at compile time by defining OPENSSL_NO_TLS1_2_CLIENT. 4338 4339 *Kurt Roeckx* 4340 4341 * Support for ChaCha20 and Poly1305 added to libcrypto and libssl. 4342 4343 *Andy Polyakov* 4344 4345 * New EC_KEY_METHOD, this replaces the older ECDSA_METHOD and ECDH_METHOD 4346 and integrates ECDSA and ECDH functionality into EC. Implementations can 4347 now redirect key generation and no longer need to convert to or from 4348 ECDSA_SIG format. 4349 4350 Note: the ecdsa.h and ecdh.h headers are now no longer needed and just 4351 include the ec.h header file instead. 4352 4353 *Steve Henson* 4354 4355 * Remove support for all 40 and 56 bit ciphers. This includes all the export 4356 ciphers who are no longer supported and drops support the ephemeral RSA key 4357 exchange. The LOW ciphers currently doesn't have any ciphers in it. 4358 4359 *Kurt Roeckx* 4360 4361 * Made EVP_MD_CTX, EVP_MD, EVP_CIPHER_CTX, EVP_CIPHER and HMAC_CTX 4362 opaque. For HMAC_CTX, the following constructors and destructors 4363 were added: 4364 4365 HMAC_CTX *HMAC_CTX_new(void); 4366 void HMAC_CTX_free(HMAC_CTX *ctx); 4367 4368 For EVP_MD and EVP_CIPHER, complete APIs to create, fill and 4369 destroy such methods has been added. See EVP_MD_meth_new(3) and 4370 EVP_CIPHER_meth_new(3) for documentation. 4371 4372 Additional changes: 4373 1) `EVP_MD_CTX_cleanup()`, `EVP_CIPHER_CTX_cleanup()` and 4374 `HMAC_CTX_cleanup()` were removed. `HMAC_CTX_reset()` and 4375 `EVP_MD_CTX_reset()` should be called instead to reinitialise 4376 an already created structure. 4377 2) For consistency with the majority of our object creators and 4378 destructors, `EVP_MD_CTX_(create|destroy)` were renamed to 4379 `EVP_MD_CTX_(new|free)`. The old names are retained as macros 4380 for deprecated builds. 4381 4382 *Richard Levitte* 4383 4384 * Added ASYNC support. Libcrypto now includes the async sub-library to enable 4385 cryptographic operations to be performed asynchronously as long as an 4386 asynchronous capable engine is used. See the ASYNC_start_job() man page for 4387 further details. Libssl has also had this capability integrated with the 4388 introduction of the new mode SSL_MODE_ASYNC and associated error 4389 SSL_ERROR_WANT_ASYNC. See the SSL_CTX_set_mode() and SSL_get_error() man 4390 pages. This work was developed in partnership with Intel Corp. 4391 4392 *Matt Caswell* 4393 4394 * SSL_{CTX_}set_ecdh_auto() has been removed and ECDH is support is 4395 always enabled now. If you want to disable the support you should 4396 exclude it using the list of supported ciphers. This also means that the 4397 "-no_ecdhe" option has been removed from s_server. 4398 4399 *Kurt Roeckx* 4400 4401 * SSL_{CTX}_set_tmp_ecdh() which can set 1 EC curve now internally calls 4402 SSL_{CTX_}set1_curves() which can set a list. 4403 4404 *Kurt Roeckx* 4405 4406 * Remove support for SSL_{CTX_}set_tmp_ecdh_callback(). You should set the 4407 curve you want to support using SSL_{CTX_}set1_curves(). 4408 4409 *Kurt Roeckx* 4410 4411 * State machine rewrite. The state machine code has been significantly 4412 refactored in order to remove much duplication of code and solve issues 4413 with the old code (see [ssl/statem/README.md](ssl/statem/README.md) for 4414 further details). This change does have some associated API changes. 4415 Notably the SSL_state() function has been removed and replaced by 4416 SSL_get_state which now returns an "OSSL_HANDSHAKE_STATE" instead of an int. 4417 SSL_set_state() has been removed altogether. The previous handshake states 4418 defined in ssl.h and ssl3.h have also been removed. 4419 4420 *Matt Caswell* 4421 4422 * All instances of the string "ssleay" in the public API were replaced 4423 with OpenSSL (case-matching; e.g., OPENSSL_VERSION for #define's) 4424 Some error codes related to internal RSA_eay API's were renamed. 4425 4426 *Rich Salz* 4427 4428 * The demo files in crypto/threads were moved to demo/threads. 4429 4430 *Rich Salz* 4431 4432 * Removed obsolete engines: 4758cca, aep, atalla, cswift, nuron, gmp, 4433 sureware and ubsec. 4434 4435 *Matt Caswell, Rich Salz* 4436 4437 * New ASN.1 embed macro. 4438 4439 New ASN.1 macro ASN1_EMBED. This is the same as ASN1_SIMPLE except the 4440 structure is not allocated: it is part of the parent. That is instead of 4441 4442 FOO *x; 4443 4444 it must be: 4445 4446 FOO x; 4447 4448 This reduces memory fragmentation and make it impossible to accidentally 4449 set a mandatory field to NULL. 4450 4451 This currently only works for some fields specifically a SEQUENCE, CHOICE, 4452 or ASN1_STRING type which is part of a parent SEQUENCE. Since it is 4453 equivalent to ASN1_SIMPLE it cannot be tagged, OPTIONAL, SET OF or 4454 SEQUENCE OF. 4455 4456 *Steve Henson* 4457 4458 * Remove EVP_CHECK_DES_KEY, a compile-time option that never compiled. 4459 4460 *Emilia Käsper* 4461 4462 * Removed DES and RC4 ciphersuites from DEFAULT. Also removed RC2 although 4463 in 1.0.2 EXPORT was already removed and the only RC2 ciphersuite is also 4464 an EXPORT one. COMPLEMENTOFDEFAULT has been updated accordingly to add 4465 DES and RC4 ciphersuites. 4466 4467 *Matt Caswell* 4468 4469 * Rewrite EVP_DecodeUpdate (base64 decoding) to fix several bugs. 4470 This changes the decoding behaviour for some invalid messages, 4471 though the change is mostly in the more lenient direction, and 4472 legacy behaviour is preserved as much as possible. 4473 4474 *Emilia Käsper* 4475 4476 * Fix no-stdio build. 4477 *David Woodhouse <David.Woodhouse@intel.com> and also* 4478 *Ivan Nestlerode <ivan.nestlerode@sonos.com>* 4479 4480 * New testing framework 4481 The testing framework has been largely rewritten and is now using 4482 perl and the perl modules Test::Harness and an extended variant of 4483 Test::More called OpenSSL::Test to do its work. All test scripts in 4484 test/ have been rewritten into test recipes, and all direct calls to 4485 executables in test/Makefile have become individual recipes using the 4486 simplified testing OpenSSL::Test::Simple. 4487 4488 For documentation on our testing modules, do: 4489 4490 perldoc test/testlib/OpenSSL/Test/Simple.pm 4491 perldoc test/testlib/OpenSSL/Test.pm 4492 4493 *Richard Levitte* 4494 4495 * Revamped memory debug; only -DCRYPTO_MDEBUG and -DCRYPTO_MDEBUG_ABORT 4496 are used; the latter aborts on memory leaks (usually checked on exit). 4497 Some undocumented "set malloc, etc., hooks" functions were removed 4498 and others were changed. All are now documented. 4499 4500 *Rich Salz* 4501 4502 * In DSA_generate_parameters_ex, if the provided seed is too short, 4503 return an error 4504 4505 *Rich Salz and Ismo Puustinen <ismo.puustinen@intel.com>* 4506 4507 * Rewrite PSK to support ECDHE_PSK, DHE_PSK and RSA_PSK. Add ciphersuites 4508 from RFC4279, RFC4785, RFC5487, RFC5489. 4509 4510 Thanks to Christian J. Dietrich and Giuseppe D'Angelo for the 4511 original RSA_PSK patch. 4512 4513 *Steve Henson* 4514 4515 * Dropped support for the SSL3_FLAGS_DELAY_CLIENT_FINISHED flag. This SSLeay 4516 era flag was never set throughout the codebase (only read). Also removed 4517 SSL3_FLAGS_POP_BUFFER which was only used if 4518 SSL3_FLAGS_DELAY_CLIENT_FINISHED was also set. 4519 4520 *Matt Caswell* 4521 4522 * Changed the default name options in the "ca", "crl", "req" and "x509" 4523 to be "oneline" instead of "compat". 4524 4525 *Richard Levitte* 4526 4527 * Remove SSL_OP_TLS_BLOCK_PADDING_BUG. This is SSLeay legacy, we're 4528 not aware of clients that still exhibit this bug, and the workaround 4529 hasn't been working properly for a while. 4530 4531 *Emilia Käsper* 4532 4533 * The return type of BIO_number_read() and BIO_number_written() as well as 4534 the corresponding num_read and num_write members in the BIO structure has 4535 changed from unsigned long to uint64_t. On platforms where an unsigned 4536 long is 32 bits (e.g. Windows) these counters could overflow if >4Gb is 4537 transferred. 4538 4539 *Matt Caswell* 4540 4541 * Given the pervasive nature of TLS extensions it is inadvisable to run 4542 OpenSSL without support for them. It also means that maintaining 4543 the OPENSSL_NO_TLSEXT option within the code is very invasive (and probably 4544 not well tested). Therefore the OPENSSL_NO_TLSEXT option has been removed. 4545 4546 *Matt Caswell* 4547 4548 * Removed support for the two export grade static DH ciphersuites 4549 EXP-DH-RSA-DES-CBC-SHA and EXP-DH-DSS-DES-CBC-SHA. These two ciphersuites 4550 were newly added (along with a number of other static DH ciphersuites) to 4551 1.0.2. However the two export ones have *never* worked since they were 4552 introduced. It seems strange in any case to be adding new export 4553 ciphersuites, and given "logjam" it also does not seem correct to fix them. 4554 4555 *Matt Caswell* 4556 4557 * Version negotiation has been rewritten. In particular SSLv23_method(), 4558 SSLv23_client_method() and SSLv23_server_method() have been deprecated, 4559 and turned into macros which simply call the new preferred function names 4560 TLS_method(), TLS_client_method() and TLS_server_method(). All new code 4561 should use the new names instead. Also as part of this change the ssl23.h 4562 header file has been removed. 4563 4564 *Matt Caswell* 4565 4566 * Support for Kerberos ciphersuites in TLS (RFC2712) has been removed. This 4567 code and the associated standard is no longer considered fit-for-purpose. 4568 4569 *Matt Caswell* 4570 4571 * RT2547 was closed. When generating a private key, try to make the 4572 output file readable only by the owner. This behavior change might 4573 be noticeable when interacting with other software. 4574 4575 * Documented all exdata functions. Added CRYPTO_free_ex_index. 4576 Added a test. 4577 4578 *Rich Salz* 4579 4580 * Added HTTP GET support to the ocsp command. 4581 4582 *Rich Salz* 4583 4584 * Changed default digest for the dgst and enc commands from MD5 to 4585 sha256 4586 4587 *Rich Salz* 4588 4589 * RAND_pseudo_bytes has been deprecated. Users should use RAND_bytes instead. 4590 4591 *Matt Caswell* 4592 4593 * Added support for TLS extended master secret from 4594 draft-ietf-tls-session-hash-03.txt. Thanks for Alfredo Pironti for an 4595 initial patch which was a great help during development. 4596 4597 *Steve Henson* 4598 4599 * All libssl internal structures have been removed from the public header 4600 files, and the OPENSSL_NO_SSL_INTERN option has been removed (since it is 4601 now redundant). Users should not attempt to access internal structures 4602 directly. Instead they should use the provided API functions. 4603 4604 *Matt Caswell* 4605 4606 * config has been changed so that by default OPENSSL_NO_DEPRECATED is used. 4607 Access to deprecated functions can be re-enabled by running config with 4608 "enable-deprecated". In addition applications wishing to use deprecated 4609 functions must define OPENSSL_USE_DEPRECATED. Note that this new behaviour 4610 will, by default, disable some transitive includes that previously existed 4611 in the header files (e.g. ec.h will no longer, by default, include bn.h) 4612 4613 *Matt Caswell* 4614 4615 * Added support for OCB mode. OpenSSL has been granted a patent license 4616 compatible with the OpenSSL license for use of OCB. Details are available 4617 at <https://www.openssl.org/source/OCB-patent-grant-OpenSSL.pdf>. Support 4618 for OCB can be removed by calling config with no-ocb. 4619 4620 *Matt Caswell* 4621 4622 * SSLv2 support has been removed. It still supports receiving a SSLv2 4623 compatible client hello. 4624 4625 *Kurt Roeckx* 4626 4627 * Increased the minimal RSA keysize from 256 to 512 bits [Rich Salz], 4628 done while fixing the error code for the key-too-small case. 4629 4630 *Annie Yousar <a.yousar@informatik.hu-berlin.de>* 4631 4632 * CA.sh has been removed; use CA.pl instead. 4633 4634 *Rich Salz* 4635 4636 * Removed old DES API. 4637 4638 *Rich Salz* 4639 4640 * Remove various unsupported platforms: 4641 Sony NEWS4 4642 BEOS and BEOS_R5 4643 NeXT 4644 SUNOS 4645 MPE/iX 4646 Sinix/ReliantUNIX RM400 4647 DGUX 4648 NCR 4649 Tandem 4650 Cray 4651 16-bit platforms such as WIN16 4652 4653 *Rich Salz* 4654 4655 * Clean up OPENSSL_NO_xxx #define's 4656 - Use setbuf() and remove OPENSSL_NO_SETVBUF_IONBF 4657 - Rename OPENSSL_SYSNAME_xxx to OPENSSL_SYS_xxx 4658 - OPENSSL_NO_EC{DH,DSA} merged into OPENSSL_NO_EC 4659 - OPENSSL_NO_RIPEMD160, OPENSSL_NO_RIPEMD merged into OPENSSL_NO_RMD160 4660 - OPENSSL_NO_FP_API merged into OPENSSL_NO_STDIO 4661 - Remove OPENSSL_NO_BIO OPENSSL_NO_BUFFER OPENSSL_NO_CHAIN_VERIFY 4662 OPENSSL_NO_EVP OPENSSL_NO_FIPS_ERR OPENSSL_NO_HASH_COMP 4663 OPENSSL_NO_LHASH OPENSSL_NO_OBJECT OPENSSL_NO_SPEED OPENSSL_NO_STACK 4664 OPENSSL_NO_X509 OPENSSL_NO_X509_VERIFY 4665 - Remove MS_STATIC; it's a relic from platforms <32 bits. 4666 4667 *Rich Salz* 4668 4669 * Cleaned up dead code 4670 Remove all but one '#ifdef undef' which is to be looked at. 4671 4672 *Rich Salz* 4673 4674 * Clean up calling of xxx_free routines. 4675 Just like free(), fix most of the xxx_free routines to accept 4676 NULL. Remove the non-null checks from callers. Save much code. 4677 4678 *Rich Salz* 4679 4680 * Add secure heap for storage of private keys (when possible). 4681 Add BIO_s_secmem(), CBIGNUM, etc. 4682 Contributed by Akamai Technologies under our Corporate CLA. 4683 4684 *Rich Salz* 4685 4686 * Experimental support for a new, fast, unbiased prime candidate generator, 4687 bn_probable_prime_dh_coprime(). Not currently used by any prime generator. 4688 4689 *Felix Laurie von Massenbach <felix@erbridge.co.uk>* 4690 4691 * New output format NSS in the sess_id command line tool. This allows 4692 exporting the session id and the master key in NSS keylog format. 4693 4694 *Martin Kaiser <martin@kaiser.cx>* 4695 4696 * Harmonize version and its documentation. -f flag is used to display 4697 compilation flags. 4698 4699 *mancha <mancha1@zoho.com>* 4700 4701 * Fix eckey_priv_encode so it immediately returns an error upon a failure 4702 in i2d_ECPrivateKey. Thanks to Ted Unangst for feedback on this issue. 4703 4704 *mancha <mancha1@zoho.com>* 4705 4706 * Fix some double frees. These are not thought to be exploitable. 4707 4708 *mancha <mancha1@zoho.com>* 4709 4710 * A missing bounds check in the handling of the TLS heartbeat extension 4711 can be used to reveal up to 64k of memory to a connected client or 4712 server. 4713 4714 Thanks for Neel Mehta of Google Security for discovering this bug and to 4715 Adam Langley <agl@chromium.org> and Bodo Moeller <bmoeller@acm.org> for 4716 preparing the fix ([CVE-2014-0160]) 4717 4718 *Adam Langley, Bodo Moeller* 4719 4720 * Fix for the attack described in the paper "Recovering OpenSSL 4721 ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack" 4722 by Yuval Yarom and Naomi Benger. Details can be obtained from: 4723 <http://eprint.iacr.org/2014/140> 4724 4725 Thanks to Yuval Yarom and Naomi Benger for discovering this 4726 flaw and to Yuval Yarom for supplying a fix ([CVE-2014-0076]) 4727 4728 *Yuval Yarom and Naomi Benger* 4729 4730 * Use algorithm specific chains in SSL_CTX_use_certificate_chain_file(): 4731 this fixes a limitation in previous versions of OpenSSL. 4732 4733 *Steve Henson* 4734 4735 * Experimental encrypt-then-mac support. 4736 4737 Experimental support for encrypt then mac from 4738 draft-gutmann-tls-encrypt-then-mac-02.txt 4739 4740 To enable it set the appropriate extension number (0x42 for the test 4741 server) using e.g. -DTLSEXT_TYPE_encrypt_then_mac=0x42 4742 4743 For non-compliant peers (i.e. just about everything) this should have no 4744 effect. 4745 4746 WARNING: EXPERIMENTAL, SUBJECT TO CHANGE. 4747 4748 *Steve Henson* 4749 4750 * Add EVP support for key wrapping algorithms, to avoid problems with 4751 existing code the flag EVP_CIPHER_CTX_WRAP_ALLOW has to be set in 4752 the EVP_CIPHER_CTX or an error is returned. Add AES and DES3 wrap 4753 algorithms and include tests cases. 4754 4755 *Steve Henson* 4756 4757 * Extend CMS code to support RSA-PSS signatures and RSA-OAEP for 4758 enveloped data. 4759 4760 *Steve Henson* 4761 4762 * Extended RSA OAEP support via EVP_PKEY API. Options to specify digest, 4763 MGF1 digest and OAEP label. 4764 4765 *Steve Henson* 4766 4767 * Make openssl verify return errors. 4768 4769 *Chris Palmer <palmer@google.com> and Ben Laurie* 4770 4771 * New function ASN1_TIME_diff to calculate the difference between two 4772 ASN1_TIME structures or one structure and the current time. 4773 4774 *Steve Henson* 4775 4776 * Update fips_test_suite to support multiple command line options. New 4777 test to induce all self test errors in sequence and check expected 4778 failures. 4779 4780 *Steve Henson* 4781 4782 * Add FIPS_{rsa,dsa,ecdsa}_{sign,verify} functions which digest and 4783 sign or verify all in one operation. 4784 4785 *Steve Henson* 4786 4787 * Add fips_algvs: a multicall fips utility incorporating all the algorithm 4788 test programs and fips_test_suite. Includes functionality to parse 4789 the minimal script output of fipsalgest.pl directly. 4790 4791 *Steve Henson* 4792 4793 * Add authorisation parameter to FIPS_module_mode_set(). 4794 4795 *Steve Henson* 4796 4797 * Add FIPS selftest for ECDH algorithm using P-224 and B-233 curves. 4798 4799 *Steve Henson* 4800 4801 * Use separate DRBG fields for internal and external flags. New function 4802 FIPS_drbg_health_check() to perform on demand health checking. Add 4803 generation tests to fips_test_suite with reduced health check interval to 4804 demonstrate periodic health checking. Add "nodh" option to 4805 fips_test_suite to skip very slow DH test. 4806 4807 *Steve Henson* 4808 4809 * New function FIPS_get_cipherbynid() to lookup FIPS supported ciphers 4810 based on NID. 4811 4812 *Steve Henson* 4813 4814 * More extensive health check for DRBG checking many more failure modes. 4815 New function FIPS_selftest_drbg_all() to handle every possible DRBG 4816 combination: call this in fips_test_suite. 4817 4818 *Steve Henson* 4819 4820 * Add support for canonical generation of DSA parameter 'g'. See 4821 FIPS 186-3 A.2.3. 4822 4823 * Add support for HMAC DRBG from SP800-90. Update DRBG algorithm test and 4824 POST to handle HMAC cases. 4825 4826 *Steve Henson* 4827 4828 * Add functions FIPS_module_version() and FIPS_module_version_text() 4829 to return numerical and string versions of the FIPS module number. 4830 4831 *Steve Henson* 4832 4833 * Rename FIPS_mode_set and FIPS_mode to FIPS_module_mode_set and 4834 FIPS_module_mode. FIPS_mode and FIPS_mode_set will be implemented 4835 outside the validated module in the FIPS capable OpenSSL. 4836 4837 *Steve Henson* 4838 4839 * Minor change to DRBG entropy callback semantics. In some cases 4840 there is no multiple of the block length between min_len and 4841 max_len. Allow the callback to return more than max_len bytes 4842 of entropy but discard any extra: it is the callback's responsibility 4843 to ensure that the extra data discarded does not impact the 4844 requested amount of entropy. 4845 4846 *Steve Henson* 4847 4848 * Add PRNG security strength checks to RSA, DSA and ECDSA using 4849 information in FIPS186-3, SP800-57 and SP800-131A. 4850 4851 *Steve Henson* 4852 4853 * CCM support via EVP. Interface is very similar to GCM case except we 4854 must supply all data in one chunk (i.e. no update, final) and the 4855 message length must be supplied if AAD is used. Add algorithm test 4856 support. 4857 4858 *Steve Henson* 4859 4860 * Initial version of POST overhaul. Add POST callback to allow the status 4861 of POST to be monitored and/or failures induced. Modify fips_test_suite 4862 to use callback. Always run all selftests even if one fails. 4863 4864 *Steve Henson* 4865 4866 * XTS support including algorithm test driver in the fips_gcmtest program. 4867 Note: this does increase the maximum key length from 32 to 64 bytes but 4868 there should be no binary compatibility issues as existing applications 4869 will never use XTS mode. 4870 4871 *Steve Henson* 4872 4873 * Extensive reorganisation of FIPS PRNG behaviour. Remove all dependencies 4874 to OpenSSL RAND code and replace with a tiny FIPS RAND API which also 4875 performs algorithm blocking for unapproved PRNG types. Also do not 4876 set PRNG type in FIPS_mode_set(): leave this to the application. 4877 Add default OpenSSL DRBG handling: sets up FIPS PRNG and seeds with 4878 the standard OpenSSL PRNG: set additional data to a date time vector. 4879 4880 *Steve Henson* 4881 4882 * Rename old X9.31 PRNG functions of the form `FIPS_rand*` to `FIPS_x931*`. 4883 This shouldn't present any incompatibility problems because applications 4884 shouldn't be using these directly and any that are will need to rethink 4885 anyway as the X9.31 PRNG is now deprecated by FIPS 140-2 4886 4887 *Steve Henson* 4888 4889 * Extensive self tests and health checking required by SP800-90 DRBG. 4890 Remove strength parameter from FIPS_drbg_instantiate and always 4891 instantiate at maximum supported strength. 4892 4893 *Steve Henson* 4894 4895 * Add ECDH code to fips module and fips_ecdhvs for primitives only testing. 4896 4897 *Steve Henson* 4898 4899 * New algorithm test program fips_dhvs to handle DH primitives only testing. 4900 4901 *Steve Henson* 4902 4903 * New function DH_compute_key_padded() to compute a DH key and pad with 4904 leading zeroes if needed: this complies with SP800-56A et al. 4905 4906 *Steve Henson* 4907 4908 * Initial implementation of SP800-90 DRBGs for Hash and CTR. Not used by 4909 anything, incomplete, subject to change and largely untested at present. 4910 4911 *Steve Henson* 4912 4913 * Modify fipscanisteronly build option to only build the necessary object 4914 files by filtering FIPS_EX_OBJ through a perl script in crypto/Makefile. 4915 4916 *Steve Henson* 4917 4918 * Add experimental option FIPSSYMS to give all symbols in 4919 fipscanister.o and FIPS or fips prefix. This will avoid 4920 conflicts with future versions of OpenSSL. Add perl script 4921 util/fipsas.pl to preprocess assembly language source files 4922 and rename any affected symbols. 4923 4924 *Steve Henson* 4925 4926 * Add selftest checks and algorithm block of non-fips algorithms in 4927 FIPS mode. Remove DES2 from selftests. 4928 4929 *Steve Henson* 4930 4931 * Add ECDSA code to fips module. Add tiny fips_ecdsa_check to just 4932 return internal method without any ENGINE dependencies. Add new 4933 tiny fips sign and verify functions. 4934 4935 *Steve Henson* 4936 4937 * New build option no-ec2m to disable characteristic 2 code. 4938 4939 *Steve Henson* 4940 4941 * New build option "fipscanisteronly". This only builds fipscanister.o 4942 and (currently) associated fips utilities. Uses the file Makefile.fips 4943 instead of Makefile.org as the prototype. 4944 4945 *Steve Henson* 4946 4947 * Add some FIPS mode restrictions to GCM. Add internal IV generator. 4948 Update fips_gcmtest to use IV generator. 4949 4950 *Steve Henson* 4951 4952 * Initial, experimental EVP support for AES-GCM. AAD can be input by 4953 setting output buffer to NULL. The `*Final` function must be 4954 called although it will not retrieve any additional data. The tag 4955 can be set or retrieved with a ctrl. The IV length is by default 12 4956 bytes (96 bits) but can be set to an alternative value. If the IV 4957 length exceeds the maximum IV length (currently 16 bytes) it cannot be 4958 set before the key. 4959 4960 *Steve Henson* 4961 4962 * New flag in ciphers: EVP_CIPH_FLAG_CUSTOM_CIPHER. This means the 4963 underlying do_cipher function handles all cipher semantics itself 4964 including padding and finalisation. This is useful if (for example) 4965 an ENGINE cipher handles block padding itself. The behaviour of 4966 do_cipher is subtly changed if this flag is set: the return value 4967 is the number of characters written to the output buffer (zero is 4968 no longer an error code) or a negative error code. Also if the 4969 input buffer is NULL and length 0 finalisation should be performed. 4970 4971 *Steve Henson* 4972 4973 * If a candidate issuer certificate is already part of the constructed 4974 path ignore it: new debug notification X509_V_ERR_PATH_LOOP for this case. 4975 4976 *Steve Henson* 4977 4978 * Improve forward-security support: add functions 4979 4980 void SSL_CTX_set_not_resumable_session_callback( 4981 SSL_CTX *ctx, int (*cb)(SSL *ssl, int is_forward_secure)) 4982 void SSL_set_not_resumable_session_callback( 4983 SSL *ssl, int (*cb)(SSL *ssl, int is_forward_secure)) 4984 4985 for use by SSL/TLS servers; the callback function will be called whenever a 4986 new session is created, and gets to decide whether the session may be 4987 cached to make it resumable (return 0) or not (return 1). (As by the 4988 SSL/TLS protocol specifications, the session_id sent by the server will be 4989 empty to indicate that the session is not resumable; also, the server will 4990 not generate RFC 4507 (RFC 5077) session tickets.) 4991 4992 A simple reasonable callback implementation is to return is_forward_secure. 4993 This parameter will be set to 1 or 0 depending on the ciphersuite selected 4994 by the SSL/TLS server library, indicating whether it can provide forward 4995 security. 4996 4997 *Emilia Käsper <emilia.kasper@esat.kuleuven.be> (Google)* 4998 4999 * New -verify_name option in command line utilities to set verification 5000 parameters by name. 5001 5002 *Steve Henson* 5003 5004 * Initial CMAC implementation. WARNING: EXPERIMENTAL, API MAY CHANGE. 5005 Add CMAC pkey methods. 5006 5007 *Steve Henson* 5008 5009 * Experimental renegotiation in s_server -www mode. If the client 5010 browses /reneg connection is renegotiated. If /renegcert it is 5011 renegotiated requesting a certificate. 5012 5013 *Steve Henson* 5014 5015 * Add an "external" session cache for debugging purposes to s_server. This 5016 should help trace issues which normally are only apparent in deployed 5017 multi-process servers. 5018 5019 *Steve Henson* 5020 5021 * Extensive audit of libcrypto with DEBUG_UNUSED. Fix many cases where 5022 return value is ignored. NB. The functions RAND_add(), RAND_seed(), 5023 BIO_set_cipher() and some obscure PEM functions were changed so they 5024 can now return an error. The RAND changes required a change to the 5025 RAND_METHOD structure. 5026 5027 *Steve Henson* 5028 5029 * New macro `__owur` for "OpenSSL Warn Unused Result". This makes use of 5030 a gcc attribute to warn if the result of a function is ignored. This 5031 is enable if DEBUG_UNUSED is set. Add to several functions in evp.h 5032 whose return value is often ignored. 5033 5034 *Steve Henson* 5035 5036 * New -noct, -requestct, -requirect and -ctlogfile options for s_client. 5037 These allow SCTs (signed certificate timestamps) to be requested and 5038 validated when establishing a connection. 5039 5040 *Rob Percival <robpercival@google.com>* 5041 5042OpenSSL 1.0.2 5043------------- 5044 5045### Changes between 1.0.2s and 1.0.2t [10 Sep 2019] 5046 5047 * For built-in EC curves, ensure an EC_GROUP built from the curve name is 5048 used even when parsing explicit parameters, when loading a encoded key 5049 or calling `EC_GROUP_new_from_ecpkparameters()`/ 5050 `EC_GROUP_new_from_ecparameters()`. 5051 This prevents bypass of security hardening and performance gains, 5052 especially for curves with specialized EC_METHODs. 5053 By default, if a key encoded with explicit parameters is loaded and later 5054 encoded, the output is still encoded with explicit parameters, even if 5055 internally a "named" EC_GROUP is used for computation. 5056 5057 *Nicola Tuveri* 5058 5059 * Compute ECC cofactors if not provided during EC_GROUP construction. Before 5060 this change, EC_GROUP_set_generator would accept order and/or cofactor as 5061 NULL. After this change, only the cofactor parameter can be NULL. It also 5062 does some minimal sanity checks on the passed order. 5063 ([CVE-2019-1547]) 5064 5065 *Billy Bob Brumley* 5066 5067 * Fixed a padding oracle in PKCS7_dataDecode and CMS_decrypt_set1_pkey. 5068 An attack is simple, if the first CMS_recipientInfo is valid but the 5069 second CMS_recipientInfo is chosen ciphertext. If the second 5070 recipientInfo decodes to PKCS #1 v1.5 form plaintext, the correct 5071 encryption key will be replaced by garbage, and the message cannot be 5072 decoded, but if the RSA decryption fails, the correct encryption key is 5073 used and the recipient will not notice the attack. 5074 As a work around for this potential attack the length of the decrypted 5075 key must be equal to the cipher default key length, in case the 5076 certifiate is not given and all recipientInfo are tried out. 5077 The old behaviour can be re-enabled in the CMS code by setting the 5078 CMS_DEBUG_DECRYPT flag. 5079 ([CVE-2019-1563]) 5080 5081 *Bernd Edlinger* 5082 5083 * Document issue with installation paths in diverse Windows builds 5084 5085 '/usr/local/ssl' is an unsafe prefix for location to install OpenSSL 5086 binaries and run-time config file. 5087 ([CVE-2019-1552]) 5088 5089 *Richard Levitte* 5090 5091### Changes between 1.0.2r and 1.0.2s [28 May 2019] 5092 5093 * Change the default RSA, DSA and DH size to 2048 bit instead of 1024. 5094 This changes the size when using the `genpkey` command when no size is given. 5095 It fixes an omission in earlier changes that changed all RSA, DSA and DH 5096 generation commands to use 2048 bits by default. 5097 5098 *Kurt Roeckx* 5099 5100 * Add FIPS support for Android Arm 64-bit 5101 5102 Support for Android Arm 64-bit was added to the OpenSSL FIPS Object 5103 Module in Version 2.0.10. For some reason, the corresponding target 5104 'android64-aarch64' was missing OpenSSL 1.0.2, whence it could not be 5105 built with FIPS support on Android Arm 64-bit. This omission has been 5106 fixed. 5107 5108 *Matthias St. Pierre* 5109 5110### Changes between 1.0.2q and 1.0.2r [26 Feb 2019] 5111 5112 * 0-byte record padding oracle 5113 5114 If an application encounters a fatal protocol error and then calls 5115 SSL_shutdown() twice (once to send a close_notify, and once to receive one) 5116 then OpenSSL can respond differently to the calling application if a 0 byte 5117 record is received with invalid padding compared to if a 0 byte record is 5118 received with an invalid MAC. If the application then behaves differently 5119 based on that in a way that is detectable to the remote peer, then this 5120 amounts to a padding oracle that could be used to decrypt data. 5121 5122 In order for this to be exploitable "non-stitched" ciphersuites must be in 5123 use. Stitched ciphersuites are optimised implementations of certain 5124 commonly used ciphersuites. Also the application must call SSL_shutdown() 5125 twice even if a protocol error has occurred (applications should not do 5126 this but some do anyway). 5127 5128 This issue was discovered by Juraj Somorovsky, Robert Merget and Nimrod 5129 Aviram, with additional investigation by Steven Collison and Andrew 5130 Hourselt. It was reported to OpenSSL on 10th December 2018. 5131 ([CVE-2019-1559]) 5132 5133 *Matt Caswell* 5134 5135 * Move strictness check from EVP_PKEY_asn1_new() to EVP_PKEY_asn1_add0(). 5136 5137 *Richard Levitte* 5138 5139### Changes between 1.0.2p and 1.0.2q [20 Nov 2018] 5140 5141 * Microarchitecture timing vulnerability in ECC scalar multiplication 5142 5143 OpenSSL ECC scalar multiplication, used in e.g. ECDSA and ECDH, has been 5144 shown to be vulnerable to a microarchitecture timing side channel attack. 5145 An attacker with sufficient access to mount local timing attacks during 5146 ECDSA signature generation could recover the private key. 5147 5148 This issue was reported to OpenSSL on 26th October 2018 by Alejandro 5149 Cabrera Aldaya, Billy Brumley, Sohaib ul Hassan, Cesar Pereida Garcia and 5150 Nicola Tuveri. 5151 ([CVE-2018-5407]) 5152 5153 *Billy Brumley* 5154 5155 * Timing vulnerability in DSA signature generation 5156 5157 The OpenSSL DSA signature algorithm has been shown to be vulnerable to a 5158 timing side channel attack. An attacker could use variations in the signing 5159 algorithm to recover the private key. 5160 5161 This issue was reported to OpenSSL on 16th October 2018 by Samuel Weiser. 5162 ([CVE-2018-0734]) 5163 5164 *Paul Dale* 5165 5166 * Resolve a compatibility issue in EC_GROUP handling with the FIPS Object 5167 Module, accidentally introduced while backporting security fixes from the 5168 development branch and hindering the use of ECC in FIPS mode. 5169 5170 *Nicola Tuveri* 5171 5172### Changes between 1.0.2o and 1.0.2p [14 Aug 2018] 5173 5174 * Client DoS due to large DH parameter 5175 5176 During key agreement in a TLS handshake using a DH(E) based ciphersuite a 5177 malicious server can send a very large prime value to the client. This will 5178 cause the client to spend an unreasonably long period of time generating a 5179 key for this prime resulting in a hang until the client has finished. This 5180 could be exploited in a Denial Of Service attack. 5181 5182 This issue was reported to OpenSSL on 5th June 2018 by Guido Vranken 5183 ([CVE-2018-0732]) 5184 5185 *Guido Vranken* 5186 5187 * Cache timing vulnerability in RSA Key Generation 5188 5189 The OpenSSL RSA Key generation algorithm has been shown to be vulnerable to 5190 a cache timing side channel attack. An attacker with sufficient access to 5191 mount cache timing attacks during the RSA key generation process could 5192 recover the private key. 5193 5194 This issue was reported to OpenSSL on 4th April 2018 by Alejandro Cabrera 5195 Aldaya, Billy Brumley, Cesar Pereida Garcia and Luis Manuel Alvarez Tapia. 5196 ([CVE-2018-0737]) 5197 5198 *Billy Brumley* 5199 5200 * Make EVP_PKEY_asn1_new() a bit stricter about its input. A NULL pem_str 5201 parameter is no longer accepted, as it leads to a corrupt table. NULL 5202 pem_str is reserved for alias entries only. 5203 5204 *Richard Levitte* 5205 5206 * Revert blinding in ECDSA sign and instead make problematic addition 5207 length-invariant. Switch even to fixed-length Montgomery multiplication. 5208 5209 *Andy Polyakov* 5210 5211 * Change generating and checking of primes so that the error rate of not 5212 being prime depends on the intended use based on the size of the input. 5213 For larger primes this will result in more rounds of Miller-Rabin. 5214 The maximal error rate for primes with more than 1080 bits is lowered 5215 to 2^-128. 5216 5217 *Kurt Roeckx, Annie Yousar* 5218 5219 * Increase the number of Miller-Rabin rounds for DSA key generating to 64. 5220 5221 *Kurt Roeckx* 5222 5223 * Add blinding to ECDSA and DSA signatures to protect against side channel 5224 attacks discovered by Keegan Ryan (NCC Group). 5225 5226 *Matt Caswell* 5227 5228 * When unlocking a pass phrase protected PEM file or PKCS#8 container, we 5229 now allow empty (zero character) pass phrases. 5230 5231 *Richard Levitte* 5232 5233 * Certificate time validation (X509_cmp_time) enforces stricter 5234 compliance with RFC 5280. Fractional seconds and timezone offsets 5235 are no longer allowed. 5236 5237 *Emilia Käsper* 5238 5239### Changes between 1.0.2n and 1.0.2o [27 Mar 2018] 5240 5241 * Constructed ASN.1 types with a recursive definition could exceed the stack 5242 5243 Constructed ASN.1 types with a recursive definition (such as can be found 5244 in PKCS7) could eventually exceed the stack given malicious input with 5245 excessive recursion. This could result in a Denial Of Service attack. There 5246 are no such structures used within SSL/TLS that come from untrusted sources 5247 so this is considered safe. 5248 5249 This issue was reported to OpenSSL on 4th January 2018 by the OSS-fuzz 5250 project. 5251 ([CVE-2018-0739]) 5252 5253 *Matt Caswell* 5254 5255### Changes between 1.0.2m and 1.0.2n [7 Dec 2017] 5256 5257 * Read/write after SSL object in error state 5258 5259 OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an "error state" 5260 mechanism. The intent was that if a fatal error occurred during a handshake 5261 then OpenSSL would move into the error state and would immediately fail if 5262 you attempted to continue the handshake. This works as designed for the 5263 explicit handshake functions (SSL_do_handshake(), SSL_accept() and 5264 SSL_connect()), however due to a bug it does not work correctly if 5265 SSL_read() or SSL_write() is called directly. In that scenario, if the 5266 handshake fails then a fatal error will be returned in the initial function 5267 call. If SSL_read()/SSL_write() is subsequently called by the application 5268 for the same SSL object then it will succeed and the data is passed without 5269 being decrypted/encrypted directly from the SSL/TLS record layer. 5270 5271 In order to exploit this issue an application bug would have to be present 5272 that resulted in a call to SSL_read()/SSL_write() being issued after having 5273 already received a fatal error. 5274 5275 This issue was reported to OpenSSL by David Benjamin (Google). 5276 ([CVE-2017-3737]) 5277 5278 *Matt Caswell* 5279 5280 * rsaz_1024_mul_avx2 overflow bug on x86_64 5281 5282 There is an overflow bug in the AVX2 Montgomery multiplication procedure 5283 used in exponentiation with 1024-bit moduli. No EC algorithms are affected. 5284 Analysis suggests that attacks against RSA and DSA as a result of this 5285 defect would be very difficult to perform and are not believed likely. 5286 Attacks against DH1024 are considered just feasible, because most of the 5287 work necessary to deduce information about a private key may be performed 5288 offline. The amount of resources required for such an attack would be 5289 significant. However, for an attack on TLS to be meaningful, the server 5290 would have to share the DH1024 private key among multiple clients, which is 5291 no longer an option since CVE-2016-0701. 5292 5293 This only affects processors that support the AVX2 but not ADX extensions 5294 like Intel Haswell (4th generation). 5295 5296 This issue was reported to OpenSSL by David Benjamin (Google). The issue 5297 was originally found via the OSS-Fuzz project. 5298 ([CVE-2017-3738]) 5299 5300 *Andy Polyakov* 5301 5302### Changes between 1.0.2l and 1.0.2m [2 Nov 2017] 5303 5304 * bn_sqrx8x_internal carry bug on x86_64 5305 5306 There is a carry propagating bug in the x86_64 Montgomery squaring 5307 procedure. No EC algorithms are affected. Analysis suggests that attacks 5308 against RSA and DSA as a result of this defect would be very difficult to 5309 perform and are not believed likely. Attacks against DH are considered just 5310 feasible (although very difficult) because most of the work necessary to 5311 deduce information about a private key may be performed offline. The amount 5312 of resources required for such an attack would be very significant and 5313 likely only accessible to a limited number of attackers. An attacker would 5314 additionally need online access to an unpatched system using the target 5315 private key in a scenario with persistent DH parameters and a private 5316 key that is shared between multiple clients. 5317 5318 This only affects processors that support the BMI1, BMI2 and ADX extensions 5319 like Intel Broadwell (5th generation) and later or AMD Ryzen. 5320 5321 This issue was reported to OpenSSL by the OSS-Fuzz project. 5322 ([CVE-2017-3736]) 5323 5324 *Andy Polyakov* 5325 5326 * Malformed X.509 IPAddressFamily could cause OOB read 5327 5328 If an X.509 certificate has a malformed IPAddressFamily extension, 5329 OpenSSL could do a one-byte buffer overread. The most likely result 5330 would be an erroneous display of the certificate in text format. 5331 5332 This issue was reported to OpenSSL by the OSS-Fuzz project. 5333 5334 *Rich Salz* 5335 5336### Changes between 1.0.2k and 1.0.2l [25 May 2017] 5337 5338 * Have 'config' recognise 64-bit mingw and choose 'mingw64' as the target 5339 platform rather than 'mingw'. 5340 5341 *Richard Levitte* 5342 5343### Changes between 1.0.2j and 1.0.2k [26 Jan 2017] 5344 5345 * Truncated packet could crash via OOB read 5346 5347 If one side of an SSL/TLS path is running on a 32-bit host and a specific 5348 cipher is being used, then a truncated packet can cause that host to 5349 perform an out-of-bounds read, usually resulting in a crash. 5350 5351 This issue was reported to OpenSSL by Robert Święcki of Google. 5352 ([CVE-2017-3731]) 5353 5354 *Andy Polyakov* 5355 5356 * BN_mod_exp may produce incorrect results on x86_64 5357 5358 There is a carry propagating bug in the x86_64 Montgomery squaring 5359 procedure. No EC algorithms are affected. Analysis suggests that attacks 5360 against RSA and DSA as a result of this defect would be very difficult to 5361 perform and are not believed likely. Attacks against DH are considered just 5362 feasible (although very difficult) because most of the work necessary to 5363 deduce information about a private key may be performed offline. The amount 5364 of resources required for such an attack would be very significant and 5365 likely only accessible to a limited number of attackers. An attacker would 5366 additionally need online access to an unpatched system using the target 5367 private key in a scenario with persistent DH parameters and a private 5368 key that is shared between multiple clients. For example this can occur by 5369 default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very 5370 similar to CVE-2015-3193 but must be treated as a separate problem. 5371 5372 This issue was reported to OpenSSL by the OSS-Fuzz project. 5373 ([CVE-2017-3732]) 5374 5375 *Andy Polyakov* 5376 5377 * Montgomery multiplication may produce incorrect results 5378 5379 There is a carry propagating bug in the Broadwell-specific Montgomery 5380 multiplication procedure that handles input lengths divisible by, but 5381 longer than 256 bits. Analysis suggests that attacks against RSA, DSA 5382 and DH private keys are impossible. This is because the subroutine in 5383 question is not used in operations with the private key itself and an input 5384 of the attacker's direct choice. Otherwise the bug can manifest itself as 5385 transient authentication and key negotiation failures or reproducible 5386 erroneous outcome of public-key operations with specially crafted input. 5387 Among EC algorithms only Brainpool P-512 curves are affected and one 5388 presumably can attack ECDH key negotiation. Impact was not analyzed in 5389 detail, because pre-requisites for attack are considered unlikely. Namely 5390 multiple clients have to choose the curve in question and the server has to 5391 share the private key among them, neither of which is default behaviour. 5392 Even then only clients that chose the curve will be affected. 5393 5394 This issue was publicly reported as transient failures and was not 5395 initially recognized as a security issue. Thanks to Richard Morgan for 5396 providing reproducible case. 5397 ([CVE-2016-7055]) 5398 5399 *Andy Polyakov* 5400 5401 * OpenSSL now fails if it receives an unrecognised record type in TLS1.0 5402 or TLS1.1. Previously this only happened in SSLv3 and TLS1.2. This is to 5403 prevent issues where no progress is being made and the peer continually 5404 sends unrecognised record types, using up resources processing them. 5405 5406 *Matt Caswell* 5407 5408### Changes between 1.0.2i and 1.0.2j [26 Sep 2016] 5409 5410 * Missing CRL sanity check 5411 5412 A bug fix which included a CRL sanity check was added to OpenSSL 1.1.0 5413 but was omitted from OpenSSL 1.0.2i. As a result any attempt to use 5414 CRLs in OpenSSL 1.0.2i will crash with a null pointer exception. 5415 5416 This issue only affects the OpenSSL 1.0.2i 5417 ([CVE-2016-7052]) 5418 5419 *Matt Caswell* 5420 5421### Changes between 1.0.2h and 1.0.2i [22 Sep 2016] 5422 5423 * OCSP Status Request extension unbounded memory growth 5424 5425 A malicious client can send an excessively large OCSP Status Request 5426 extension. If that client continually requests renegotiation, sending a 5427 large OCSP Status Request extension each time, then there will be unbounded 5428 memory growth on the server. This will eventually lead to a Denial Of 5429 Service attack through memory exhaustion. Servers with a default 5430 configuration are vulnerable even if they do not support OCSP. Builds using 5431 the "no-ocsp" build time option are not affected. 5432 5433 This issue was reported to OpenSSL by Shi Lei (Gear Team, Qihoo 360 Inc.) 5434 ([CVE-2016-6304]) 5435 5436 *Matt Caswell* 5437 5438 * In order to mitigate the SWEET32 attack, the DES ciphers were moved from 5439 HIGH to MEDIUM. 5440 5441 This issue was reported to OpenSSL Karthikeyan Bhargavan and Gaetan 5442 Leurent (INRIA) 5443 ([CVE-2016-2183]) 5444 5445 *Rich Salz* 5446 5447 * OOB write in MDC2_Update() 5448 5449 An overflow can occur in MDC2_Update() either if called directly or 5450 through the EVP_DigestUpdate() function using MDC2. If an attacker 5451 is able to supply very large amounts of input data after a previous 5452 call to EVP_EncryptUpdate() with a partial block then a length check 5453 can overflow resulting in a heap corruption. 5454 5455 The amount of data needed is comparable to SIZE_MAX which is impractical 5456 on most platforms. 5457 5458 This issue was reported to OpenSSL by Shi Lei (Gear Team, Qihoo 360 Inc.) 5459 ([CVE-2016-6303]) 5460 5461 *Stephen Henson* 5462 5463 * Malformed SHA512 ticket DoS 5464 5465 If a server uses SHA512 for TLS session ticket HMAC it is vulnerable to a 5466 DoS attack where a malformed ticket will result in an OOB read which will 5467 ultimately crash. 5468 5469 The use of SHA512 in TLS session tickets is comparatively rare as it requires 5470 a custom server callback and ticket lookup mechanism. 5471 5472 This issue was reported to OpenSSL by Shi Lei (Gear Team, Qihoo 360 Inc.) 5473 ([CVE-2016-6302]) 5474 5475 *Stephen Henson* 5476 5477 * OOB write in BN_bn2dec() 5478 5479 The function BN_bn2dec() does not check the return value of BN_div_word(). 5480 This can cause an OOB write if an application uses this function with an 5481 overly large BIGNUM. This could be a problem if an overly large certificate 5482 or CRL is printed out from an untrusted source. TLS is not affected because 5483 record limits will reject an oversized certificate before it is parsed. 5484 5485 This issue was reported to OpenSSL by Shi Lei (Gear Team, Qihoo 360 Inc.) 5486 ([CVE-2016-2182]) 5487 5488 *Stephen Henson* 5489 5490 * OOB read in TS_OBJ_print_bio() 5491 5492 The function TS_OBJ_print_bio() misuses OBJ_obj2txt(): the return value is 5493 the total length the OID text representation would use and not the amount 5494 of data written. This will result in OOB reads when large OIDs are 5495 presented. 5496 5497 This issue was reported to OpenSSL by Shi Lei (Gear Team, Qihoo 360 Inc.) 5498 ([CVE-2016-2180]) 5499 5500 *Stephen Henson* 5501 5502 * Pointer arithmetic undefined behaviour 5503 5504 Avoid some undefined pointer arithmetic 5505 5506 A common idiom in the codebase is to check limits in the following manner: 5507 "p + len > limit" 5508 5509 Where "p" points to some malloc'd data of SIZE bytes and 5510 limit == p + SIZE 5511 5512 "len" here could be from some externally supplied data (e.g. from a TLS 5513 message). 5514 5515 The rules of C pointer arithmetic are such that "p + len" is only well 5516 defined where len <= SIZE. Therefore the above idiom is actually 5517 undefined behaviour. 5518 5519 For example this could cause problems if some malloc implementation 5520 provides an address for "p" such that "p + len" actually overflows for 5521 values of len that are too big and therefore p + len < limit. 5522 5523 This issue was reported to OpenSSL by Guido Vranken 5524 ([CVE-2016-2177]) 5525 5526 *Matt Caswell* 5527 5528 * Constant time flag not preserved in DSA signing 5529 5530 Operations in the DSA signing algorithm should run in constant time in 5531 order to avoid side channel attacks. A flaw in the OpenSSL DSA 5532 implementation means that a non-constant time codepath is followed for 5533 certain operations. This has been demonstrated through a cache-timing 5534 attack to be sufficient for an attacker to recover the private DSA key. 5535 5536 This issue was reported by César Pereida (Aalto University), Billy Brumley 5537 (Tampere University of Technology), and Yuval Yarom (The University of 5538 Adelaide and NICTA). 5539 ([CVE-2016-2178]) 5540 5541 *César Pereida* 5542 5543 * DTLS buffered message DoS 5544 5545 In a DTLS connection where handshake messages are delivered out-of-order 5546 those messages that OpenSSL is not yet ready to process will be buffered 5547 for later use. Under certain circumstances, a flaw in the logic means that 5548 those messages do not get removed from the buffer even though the handshake 5549 has been completed. An attacker could force up to approx. 15 messages to 5550 remain in the buffer when they are no longer required. These messages will 5551 be cleared when the DTLS connection is closed. The default maximum size for 5552 a message is 100k. Therefore the attacker could force an additional 1500k 5553 to be consumed per connection. By opening many simulataneous connections an 5554 attacker could cause a DoS attack through memory exhaustion. 5555 5556 This issue was reported to OpenSSL by Quan Luo. 5557 ([CVE-2016-2179]) 5558 5559 *Matt Caswell* 5560 5561 * DTLS replay protection DoS 5562 5563 A flaw in the DTLS replay attack protection mechanism means that records 5564 that arrive for future epochs update the replay protection "window" before 5565 the MAC for the record has been validated. This could be exploited by an 5566 attacker by sending a record for the next epoch (which does not have to 5567 decrypt or have a valid MAC), with a very large sequence number. This means 5568 that all subsequent legitimate packets are dropped causing a denial of 5569 service for a specific DTLS connection. 5570 5571 This issue was reported to OpenSSL by the OCAP audit team. 5572 ([CVE-2016-2181]) 5573 5574 *Matt Caswell* 5575 5576 * Certificate message OOB reads 5577 5578 In OpenSSL 1.0.2 and earlier some missing message length checks can result 5579 in OOB reads of up to 2 bytes beyond an allocated buffer. There is a 5580 theoretical DoS risk but this has not been observed in practice on common 5581 platforms. 5582 5583 The messages affected are client certificate, client certificate request 5584 and server certificate. As a result the attack can only be performed 5585 against a client or a server which enables client authentication. 5586 5587 This issue was reported to OpenSSL by Shi Lei (Gear Team, Qihoo 360 Inc.) 5588 ([CVE-2016-6306]) 5589 5590 *Stephen Henson* 5591 5592### Changes between 1.0.2g and 1.0.2h [3 May 2016] 5593 5594 * Prevent padding oracle in AES-NI CBC MAC check 5595 5596 A MITM attacker can use a padding oracle attack to decrypt traffic 5597 when the connection uses an AES CBC cipher and the server support 5598 AES-NI. 5599 5600 This issue was introduced as part of the fix for Lucky 13 padding 5601 attack ([CVE-2013-0169]). The padding check was rewritten to be in 5602 constant time by making sure that always the same bytes are read and 5603 compared against either the MAC or padding bytes. But it no longer 5604 checked that there was enough data to have both the MAC and padding 5605 bytes. 5606 5607 This issue was reported by Juraj Somorovsky using TLS-Attacker. 5608 5609 *Kurt Roeckx* 5610 5611 * Fix EVP_EncodeUpdate overflow 5612 5613 An overflow can occur in the EVP_EncodeUpdate() function which is used for 5614 Base64 encoding of binary data. If an attacker is able to supply very large 5615 amounts of input data then a length check can overflow resulting in a heap 5616 corruption. 5617 5618 Internally to OpenSSL the EVP_EncodeUpdate() function is primarily used by 5619 the `PEM_write_bio*` family of functions. These are mainly used within the 5620 OpenSSL command line applications, so any application which processes data 5621 from an untrusted source and outputs it as a PEM file should be considered 5622 vulnerable to this issue. User applications that call these APIs directly 5623 with large amounts of untrusted data may also be vulnerable. 5624 5625 This issue was reported by Guido Vranken. 5626 ([CVE-2016-2105]) 5627 5628 *Matt Caswell* 5629 5630 * Fix EVP_EncryptUpdate overflow 5631 5632 An overflow can occur in the EVP_EncryptUpdate() function. If an attacker 5633 is able to supply very large amounts of input data after a previous call to 5634 EVP_EncryptUpdate() with a partial block then a length check can overflow 5635 resulting in a heap corruption. Following an analysis of all OpenSSL 5636 internal usage of the EVP_EncryptUpdate() function all usage is one of two 5637 forms. The first form is where the EVP_EncryptUpdate() call is known to be 5638 the first called function after an EVP_EncryptInit(), and therefore that 5639 specific call must be safe. The second form is where the length passed to 5640 EVP_EncryptUpdate() can be seen from the code to be some small value and 5641 therefore there is no possibility of an overflow. Since all instances are 5642 one of these two forms, it is believed that there can be no overflows in 5643 internal code due to this problem. It should be noted that 5644 EVP_DecryptUpdate() can call EVP_EncryptUpdate() in certain code paths. 5645 Also EVP_CipherUpdate() is a synonym for EVP_EncryptUpdate(). All instances 5646 of these calls have also been analysed too and it is believed there are no 5647 instances in internal usage where an overflow could occur. 5648 5649 This issue was reported by Guido Vranken. 5650 ([CVE-2016-2106]) 5651 5652 *Matt Caswell* 5653 5654 * Prevent ASN.1 BIO excessive memory allocation 5655 5656 When ASN.1 data is read from a BIO using functions such as d2i_CMS_bio() 5657 a short invalid encoding can cause allocation of large amounts of memory 5658 potentially consuming excessive resources or exhausting memory. 5659 5660 Any application parsing untrusted data through d2i BIO functions is 5661 affected. The memory based functions such as d2i_X509() are *not* affected. 5662 Since the memory based functions are used by the TLS library, TLS 5663 applications are not affected. 5664 5665 This issue was reported by Brian Carpenter. 5666 ([CVE-2016-2109]) 5667 5668 *Stephen Henson* 5669 5670 * EBCDIC overread 5671 5672 ASN1 Strings that are over 1024 bytes can cause an overread in applications 5673 using the X509_NAME_oneline() function on EBCDIC systems. This could result 5674 in arbitrary stack data being returned in the buffer. 5675 5676 This issue was reported by Guido Vranken. 5677 ([CVE-2016-2176]) 5678 5679 *Matt Caswell* 5680 5681 * Modify behavior of ALPN to invoke callback after SNI/servername 5682 callback, such that updates to the SSL_CTX affect ALPN. 5683 5684 *Todd Short* 5685 5686 * Remove LOW from the DEFAULT cipher list. This removes singles DES from the 5687 default. 5688 5689 *Kurt Roeckx* 5690 5691 * Only remove the SSLv2 methods with the no-ssl2-method option. When the 5692 methods are enabled and ssl2 is disabled the methods return NULL. 5693 5694 *Kurt Roeckx* 5695 5696### Changes between 1.0.2f and 1.0.2g [1 Mar 2016] 5697 5698* Disable weak ciphers in SSLv3 and up in default builds of OpenSSL. 5699 Builds that are not configured with "enable-weak-ssl-ciphers" will not 5700 provide any "EXPORT" or "LOW" strength ciphers. 5701 5702 *Viktor Dukhovni* 5703 5704* Disable SSLv2 default build, default negotiation and weak ciphers. SSLv2 5705 is by default disabled at build-time. Builds that are not configured with 5706 "enable-ssl2" will not support SSLv2. Even if "enable-ssl2" is used, 5707 users who want to negotiate SSLv2 via the version-flexible SSLv23_method() 5708 will need to explicitly call either of: 5709 5710 SSL_CTX_clear_options(ctx, SSL_OP_NO_SSLv2); 5711 or 5712 SSL_clear_options(ssl, SSL_OP_NO_SSLv2); 5713 5714 as appropriate. Even if either of those is used, or the application 5715 explicitly uses the version-specific SSLv2_method() or its client and 5716 server variants, SSLv2 ciphers vulnerable to exhaustive search key 5717 recovery have been removed. Specifically, the SSLv2 40-bit EXPORT 5718 ciphers, and SSLv2 56-bit DES are no longer available. 5719 ([CVE-2016-0800]) 5720 5721 *Viktor Dukhovni* 5722 5723 * Fix a double-free in DSA code 5724 5725 A double free bug was discovered when OpenSSL parses malformed DSA private 5726 keys and could lead to a DoS attack or memory corruption for applications 5727 that receive DSA private keys from untrusted sources. This scenario is 5728 considered rare. 5729 5730 This issue was reported to OpenSSL by Adam Langley(Google/BoringSSL) using 5731 libFuzzer. 5732 ([CVE-2016-0705]) 5733 5734 *Stephen Henson* 5735 5736 * Disable SRP fake user seed to address a server memory leak. 5737 5738 Add a new method SRP_VBASE_get1_by_user that handles the seed properly. 5739 5740 SRP_VBASE_get_by_user had inconsistent memory management behaviour. 5741 In order to fix an unavoidable memory leak, SRP_VBASE_get_by_user 5742 was changed to ignore the "fake user" SRP seed, even if the seed 5743 is configured. 5744 5745 Users should use SRP_VBASE_get1_by_user instead. Note that in 5746 SRP_VBASE_get1_by_user, caller must free the returned value. Note 5747 also that even though configuring the SRP seed attempts to hide 5748 invalid usernames by continuing the handshake with fake 5749 credentials, this behaviour is not constant time and no strong 5750 guarantees are made that the handshake is indistinguishable from 5751 that of a valid user. 5752 ([CVE-2016-0798]) 5753 5754 *Emilia Käsper* 5755 5756 * Fix BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption 5757 5758 In the BN_hex2bn function the number of hex digits is calculated using an 5759 int value `i`. Later `bn_expand` is called with a value of `i * 4`. For 5760 large values of `i` this can result in `bn_expand` not allocating any 5761 memory because `i * 4` is negative. This can leave the internal BIGNUM data 5762 field as NULL leading to a subsequent NULL ptr deref. For very large values 5763 of `i`, the calculation `i * 4` could be a positive value smaller than `i`. 5764 In this case memory is allocated to the internal BIGNUM data field, but it 5765 is insufficiently sized leading to heap corruption. A similar issue exists 5766 in BN_dec2bn. This could have security consequences if BN_hex2bn/BN_dec2bn 5767 is ever called by user applications with very large untrusted hex/dec data. 5768 This is anticipated to be a rare occurrence. 5769 5770 All OpenSSL internal usage of these functions use data that is not expected 5771 to be untrusted, e.g. config file data or application command line 5772 arguments. If user developed applications generate config file data based 5773 on untrusted data then it is possible that this could also lead to security 5774 consequences. This is also anticipated to be rare. 5775 5776 This issue was reported to OpenSSL by Guido Vranken. 5777 ([CVE-2016-0797]) 5778 5779 *Matt Caswell* 5780 5781 * Fix memory issues in `BIO_*printf` functions 5782 5783 The internal `fmtstr` function used in processing a "%s" format string in 5784 the `BIO_*printf` functions could overflow while calculating the length of a 5785 string and cause an OOB read when printing very long strings. 5786 5787 Additionally the internal `doapr_outch` function can attempt to write to an 5788 OOB memory location (at an offset from the NULL pointer) in the event of a 5789 memory allocation failure. In 1.0.2 and below this could be caused where 5790 the size of a buffer to be allocated is greater than INT_MAX. E.g. this 5791 could be in processing a very long "%s" format string. Memory leaks can 5792 also occur. 5793 5794 The first issue may mask the second issue dependent on compiler behaviour. 5795 These problems could enable attacks where large amounts of untrusted data 5796 is passed to the `BIO_*printf` functions. If applications use these functions 5797 in this way then they could be vulnerable. OpenSSL itself uses these 5798 functions when printing out human-readable dumps of ASN.1 data. Therefore 5799 applications that print this data could be vulnerable if the data is from 5800 untrusted sources. OpenSSL command line applications could also be 5801 vulnerable where they print out ASN.1 data, or if untrusted data is passed 5802 as command line arguments. 5803 5804 Libssl is not considered directly vulnerable. Additionally certificates etc 5805 received via remote connections via libssl are also unlikely to be able to 5806 trigger these issues because of message size limits enforced within libssl. 5807 5808 This issue was reported to OpenSSL Guido Vranken. 5809 ([CVE-2016-0799]) 5810 5811 *Matt Caswell* 5812 5813 * Side channel attack on modular exponentiation 5814 5815 A side-channel attack was found which makes use of cache-bank conflicts on 5816 the Intel Sandy-Bridge microarchitecture which could lead to the recovery 5817 of RSA keys. The ability to exploit this issue is limited as it relies on 5818 an attacker who has control of code in a thread running on the same 5819 hyper-threaded core as the victim thread which is performing decryptions. 5820 5821 This issue was reported to OpenSSL by Yuval Yarom, The University of 5822 Adelaide and NICTA, Daniel Genkin, Technion and Tel Aviv University, and 5823 Nadia Heninger, University of Pennsylvania with more information at 5824 <http://cachebleed.info>. 5825 ([CVE-2016-0702]) 5826 5827 *Andy Polyakov* 5828 5829 * Change the `req` command to generate a 2048-bit RSA/DSA key by default, 5830 if no keysize is specified with default_bits. This fixes an 5831 omission in an earlier change that changed all RSA/DSA key generation 5832 commands to use 2048 bits by default. 5833 5834 *Emilia Käsper* 5835 5836### Changes between 1.0.2e and 1.0.2f [28 Jan 2016] 5837 5838 * DH small subgroups 5839 5840 Historically OpenSSL only ever generated DH parameters based on "safe" 5841 primes. More recently (in version 1.0.2) support was provided for 5842 generating X9.42 style parameter files such as those required for RFC 5114 5843 support. The primes used in such files may not be "safe". Where an 5844 application is using DH configured with parameters based on primes that are 5845 not "safe" then an attacker could use this fact to find a peer's private 5846 DH exponent. This attack requires that the attacker complete multiple 5847 handshakes in which the peer uses the same private DH exponent. For example 5848 this could be used to discover a TLS server's private DH exponent if it's 5849 reusing the private DH exponent or it's using a static DH ciphersuite. 5850 5851 OpenSSL provides the option SSL_OP_SINGLE_DH_USE for ephemeral DH (DHE) in 5852 TLS. It is not on by default. If the option is not set then the server 5853 reuses the same private DH exponent for the life of the server process and 5854 would be vulnerable to this attack. It is believed that many popular 5855 applications do set this option and would therefore not be at risk. 5856 5857 The fix for this issue adds an additional check where a "q" parameter is 5858 available (as is the case in X9.42 based parameters). This detects the 5859 only known attack, and is the only possible defense for static DH 5860 ciphersuites. This could have some performance impact. 5861 5862 Additionally the SSL_OP_SINGLE_DH_USE option has been switched on by 5863 default and cannot be disabled. This could have some performance impact. 5864 5865 This issue was reported to OpenSSL by Antonio Sanso (Adobe). 5866 ([CVE-2016-0701]) 5867 5868 *Matt Caswell* 5869 5870 * SSLv2 doesn't block disabled ciphers 5871 5872 A malicious client can negotiate SSLv2 ciphers that have been disabled on 5873 the server and complete SSLv2 handshakes even if all SSLv2 ciphers have 5874 been disabled, provided that the SSLv2 protocol was not also disabled via 5875 SSL_OP_NO_SSLv2. 5876 5877 This issue was reported to OpenSSL on 26th December 2015 by Nimrod Aviram 5878 and Sebastian Schinzel. 5879 ([CVE-2015-3197]) 5880 5881 *Viktor Dukhovni* 5882 5883### Changes between 1.0.2d and 1.0.2e [3 Dec 2015] 5884 5885 * BN_mod_exp may produce incorrect results on x86_64 5886 5887 There is a carry propagating bug in the x86_64 Montgomery squaring 5888 procedure. No EC algorithms are affected. Analysis suggests that attacks 5889 against RSA and DSA as a result of this defect would be very difficult to 5890 perform and are not believed likely. Attacks against DH are considered just 5891 feasible (although very difficult) because most of the work necessary to 5892 deduce information about a private key may be performed offline. The amount 5893 of resources required for such an attack would be very significant and 5894 likely only accessible to a limited number of attackers. An attacker would 5895 additionally need online access to an unpatched system using the target 5896 private key in a scenario with persistent DH parameters and a private 5897 key that is shared between multiple clients. For example this can occur by 5898 default in OpenSSL DHE based SSL/TLS ciphersuites. 5899 5900 This issue was reported to OpenSSL by Hanno Böck. 5901 ([CVE-2015-3193]) 5902 5903 *Andy Polyakov* 5904 5905 * Certificate verify crash with missing PSS parameter 5906 5907 The signature verification routines will crash with a NULL pointer 5908 dereference if presented with an ASN.1 signature using the RSA PSS 5909 algorithm and absent mask generation function parameter. Since these 5910 routines are used to verify certificate signature algorithms this can be 5911 used to crash any certificate verification operation and exploited in a 5912 DoS attack. Any application which performs certificate verification is 5913 vulnerable including OpenSSL clients and servers which enable client 5914 authentication. 5915 5916 This issue was reported to OpenSSL by Loïc Jonas Etienne (Qnective AG). 5917 ([CVE-2015-3194]) 5918 5919 *Stephen Henson* 5920 5921 * X509_ATTRIBUTE memory leak 5922 5923 When presented with a malformed X509_ATTRIBUTE structure OpenSSL will leak 5924 memory. This structure is used by the PKCS#7 and CMS routines so any 5925 application which reads PKCS#7 or CMS data from untrusted sources is 5926 affected. SSL/TLS is not affected. 5927 5928 This issue was reported to OpenSSL by Adam Langley (Google/BoringSSL) using 5929 libFuzzer. 5930 ([CVE-2015-3195]) 5931 5932 *Stephen Henson* 5933 5934 * Rewrite EVP_DecodeUpdate (base64 decoding) to fix several bugs. 5935 This changes the decoding behaviour for some invalid messages, 5936 though the change is mostly in the more lenient direction, and 5937 legacy behaviour is preserved as much as possible. 5938 5939 *Emilia Käsper* 5940 5941 * In DSA_generate_parameters_ex, if the provided seed is too short, 5942 return an error 5943 5944 *Rich Salz and Ismo Puustinen <ismo.puustinen@intel.com>* 5945 5946### Changes between 1.0.2c and 1.0.2d [9 Jul 2015] 5947 5948 * Alternate chains certificate forgery 5949 5950 During certificate verification, OpenSSL will attempt to find an 5951 alternative certificate chain if the first attempt to build such a chain 5952 fails. An error in the implementation of this logic can mean that an 5953 attacker could cause certain checks on untrusted certificates to be 5954 bypassed, such as the CA flag, enabling them to use a valid leaf 5955 certificate to act as a CA and "issue" an invalid certificate. 5956 5957 This issue was reported to OpenSSL by Adam Langley/David Benjamin 5958 (Google/BoringSSL). 5959 5960 *Matt Caswell* 5961 5962### Changes between 1.0.2b and 1.0.2c [12 Jun 2015] 5963 5964 * Fix HMAC ABI incompatibility. The previous version introduced an ABI 5965 incompatibility in the handling of HMAC. The previous ABI has now been 5966 restored. 5967 5968 *Matt Caswell* 5969 5970### Changes between 1.0.2a and 1.0.2b [11 Jun 2015] 5971 5972 * Malformed ECParameters causes infinite loop 5973 5974 When processing an ECParameters structure OpenSSL enters an infinite loop 5975 if the curve specified is over a specially malformed binary polynomial 5976 field. 5977 5978 This can be used to perform denial of service against any 5979 system which processes public keys, certificate requests or 5980 certificates. This includes TLS clients and TLS servers with 5981 client authentication enabled. 5982 5983 This issue was reported to OpenSSL by Joseph Barr-Pixton. 5984 ([CVE-2015-1788]) 5985 5986 *Andy Polyakov* 5987 5988 * Exploitable out-of-bounds read in X509_cmp_time 5989 5990 X509_cmp_time does not properly check the length of the ASN1_TIME 5991 string and can read a few bytes out of bounds. In addition, 5992 X509_cmp_time accepts an arbitrary number of fractional seconds in the 5993 time string. 5994 5995 An attacker can use this to craft malformed certificates and CRLs of 5996 various sizes and potentially cause a segmentation fault, resulting in 5997 a DoS on applications that verify certificates or CRLs. TLS clients 5998 that verify CRLs are affected. TLS clients and servers with client 5999 authentication enabled may be affected if they use custom verification 6000 callbacks. 6001 6002 This issue was reported to OpenSSL by Robert Swiecki (Google), and 6003 independently by Hanno Böck. 6004 ([CVE-2015-1789]) 6005 6006 *Emilia Käsper* 6007 6008 * PKCS7 crash with missing EnvelopedContent 6009 6010 The PKCS#7 parsing code does not handle missing inner EncryptedContent 6011 correctly. An attacker can craft malformed ASN.1-encoded PKCS#7 blobs 6012 with missing content and trigger a NULL pointer dereference on parsing. 6013 6014 Applications that decrypt PKCS#7 data or otherwise parse PKCS#7 6015 structures from untrusted sources are affected. OpenSSL clients and 6016 servers are not affected. 6017 6018 This issue was reported to OpenSSL by Michal Zalewski (Google). 6019 ([CVE-2015-1790]) 6020 6021 *Emilia Käsper* 6022 6023 * CMS verify infinite loop with unknown hash function 6024 6025 When verifying a signedData message the CMS code can enter an infinite loop 6026 if presented with an unknown hash function OID. This can be used to perform 6027 denial of service against any system which verifies signedData messages using 6028 the CMS code. 6029 This issue was reported to OpenSSL by Johannes Bauer. 6030 ([CVE-2015-1792]) 6031 6032 *Stephen Henson* 6033 6034 * Race condition handling NewSessionTicket 6035 6036 If a NewSessionTicket is received by a multi-threaded client when attempting to 6037 reuse a previous ticket then a race condition can occur potentially leading to 6038 a double free of the ticket data. 6039 ([CVE-2015-1791]) 6040 6041 *Matt Caswell* 6042 6043 * Only support 256-bit or stronger elliptic curves with the 6044 'ecdh_auto' setting (server) or by default (client). Of supported 6045 curves, prefer P-256 (both). 6046 6047 *Emilia Kasper* 6048 6049### Changes between 1.0.2 and 1.0.2a [19 Mar 2015] 6050 6051 * ClientHello sigalgs DoS fix 6052 6053 If a client connects to an OpenSSL 1.0.2 server and renegotiates with an 6054 invalid signature algorithms extension a NULL pointer dereference will 6055 occur. This can be exploited in a DoS attack against the server. 6056 6057 This issue was was reported to OpenSSL by David Ramos of Stanford 6058 University. 6059 ([CVE-2015-0291]) 6060 6061 *Stephen Henson and Matt Caswell* 6062 6063 * Multiblock corrupted pointer fix 6064 6065 OpenSSL 1.0.2 introduced the "multiblock" performance improvement. This 6066 feature only applies on 64 bit x86 architecture platforms that support AES 6067 NI instructions. A defect in the implementation of "multiblock" can cause 6068 OpenSSL's internal write buffer to become incorrectly set to NULL when 6069 using non-blocking IO. Typically, when the user application is using a 6070 socket BIO for writing, this will only result in a failed connection. 6071 However if some other BIO is used then it is likely that a segmentation 6072 fault will be triggered, thus enabling a potential DoS attack. 6073 6074 This issue was reported to OpenSSL by Daniel Danner and Rainer Mueller. 6075 ([CVE-2015-0290]) 6076 6077 *Matt Caswell* 6078 6079 * Segmentation fault in DTLSv1_listen fix 6080 6081 The DTLSv1_listen function is intended to be stateless and processes the 6082 initial ClientHello from many peers. It is common for user code to loop 6083 over the call to DTLSv1_listen until a valid ClientHello is received with 6084 an associated cookie. A defect in the implementation of DTLSv1_listen means 6085 that state is preserved in the SSL object from one invocation to the next 6086 that can lead to a segmentation fault. Errors processing the initial 6087 ClientHello can trigger this scenario. An example of such an error could be 6088 that a DTLS1.0 only client is attempting to connect to a DTLS1.2 only 6089 server. 6090 6091 This issue was reported to OpenSSL by Per Allansson. 6092 ([CVE-2015-0207]) 6093 6094 *Matt Caswell* 6095 6096 * Segmentation fault in ASN1_TYPE_cmp fix 6097 6098 The function ASN1_TYPE_cmp will crash with an invalid read if an attempt is 6099 made to compare ASN.1 boolean types. Since ASN1_TYPE_cmp is used to check 6100 certificate signature algorithm consistency this can be used to crash any 6101 certificate verification operation and exploited in a DoS attack. Any 6102 application which performs certificate verification is vulnerable including 6103 OpenSSL clients and servers which enable client authentication. 6104 ([CVE-2015-0286]) 6105 6106 *Stephen Henson* 6107 6108 * Segmentation fault for invalid PSS parameters fix 6109 6110 The signature verification routines will crash with a NULL pointer 6111 dereference if presented with an ASN.1 signature using the RSA PSS 6112 algorithm and invalid parameters. Since these routines are used to verify 6113 certificate signature algorithms this can be used to crash any 6114 certificate verification operation and exploited in a DoS attack. Any 6115 application which performs certificate verification is vulnerable including 6116 OpenSSL clients and servers which enable client authentication. 6117 6118 This issue was was reported to OpenSSL by Brian Carpenter. 6119 ([CVE-2015-0208]) 6120 6121 *Stephen Henson* 6122 6123 * ASN.1 structure reuse memory corruption fix 6124 6125 Reusing a structure in ASN.1 parsing may allow an attacker to cause 6126 memory corruption via an invalid write. Such reuse is and has been 6127 strongly discouraged and is believed to be rare. 6128 6129 Applications that parse structures containing CHOICE or ANY DEFINED BY 6130 components may be affected. Certificate parsing (d2i_X509 and related 6131 functions) are however not affected. OpenSSL clients and servers are 6132 not affected. 6133 ([CVE-2015-0287]) 6134 6135 *Stephen Henson* 6136 6137 * PKCS7 NULL pointer dereferences fix 6138 6139 The PKCS#7 parsing code does not handle missing outer ContentInfo 6140 correctly. An attacker can craft malformed ASN.1-encoded PKCS#7 blobs with 6141 missing content and trigger a NULL pointer dereference on parsing. 6142 6143 Applications that verify PKCS#7 signatures, decrypt PKCS#7 data or 6144 otherwise parse PKCS#7 structures from untrusted sources are 6145 affected. OpenSSL clients and servers are not affected. 6146 6147 This issue was reported to OpenSSL by Michal Zalewski (Google). 6148 ([CVE-2015-0289]) 6149 6150 *Emilia Käsper* 6151 6152 * DoS via reachable assert in SSLv2 servers fix 6153 6154 A malicious client can trigger an OPENSSL_assert (i.e., an abort) in 6155 servers that both support SSLv2 and enable export cipher suites by sending 6156 a specially crafted SSLv2 CLIENT-MASTER-KEY message. 6157 6158 This issue was discovered by Sean Burford (Google) and Emilia Käsper 6159 (OpenSSL development team). 6160 ([CVE-2015-0293]) 6161 6162 *Emilia Käsper* 6163 6164 * Empty CKE with client auth and DHE fix 6165 6166 If client auth is used then a server can seg fault in the event of a DHE 6167 ciphersuite being selected and a zero length ClientKeyExchange message 6168 being sent by the client. This could be exploited in a DoS attack. 6169 ([CVE-2015-1787]) 6170 6171 *Matt Caswell* 6172 6173 * Handshake with unseeded PRNG fix 6174 6175 Under certain conditions an OpenSSL 1.0.2 client can complete a handshake 6176 with an unseeded PRNG. The conditions are: 6177 - The client is on a platform where the PRNG has not been seeded 6178 automatically, and the user has not seeded manually 6179 - A protocol specific client method version has been used (i.e. not 6180 SSL_client_methodv23) 6181 - A ciphersuite is used that does not require additional random data from 6182 the PRNG beyond the initial ClientHello client random (e.g. PSK-RC4-SHA). 6183 6184 If the handshake succeeds then the client random that has been used will 6185 have been generated from a PRNG with insufficient entropy and therefore the 6186 output may be predictable. 6187 6188 For example using the following command with an unseeded openssl will 6189 succeed on an unpatched platform: 6190 6191 openssl s_client -psk 1a2b3c4d -tls1_2 -cipher PSK-RC4-SHA 6192 ([CVE-2015-0285]) 6193 6194 *Matt Caswell* 6195 6196 * Use After Free following d2i_ECPrivatekey error fix 6197 6198 A malformed EC private key file consumed via the d2i_ECPrivateKey function 6199 could cause a use after free condition. This, in turn, could cause a double 6200 free in several private key parsing functions (such as d2i_PrivateKey 6201 or EVP_PKCS82PKEY) and could lead to a DoS attack or memory corruption 6202 for applications that receive EC private keys from untrusted 6203 sources. This scenario is considered rare. 6204 6205 This issue was discovered by the BoringSSL project and fixed in their 6206 commit 517073cd4b. 6207 ([CVE-2015-0209]) 6208 6209 *Matt Caswell* 6210 6211 * X509_to_X509_REQ NULL pointer deref fix 6212 6213 The function X509_to_X509_REQ will crash with a NULL pointer dereference if 6214 the certificate key is invalid. This function is rarely used in practice. 6215 6216 This issue was discovered by Brian Carpenter. 6217 ([CVE-2015-0288]) 6218 6219 *Stephen Henson* 6220 6221 * Removed the export ciphers from the DEFAULT ciphers 6222 6223 *Kurt Roeckx* 6224 6225### Changes between 1.0.1l and 1.0.2 [22 Jan 2015] 6226 6227 * Facilitate "universal" ARM builds targeting range of ARM ISAs, e.g. 6228 ARMv5 through ARMv8, as opposite to "locking" it to single one. 6229 So far those who have to target multiple platforms would compromise 6230 and argue that binary targeting say ARMv5 would still execute on 6231 ARMv8. "Universal" build resolves this compromise by providing 6232 near-optimal performance even on newer platforms. 6233 6234 *Andy Polyakov* 6235 6236 * Accelerated NIST P-256 elliptic curve implementation for x86_64 6237 (other platforms pending). 6238 6239 *Shay Gueron & Vlad Krasnov (Intel Corp), Andy Polyakov* 6240 6241 * Add support for the SignedCertificateTimestampList certificate and 6242 OCSP response extensions from RFC6962. 6243 6244 *Rob Stradling* 6245 6246 * Fix ec_GFp_simple_points_make_affine (thus, EC_POINTs_mul etc.) 6247 for corner cases. (Certain input points at infinity could lead to 6248 bogus results, with non-infinity inputs mapped to infinity too.) 6249 6250 *Bodo Moeller* 6251 6252 * Initial support for PowerISA 2.0.7, first implemented in POWER8. 6253 This covers AES, SHA256/512 and GHASH. "Initial" means that most 6254 common cases are optimized and there still is room for further 6255 improvements. Vector Permutation AES for Altivec is also added. 6256 6257 *Andy Polyakov* 6258 6259 * Add support for little-endian ppc64 Linux target. 6260 6261 *Marcelo Cerri (IBM)* 6262 6263 * Initial support for AMRv8 ISA crypto extensions. This covers AES, 6264 SHA1, SHA256 and GHASH. "Initial" means that most common cases 6265 are optimized and there still is room for further improvements. 6266 Both 32- and 64-bit modes are supported. 6267 6268 *Andy Polyakov, Ard Biesheuvel (Linaro)* 6269 6270 * Improved ARMv7 NEON support. 6271 6272 *Andy Polyakov* 6273 6274 * Support for SPARC Architecture 2011 crypto extensions, first 6275 implemented in SPARC T4. This covers AES, DES, Camellia, SHA1, 6276 SHA256/512, MD5, GHASH and modular exponentiation. 6277 6278 *Andy Polyakov, David Miller* 6279 6280 * Accelerated modular exponentiation for Intel processors, a.k.a. 6281 RSAZ. 6282 6283 *Shay Gueron & Vlad Krasnov (Intel Corp)* 6284 6285 * Support for new and upcoming Intel processors, including AVX2, 6286 BMI and SHA ISA extensions. This includes additional "stitched" 6287 implementations, AESNI-SHA256 and GCM, and multi-buffer support 6288 for TLS encrypt. 6289 6290 This work was sponsored by Intel Corp. 6291 6292 *Andy Polyakov* 6293 6294 * Support for DTLS 1.2. This adds two sets of DTLS methods: DTLS_*_method() 6295 supports both DTLS 1.2 and 1.0 and should use whatever version the peer 6296 supports and DTLSv1_2_*_method() which supports DTLS 1.2 only. 6297 6298 *Steve Henson* 6299 6300 * Use algorithm specific chains in SSL_CTX_use_certificate_chain_file(): 6301 this fixes a limitation in previous versions of OpenSSL. 6302 6303 *Steve Henson* 6304 6305 * Extended RSA OAEP support via EVP_PKEY API. Options to specify digest, 6306 MGF1 digest and OAEP label. 6307 6308 *Steve Henson* 6309 6310 * Add EVP support for key wrapping algorithms, to avoid problems with 6311 existing code the flag EVP_CIPHER_CTX_WRAP_ALLOW has to be set in 6312 the EVP_CIPHER_CTX or an error is returned. Add AES and DES3 wrap 6313 algorithms and include tests cases. 6314 6315 *Steve Henson* 6316 6317 * Add functions to allocate and set the fields of an ECDSA_METHOD 6318 structure. 6319 6320 *Douglas E. Engert, Steve Henson* 6321 6322 * New functions OPENSSL_gmtime_diff and ASN1_TIME_diff to find the 6323 difference in days and seconds between two tm or ASN1_TIME structures. 6324 6325 *Steve Henson* 6326 6327 * Add -rev test option to s_server to just reverse order of characters 6328 received by client and send back to server. Also prints an abbreviated 6329 summary of the connection parameters. 6330 6331 *Steve Henson* 6332 6333 * New option -brief for s_client and s_server to print out a brief summary 6334 of connection parameters. 6335 6336 *Steve Henson* 6337 6338 * Add callbacks for arbitrary TLS extensions. 6339 6340 *Trevor Perrin <trevp@trevp.net> and Ben Laurie* 6341 6342 * New option -crl_download in several openssl utilities to download CRLs 6343 from CRLDP extension in certificates. 6344 6345 *Steve Henson* 6346 6347 * New options -CRL and -CRLform for s_client and s_server for CRLs. 6348 6349 *Steve Henson* 6350 6351 * New function X509_CRL_diff to generate a delta CRL from the difference 6352 of two full CRLs. Add support to "crl" utility. 6353 6354 *Steve Henson* 6355 6356 * New functions to set lookup_crls function and to retrieve 6357 X509_STORE from X509_STORE_CTX. 6358 6359 *Steve Henson* 6360 6361 * Print out deprecated issuer and subject unique ID fields in 6362 certificates. 6363 6364 *Steve Henson* 6365 6366 * Extend OCSP I/O functions so they can be used for simple general purpose 6367 HTTP as well as OCSP. New wrapper function which can be used to download 6368 CRLs using the OCSP API. 6369 6370 *Steve Henson* 6371 6372 * Delegate command line handling in s_client/s_server to SSL_CONF APIs. 6373 6374 *Steve Henson* 6375 6376 * `SSL_CONF*` functions. These provide a common framework for application 6377 configuration using configuration files or command lines. 6378 6379 *Steve Henson* 6380 6381 * SSL/TLS tracing code. This parses out SSL/TLS records using the 6382 message callback and prints the results. Needs compile time option 6383 "enable-ssl-trace". New options to s_client and s_server to enable 6384 tracing. 6385 6386 *Steve Henson* 6387 6388 * New ctrl and macro to retrieve supported points extensions. 6389 Print out extension in s_server and s_client. 6390 6391 *Steve Henson* 6392 6393 * New functions to retrieve certificate signature and signature 6394 OID NID. 6395 6396 *Steve Henson* 6397 6398 * Add functions to retrieve and manipulate the raw cipherlist sent by a 6399 client to OpenSSL. 6400 6401 *Steve Henson* 6402 6403 * New Suite B modes for TLS code. These use and enforce the requirements 6404 of RFC6460: restrict ciphersuites, only permit Suite B algorithms and 6405 only use Suite B curves. The Suite B modes can be set by using the 6406 strings "SUITEB128", "SUITEB192" or "SUITEB128ONLY" for the cipherstring. 6407 6408 *Steve Henson* 6409 6410 * New chain verification flags for Suite B levels of security. Check 6411 algorithms are acceptable when flags are set in X509_verify_cert. 6412 6413 *Steve Henson* 6414 6415 * Make tls1_check_chain return a set of flags indicating checks passed 6416 by a certificate chain. Add additional tests to handle client 6417 certificates: checks for matching certificate type and issuer name 6418 comparison. 6419 6420 *Steve Henson* 6421 6422 * If an attempt is made to use a signature algorithm not in the peer 6423 preference list abort the handshake. If client has no suitable 6424 signature algorithms in response to a certificate request do not 6425 use the certificate. 6426 6427 *Steve Henson* 6428 6429 * If server EC tmp key is not in client preference list abort handshake. 6430 6431 *Steve Henson* 6432 6433 * Add support for certificate stores in CERT structure. This makes it 6434 possible to have different stores per SSL structure or one store in 6435 the parent SSL_CTX. Include distinct stores for certificate chain 6436 verification and chain building. New ctrl SSL_CTRL_BUILD_CERT_CHAIN 6437 to build and store a certificate chain in CERT structure: returning 6438 an error if the chain cannot be built: this will allow applications 6439 to test if a chain is correctly configured. 6440 6441 Note: if the CERT based stores are not set then the parent SSL_CTX 6442 store is used to retain compatibility with existing behaviour. 6443 6444 *Steve Henson* 6445 6446 * New function ssl_set_client_disabled to set a ciphersuite disabled 6447 mask based on the current session, check mask when sending client 6448 hello and checking the requested ciphersuite. 6449 6450 *Steve Henson* 6451 6452 * New ctrls to retrieve and set certificate types in a certificate 6453 request message. Print out received values in s_client. If certificate 6454 types is not set with custom values set sensible values based on 6455 supported signature algorithms. 6456 6457 *Steve Henson* 6458 6459 * Support for distinct client and server supported signature algorithms. 6460 6461 *Steve Henson* 6462 6463 * Add certificate callback. If set this is called whenever a certificate 6464 is required by client or server. An application can decide which 6465 certificate chain to present based on arbitrary criteria: for example 6466 supported signature algorithms. Add very simple example to s_server. 6467 This fixes many of the problems and restrictions of the existing client 6468 certificate callback: for example you can now clear an existing 6469 certificate and specify the whole chain. 6470 6471 *Steve Henson* 6472 6473 * Add new "valid_flags" field to CERT_PKEY structure which determines what 6474 the certificate can be used for (if anything). Set valid_flags field 6475 in new tls1_check_chain function. Simplify ssl_set_cert_masks which used 6476 to have similar checks in it. 6477 6478 Add new "cert_flags" field to CERT structure and include a "strict mode". 6479 This enforces some TLS certificate requirements (such as only permitting 6480 certificate signature algorithms contained in the supported algorithms 6481 extension) which some implementations ignore: this option should be used 6482 with caution as it could cause interoperability issues. 6483 6484 *Steve Henson* 6485 6486 * Update and tidy signature algorithm extension processing. Work out 6487 shared signature algorithms based on preferences and peer algorithms 6488 and print them out in s_client and s_server. Abort handshake if no 6489 shared signature algorithms. 6490 6491 *Steve Henson* 6492 6493 * Add new functions to allow customised supported signature algorithms 6494 for SSL and SSL_CTX structures. Add options to s_client and s_server 6495 to support them. 6496 6497 *Steve Henson* 6498 6499 * New function SSL_certs_clear() to delete all references to certificates 6500 from an SSL structure. Before this once a certificate had been added 6501 it couldn't be removed. 6502 6503 *Steve Henson* 6504 6505 * Integrate hostname, email address and IP address checking with certificate 6506 verification. New verify options supporting checking in openssl utility. 6507 6508 *Steve Henson* 6509 6510 * Fixes and wildcard matching support to hostname and email checking 6511 functions. Add manual page. 6512 6513 *Florian Weimer (Red Hat Product Security Team)* 6514 6515 * New functions to check a hostname email or IP address against a 6516 certificate. Add options x509 utility to print results of checks against 6517 a certificate. 6518 6519 *Steve Henson* 6520 6521 * Fix OCSP checking. 6522 6523 *Rob Stradling <rob.stradling@comodo.com> and Ben Laurie* 6524 6525 * Initial experimental support for explicitly trusted non-root CAs. 6526 OpenSSL still tries to build a complete chain to a root but if an 6527 intermediate CA has a trust setting included that is used. The first 6528 setting is used: whether to trust (e.g., -addtrust option to the x509 6529 utility) or reject. 6530 6531 *Steve Henson* 6532 6533 * Add -trusted_first option which attempts to find certificates in the 6534 trusted store even if an untrusted chain is also supplied. 6535 6536 *Steve Henson* 6537 6538 * MIPS assembly pack updates: support for MIPS32r2 and SmartMIPS ASE, 6539 platform support for Linux and Android. 6540 6541 *Andy Polyakov* 6542 6543 * Support for linux-x32, ILP32 environment in x86_64 framework. 6544 6545 *Andy Polyakov* 6546 6547 * Experimental multi-implementation support for FIPS capable OpenSSL. 6548 When in FIPS mode the approved implementations are used as normal, 6549 when not in FIPS mode the internal unapproved versions are used instead. 6550 This means that the FIPS capable OpenSSL isn't forced to use the 6551 (often lower performance) FIPS implementations outside FIPS mode. 6552 6553 *Steve Henson* 6554 6555 * Transparently support X9.42 DH parameters when calling 6556 PEM_read_bio_DHparameters. This means existing applications can handle 6557 the new parameter format automatically. 6558 6559 *Steve Henson* 6560 6561 * Initial experimental support for X9.42 DH parameter format: mainly 6562 to support use of 'q' parameter for RFC5114 parameters. 6563 6564 *Steve Henson* 6565 6566 * Add DH parameters from RFC5114 including test data to dhtest. 6567 6568 *Steve Henson* 6569 6570 * Support for automatic EC temporary key parameter selection. If enabled 6571 the most preferred EC parameters are automatically used instead of 6572 hardcoded fixed parameters. Now a server just has to call: 6573 SSL_CTX_set_ecdh_auto(ctx, 1) and the server will automatically 6574 support ECDH and use the most appropriate parameters. 6575 6576 *Steve Henson* 6577 6578 * Enhance and tidy EC curve and point format TLS extension code. Use 6579 static structures instead of allocation if default values are used. 6580 New ctrls to set curves we wish to support and to retrieve shared curves. 6581 Print out shared curves in s_server. New options to s_server and s_client 6582 to set list of supported curves. 6583 6584 *Steve Henson* 6585 6586 * New ctrls to retrieve supported signature algorithms and 6587 supported curve values as an array of NIDs. Extend openssl utility 6588 to print out received values. 6589 6590 *Steve Henson* 6591 6592 * Add new APIs EC_curve_nist2nid and EC_curve_nid2nist which convert 6593 between NIDs and the more common NIST names such as "P-256". Enhance 6594 ecparam utility and ECC method to recognise the NIST names for curves. 6595 6596 *Steve Henson* 6597 6598 * Enhance SSL/TLS certificate chain handling to support different 6599 chains for each certificate instead of one chain in the parent SSL_CTX. 6600 6601 *Steve Henson* 6602 6603 * Support for fixed DH ciphersuite client authentication: where both 6604 server and client use DH certificates with common parameters. 6605 6606 *Steve Henson* 6607 6608 * Support for fixed DH ciphersuites: those requiring DH server 6609 certificates. 6610 6611 *Steve Henson* 6612 6613 * New function i2d_re_X509_tbs for re-encoding the TBS portion of 6614 the certificate. 6615 Note: Related 1.0.2-beta specific macros X509_get_cert_info, 6616 X509_CINF_set_modified, X509_CINF_get_issuer, X509_CINF_get_extensions and 6617 X509_CINF_get_signature were reverted post internal team review. 6618 6619OpenSSL 1.0.1 6620------------- 6621 6622### Changes between 1.0.1t and 1.0.1u [22 Sep 2016] 6623 6624 * OCSP Status Request extension unbounded memory growth 6625 6626 A malicious client can send an excessively large OCSP Status Request 6627 extension. If that client continually requests renegotiation, sending a 6628 large OCSP Status Request extension each time, then there will be unbounded 6629 memory growth on the server. This will eventually lead to a Denial Of 6630 Service attack through memory exhaustion. Servers with a default 6631 configuration are vulnerable even if they do not support OCSP. Builds using 6632 the "no-ocsp" build time option are not affected. 6633 6634 This issue was reported to OpenSSL by Shi Lei (Gear Team, Qihoo 360 Inc.) 6635 ([CVE-2016-6304]) 6636 6637 *Matt Caswell* 6638 6639 * In order to mitigate the SWEET32 attack, the DES ciphers were moved from 6640 HIGH to MEDIUM. 6641 6642 This issue was reported to OpenSSL Karthikeyan Bhargavan and Gaetan 6643 Leurent (INRIA) 6644 ([CVE-2016-2183]) 6645 6646 *Rich Salz* 6647 6648 * OOB write in MDC2_Update() 6649 6650 An overflow can occur in MDC2_Update() either if called directly or 6651 through the EVP_DigestUpdate() function using MDC2. If an attacker 6652 is able to supply very large amounts of input data after a previous 6653 call to EVP_EncryptUpdate() with a partial block then a length check 6654 can overflow resulting in a heap corruption. 6655 6656 The amount of data needed is comparable to SIZE_MAX which is impractical 6657 on most platforms. 6658 6659 This issue was reported to OpenSSL by Shi Lei (Gear Team, Qihoo 360 Inc.) 6660 ([CVE-2016-6303]) 6661 6662 *Stephen Henson* 6663 6664 * Malformed SHA512 ticket DoS 6665 6666 If a server uses SHA512 for TLS session ticket HMAC it is vulnerable to a 6667 DoS attack where a malformed ticket will result in an OOB read which will 6668 ultimately crash. 6669 6670 The use of SHA512 in TLS session tickets is comparatively rare as it requires 6671 a custom server callback and ticket lookup mechanism. 6672 6673 This issue was reported to OpenSSL by Shi Lei (Gear Team, Qihoo 360 Inc.) 6674 ([CVE-2016-6302]) 6675 6676 *Stephen Henson* 6677 6678 * OOB write in BN_bn2dec() 6679 6680 The function BN_bn2dec() does not check the return value of BN_div_word(). 6681 This can cause an OOB write if an application uses this function with an 6682 overly large BIGNUM. This could be a problem if an overly large certificate 6683 or CRL is printed out from an untrusted source. TLS is not affected because 6684 record limits will reject an oversized certificate before it is parsed. 6685 6686 This issue was reported to OpenSSL by Shi Lei (Gear Team, Qihoo 360 Inc.) 6687 ([CVE-2016-2182]) 6688 6689 *Stephen Henson* 6690 6691 * OOB read in TS_OBJ_print_bio() 6692 6693 The function TS_OBJ_print_bio() misuses OBJ_obj2txt(): the return value is 6694 the total length the OID text representation would use and not the amount 6695 of data written. This will result in OOB reads when large OIDs are 6696 presented. 6697 6698 This issue was reported to OpenSSL by Shi Lei (Gear Team, Qihoo 360 Inc.) 6699 ([CVE-2016-2180]) 6700 6701 *Stephen Henson* 6702 6703 * Pointer arithmetic undefined behaviour 6704 6705 Avoid some undefined pointer arithmetic 6706 6707 A common idiom in the codebase is to check limits in the following manner: 6708 "p + len > limit" 6709 6710 Where "p" points to some malloc'd data of SIZE bytes and 6711 limit == p + SIZE 6712 6713 "len" here could be from some externally supplied data (e.g. from a TLS 6714 message). 6715 6716 The rules of C pointer arithmetic are such that "p + len" is only well 6717 defined where len <= SIZE. Therefore the above idiom is actually 6718 undefined behaviour. 6719 6720 For example this could cause problems if some malloc implementation 6721 provides an address for "p" such that "p + len" actually overflows for 6722 values of len that are too big and therefore p + len < limit. 6723 6724 This issue was reported to OpenSSL by Guido Vranken 6725 ([CVE-2016-2177]) 6726 6727 *Matt Caswell* 6728 6729 * Constant time flag not preserved in DSA signing 6730 6731 Operations in the DSA signing algorithm should run in constant time in 6732 order to avoid side channel attacks. A flaw in the OpenSSL DSA 6733 implementation means that a non-constant time codepath is followed for 6734 certain operations. This has been demonstrated through a cache-timing 6735 attack to be sufficient for an attacker to recover the private DSA key. 6736 6737 This issue was reported by César Pereida (Aalto University), Billy Brumley 6738 (Tampere University of Technology), and Yuval Yarom (The University of 6739 Adelaide and NICTA). 6740 ([CVE-2016-2178]) 6741 6742 *César Pereida* 6743 6744 * DTLS buffered message DoS 6745 6746 In a DTLS connection where handshake messages are delivered out-of-order 6747 those messages that OpenSSL is not yet ready to process will be buffered 6748 for later use. Under certain circumstances, a flaw in the logic means that 6749 those messages do not get removed from the buffer even though the handshake 6750 has been completed. An attacker could force up to approx. 15 messages to 6751 remain in the buffer when they are no longer required. These messages will 6752 be cleared when the DTLS connection is closed. The default maximum size for 6753 a message is 100k. Therefore the attacker could force an additional 1500k 6754 to be consumed per connection. By opening many simulataneous connections an 6755 attacker could cause a DoS attack through memory exhaustion. 6756 6757 This issue was reported to OpenSSL by Quan Luo. 6758 ([CVE-2016-2179]) 6759 6760 *Matt Caswell* 6761 6762 * DTLS replay protection DoS 6763 6764 A flaw in the DTLS replay attack protection mechanism means that records 6765 that arrive for future epochs update the replay protection "window" before 6766 the MAC for the record has been validated. This could be exploited by an 6767 attacker by sending a record for the next epoch (which does not have to 6768 decrypt or have a valid MAC), with a very large sequence number. This means 6769 that all subsequent legitimate packets are dropped causing a denial of 6770 service for a specific DTLS connection. 6771 6772 This issue was reported to OpenSSL by the OCAP audit team. 6773 ([CVE-2016-2181]) 6774 6775 *Matt Caswell* 6776 6777 * Certificate message OOB reads 6778 6779 In OpenSSL 1.0.2 and earlier some missing message length checks can result 6780 in OOB reads of up to 2 bytes beyond an allocated buffer. There is a 6781 theoretical DoS risk but this has not been observed in practice on common 6782 platforms. 6783 6784 The messages affected are client certificate, client certificate request 6785 and server certificate. As a result the attack can only be performed 6786 against a client or a server which enables client authentication. 6787 6788 This issue was reported to OpenSSL by Shi Lei (Gear Team, Qihoo 360 Inc.) 6789 ([CVE-2016-6306]) 6790 6791 *Stephen Henson* 6792 6793### Changes between 1.0.1s and 1.0.1t [3 May 2016] 6794 6795 * Prevent padding oracle in AES-NI CBC MAC check 6796 6797 A MITM attacker can use a padding oracle attack to decrypt traffic 6798 when the connection uses an AES CBC cipher and the server support 6799 AES-NI. 6800 6801 This issue was introduced as part of the fix for Lucky 13 padding 6802 attack ([CVE-2013-0169]). The padding check was rewritten to be in 6803 constant time by making sure that always the same bytes are read and 6804 compared against either the MAC or padding bytes. But it no longer 6805 checked that there was enough data to have both the MAC and padding 6806 bytes. 6807 6808 This issue was reported by Juraj Somorovsky using TLS-Attacker. 6809 ([CVE-2016-2107]) 6810 6811 *Kurt Roeckx* 6812 6813 * Fix EVP_EncodeUpdate overflow 6814 6815 An overflow can occur in the EVP_EncodeUpdate() function which is used for 6816 Base64 encoding of binary data. If an attacker is able to supply very large 6817 amounts of input data then a length check can overflow resulting in a heap 6818 corruption. 6819 6820 Internally to OpenSSL the EVP_EncodeUpdate() function is primarly used by 6821 the `PEM_write_bio*` family of functions. These are mainly used within the 6822 OpenSSL command line applications, so any application which processes data 6823 from an untrusted source and outputs it as a PEM file should be considered 6824 vulnerable to this issue. User applications that call these APIs directly 6825 with large amounts of untrusted data may also be vulnerable. 6826 6827 This issue was reported by Guido Vranken. 6828 ([CVE-2016-2105]) 6829 6830 *Matt Caswell* 6831 6832 * Fix EVP_EncryptUpdate overflow 6833 6834 An overflow can occur in the EVP_EncryptUpdate() function. If an attacker 6835 is able to supply very large amounts of input data after a previous call to 6836 EVP_EncryptUpdate() with a partial block then a length check can overflow 6837 resulting in a heap corruption. Following an analysis of all OpenSSL 6838 internal usage of the EVP_EncryptUpdate() function all usage is one of two 6839 forms. The first form is where the EVP_EncryptUpdate() call is known to be 6840 the first called function after an EVP_EncryptInit(), and therefore that 6841 specific call must be safe. The second form is where the length passed to 6842 EVP_EncryptUpdate() can be seen from the code to be some small value and 6843 therefore there is no possibility of an overflow. Since all instances are 6844 one of these two forms, it is believed that there can be no overflows in 6845 internal code due to this problem. It should be noted that 6846 EVP_DecryptUpdate() can call EVP_EncryptUpdate() in certain code paths. 6847 Also EVP_CipherUpdate() is a synonym for EVP_EncryptUpdate(). All instances 6848 of these calls have also been analysed too and it is believed there are no 6849 instances in internal usage where an overflow could occur. 6850 6851 This issue was reported by Guido Vranken. 6852 ([CVE-2016-2106]) 6853 6854 *Matt Caswell* 6855 6856 * Prevent ASN.1 BIO excessive memory allocation 6857 6858 When ASN.1 data is read from a BIO using functions such as d2i_CMS_bio() 6859 a short invalid encoding can casuse allocation of large amounts of memory 6860 potentially consuming excessive resources or exhausting memory. 6861 6862 Any application parsing untrusted data through d2i BIO functions is 6863 affected. The memory based functions such as d2i_X509() are *not* affected. 6864 Since the memory based functions are used by the TLS library, TLS 6865 applications are not affected. 6866 6867 This issue was reported by Brian Carpenter. 6868 ([CVE-2016-2109]) 6869 6870 *Stephen Henson* 6871 6872 * EBCDIC overread 6873 6874 ASN1 Strings that are over 1024 bytes can cause an overread in applications 6875 using the X509_NAME_oneline() function on EBCDIC systems. This could result 6876 in arbitrary stack data being returned in the buffer. 6877 6878 This issue was reported by Guido Vranken. 6879 ([CVE-2016-2176]) 6880 6881 *Matt Caswell* 6882 6883 * Modify behavior of ALPN to invoke callback after SNI/servername 6884 callback, such that updates to the SSL_CTX affect ALPN. 6885 6886 *Todd Short* 6887 6888 * Remove LOW from the DEFAULT cipher list. This removes singles DES from the 6889 default. 6890 6891 *Kurt Roeckx* 6892 6893 * Only remove the SSLv2 methods with the no-ssl2-method option. When the 6894 methods are enabled and ssl2 is disabled the methods return NULL. 6895 6896 *Kurt Roeckx* 6897 6898### Changes between 1.0.1r and 1.0.1s [1 Mar 2016] 6899 6900* Disable weak ciphers in SSLv3 and up in default builds of OpenSSL. 6901 Builds that are not configured with "enable-weak-ssl-ciphers" will not 6902 provide any "EXPORT" or "LOW" strength ciphers. 6903 6904 *Viktor Dukhovni* 6905 6906* Disable SSLv2 default build, default negotiation and weak ciphers. SSLv2 6907 is by default disabled at build-time. Builds that are not configured with 6908 "enable-ssl2" will not support SSLv2. Even if "enable-ssl2" is used, 6909 users who want to negotiate SSLv2 via the version-flexible SSLv23_method() 6910 will need to explicitly call either of: 6911 6912 SSL_CTX_clear_options(ctx, SSL_OP_NO_SSLv2); 6913 or 6914 SSL_clear_options(ssl, SSL_OP_NO_SSLv2); 6915 6916 as appropriate. Even if either of those is used, or the application 6917 explicitly uses the version-specific SSLv2_method() or its client and 6918 server variants, SSLv2 ciphers vulnerable to exhaustive search key 6919 recovery have been removed. Specifically, the SSLv2 40-bit EXPORT 6920 ciphers, and SSLv2 56-bit DES are no longer available. 6921 ([CVE-2016-0800]) 6922 6923 *Viktor Dukhovni* 6924 6925 * Fix a double-free in DSA code 6926 6927 A double free bug was discovered when OpenSSL parses malformed DSA private 6928 keys and could lead to a DoS attack or memory corruption for applications 6929 that receive DSA private keys from untrusted sources. This scenario is 6930 considered rare. 6931 6932 This issue was reported to OpenSSL by Adam Langley(Google/BoringSSL) using 6933 libFuzzer. 6934 ([CVE-2016-0705]) 6935 6936 *Stephen Henson* 6937 6938 * Disable SRP fake user seed to address a server memory leak. 6939 6940 Add a new method SRP_VBASE_get1_by_user that handles the seed properly. 6941 6942 SRP_VBASE_get_by_user had inconsistent memory management behaviour. 6943 In order to fix an unavoidable memory leak, SRP_VBASE_get_by_user 6944 was changed to ignore the "fake user" SRP seed, even if the seed 6945 is configured. 6946 6947 Users should use SRP_VBASE_get1_by_user instead. Note that in 6948 SRP_VBASE_get1_by_user, caller must free the returned value. Note 6949 also that even though configuring the SRP seed attempts to hide 6950 invalid usernames by continuing the handshake with fake 6951 credentials, this behaviour is not constant time and no strong 6952 guarantees are made that the handshake is indistinguishable from 6953 that of a valid user. 6954 ([CVE-2016-0798]) 6955 6956 *Emilia Käsper* 6957 6958 * Fix BN_hex2bn/BN_dec2bn NULL pointer deref/heap corruption 6959 6960 In the BN_hex2bn function the number of hex digits is calculated using an 6961 int value `i`. Later `bn_expand` is called with a value of `i * 4`. For 6962 large values of `i` this can result in `bn_expand` not allocating any 6963 memory because `i * 4` is negative. This can leave the internal BIGNUM data 6964 field as NULL leading to a subsequent NULL ptr deref. For very large values 6965 of `i`, the calculation `i * 4` could be a positive value smaller than `i`. 6966 In this case memory is allocated to the internal BIGNUM data field, but it 6967 is insufficiently sized leading to heap corruption. A similar issue exists 6968 in BN_dec2bn. This could have security consequences if BN_hex2bn/BN_dec2bn 6969 is ever called by user applications with very large untrusted hex/dec data. 6970 This is anticipated to be a rare occurrence. 6971 6972 All OpenSSL internal usage of these functions use data that is not expected 6973 to be untrusted, e.g. config file data or application command line 6974 arguments. If user developed applications generate config file data based 6975 on untrusted data then it is possible that this could also lead to security 6976 consequences. This is also anticipated to be rare. 6977 6978 This issue was reported to OpenSSL by Guido Vranken. 6979 ([CVE-2016-0797]) 6980 6981 *Matt Caswell* 6982 6983 * Fix memory issues in `BIO_*printf` functions 6984 6985 The internal `fmtstr` function used in processing a "%s" format string in 6986 the `BIO_*printf` functions could overflow while calculating the length of a 6987 string and cause an OOB read when printing very long strings. 6988 6989 Additionally the internal `doapr_outch` function can attempt to write to an 6990 OOB memory location (at an offset from the NULL pointer) in the event of a 6991 memory allocation failure. In 1.0.2 and below this could be caused where 6992 the size of a buffer to be allocated is greater than INT_MAX. E.g. this 6993 could be in processing a very long "%s" format string. Memory leaks can 6994 also occur. 6995 6996 The first issue may mask the second issue dependent on compiler behaviour. 6997 These problems could enable attacks where large amounts of untrusted data 6998 is passed to the `BIO_*printf` functions. If applications use these functions 6999 in this way then they could be vulnerable. OpenSSL itself uses these 7000 functions when printing out human-readable dumps of ASN.1 data. Therefore 7001 applications that print this data could be vulnerable if the data is from 7002 untrusted sources. OpenSSL command line applications could also be 7003 vulnerable where they print out ASN.1 data, or if untrusted data is passed 7004 as command line arguments. 7005 7006 Libssl is not considered directly vulnerable. Additionally certificates etc 7007 received via remote connections via libssl are also unlikely to be able to 7008 trigger these issues because of message size limits enforced within libssl. 7009 7010 This issue was reported to OpenSSL Guido Vranken. 7011 ([CVE-2016-0799]) 7012 7013 *Matt Caswell* 7014 7015 * Side channel attack on modular exponentiation 7016 7017 A side-channel attack was found which makes use of cache-bank conflicts on 7018 the Intel Sandy-Bridge microarchitecture which could lead to the recovery 7019 of RSA keys. The ability to exploit this issue is limited as it relies on 7020 an attacker who has control of code in a thread running on the same 7021 hyper-threaded core as the victim thread which is performing decryptions. 7022 7023 This issue was reported to OpenSSL by Yuval Yarom, The University of 7024 Adelaide and NICTA, Daniel Genkin, Technion and Tel Aviv University, and 7025 Nadia Heninger, University of Pennsylvania with more information at 7026 <http://cachebleed.info>. 7027 ([CVE-2016-0702]) 7028 7029 *Andy Polyakov* 7030 7031 * Change the req command to generate a 2048-bit RSA/DSA key by default, 7032 if no keysize is specified with default_bits. This fixes an 7033 omission in an earlier change that changed all RSA/DSA key generation 7034 commands to use 2048 bits by default. 7035 7036 *Emilia Käsper* 7037 7038### Changes between 1.0.1q and 1.0.1r [28 Jan 2016] 7039 7040 * Protection for DH small subgroup attacks 7041 7042 As a precautionary measure the SSL_OP_SINGLE_DH_USE option has been 7043 switched on by default and cannot be disabled. This could have some 7044 performance impact. 7045 7046 *Matt Caswell* 7047 7048 * SSLv2 doesn't block disabled ciphers 7049 7050 A malicious client can negotiate SSLv2 ciphers that have been disabled on 7051 the server and complete SSLv2 handshakes even if all SSLv2 ciphers have 7052 been disabled, provided that the SSLv2 protocol was not also disabled via 7053 SSL_OP_NO_SSLv2. 7054 7055 This issue was reported to OpenSSL on 26th December 2015 by Nimrod Aviram 7056 and Sebastian Schinzel. 7057 ([CVE-2015-3197]) 7058 7059 *Viktor Dukhovni* 7060 7061 * Reject DH handshakes with parameters shorter than 1024 bits. 7062 7063 *Kurt Roeckx* 7064 7065### Changes between 1.0.1p and 1.0.1q [3 Dec 2015] 7066 7067 * Certificate verify crash with missing PSS parameter 7068 7069 The signature verification routines will crash with a NULL pointer 7070 dereference if presented with an ASN.1 signature using the RSA PSS 7071 algorithm and absent mask generation function parameter. Since these 7072 routines are used to verify certificate signature algorithms this can be 7073 used to crash any certificate verification operation and exploited in a 7074 DoS attack. Any application which performs certificate verification is 7075 vulnerable including OpenSSL clients and servers which enable client 7076 authentication. 7077 7078 This issue was reported to OpenSSL by Loïc Jonas Etienne (Qnective AG). 7079 ([CVE-2015-3194]) 7080 7081 *Stephen Henson* 7082 7083 * X509_ATTRIBUTE memory leak 7084 7085 When presented with a malformed X509_ATTRIBUTE structure OpenSSL will leak 7086 memory. This structure is used by the PKCS#7 and CMS routines so any 7087 application which reads PKCS#7 or CMS data from untrusted sources is 7088 affected. SSL/TLS is not affected. 7089 7090 This issue was reported to OpenSSL by Adam Langley (Google/BoringSSL) using 7091 libFuzzer. 7092 ([CVE-2015-3195]) 7093 7094 *Stephen Henson* 7095 7096 * Rewrite EVP_DecodeUpdate (base64 decoding) to fix several bugs. 7097 This changes the decoding behaviour for some invalid messages, 7098 though the change is mostly in the more lenient direction, and 7099 legacy behaviour is preserved as much as possible. 7100 7101 *Emilia Käsper* 7102 7103 * In DSA_generate_parameters_ex, if the provided seed is too short, 7104 use a random seed, as already documented. 7105 7106 *Rich Salz and Ismo Puustinen <ismo.puustinen@intel.com>* 7107 7108### Changes between 1.0.1o and 1.0.1p [9 Jul 2015] 7109 7110 * Alternate chains certificate forgery 7111 7112 During certificate verfification, OpenSSL will attempt to find an 7113 alternative certificate chain if the first attempt to build such a chain 7114 fails. An error in the implementation of this logic can mean that an 7115 attacker could cause certain checks on untrusted certificates to be 7116 bypassed, such as the CA flag, enabling them to use a valid leaf 7117 certificate to act as a CA and "issue" an invalid certificate. 7118 7119 This issue was reported to OpenSSL by Adam Langley/David Benjamin 7120 (Google/BoringSSL). 7121 ([CVE-2015-1793]) 7122 7123 *Matt Caswell* 7124 7125 * Race condition handling PSK identify hint 7126 7127 If PSK identity hints are received by a multi-threaded client then 7128 the values are wrongly updated in the parent SSL_CTX structure. This can 7129 result in a race condition potentially leading to a double free of the 7130 identify hint data. 7131 ([CVE-2015-3196]) 7132 7133 *Stephen Henson* 7134 7135### Changes between 1.0.1n and 1.0.1o [12 Jun 2015] 7136 7137 * Fix HMAC ABI incompatibility. The previous version introduced an ABI 7138 incompatibility in the handling of HMAC. The previous ABI has now been 7139 restored. 7140 7141### Changes between 1.0.1m and 1.0.1n [11 Jun 2015] 7142 7143 * Malformed ECParameters causes infinite loop 7144 7145 When processing an ECParameters structure OpenSSL enters an infinite loop 7146 if the curve specified is over a specially malformed binary polynomial 7147 field. 7148 7149 This can be used to perform denial of service against any 7150 system which processes public keys, certificate requests or 7151 certificates. This includes TLS clients and TLS servers with 7152 client authentication enabled. 7153 7154 This issue was reported to OpenSSL by Joseph Barr-Pixton. 7155 ([CVE-2015-1788]) 7156 7157 *Andy Polyakov* 7158 7159 * Exploitable out-of-bounds read in X509_cmp_time 7160 7161 X509_cmp_time does not properly check the length of the ASN1_TIME 7162 string and can read a few bytes out of bounds. In addition, 7163 X509_cmp_time accepts an arbitrary number of fractional seconds in the 7164 time string. 7165 7166 An attacker can use this to craft malformed certificates and CRLs of 7167 various sizes and potentially cause a segmentation fault, resulting in 7168 a DoS on applications that verify certificates or CRLs. TLS clients 7169 that verify CRLs are affected. TLS clients and servers with client 7170 authentication enabled may be affected if they use custom verification 7171 callbacks. 7172 7173 This issue was reported to OpenSSL by Robert Swiecki (Google), and 7174 independently by Hanno Böck. 7175 ([CVE-2015-1789]) 7176 7177 *Emilia Käsper* 7178 7179 * PKCS7 crash with missing EnvelopedContent 7180 7181 The PKCS#7 parsing code does not handle missing inner EncryptedContent 7182 correctly. An attacker can craft malformed ASN.1-encoded PKCS#7 blobs 7183 with missing content and trigger a NULL pointer dereference on parsing. 7184 7185 Applications that decrypt PKCS#7 data or otherwise parse PKCS#7 7186 structures from untrusted sources are affected. OpenSSL clients and 7187 servers are not affected. 7188 7189 This issue was reported to OpenSSL by Michal Zalewski (Google). 7190 ([CVE-2015-1790]) 7191 7192 *Emilia Käsper* 7193 7194 * CMS verify infinite loop with unknown hash function 7195 7196 When verifying a signedData message the CMS code can enter an infinite loop 7197 if presented with an unknown hash function OID. This can be used to perform 7198 denial of service against any system which verifies signedData messages using 7199 the CMS code. 7200 This issue was reported to OpenSSL by Johannes Bauer. 7201 ([CVE-2015-1792]) 7202 7203 *Stephen Henson* 7204 7205 * Race condition handling NewSessionTicket 7206 7207 If a NewSessionTicket is received by a multi-threaded client when attempting to 7208 reuse a previous ticket then a race condition can occur potentially leading to 7209 a double free of the ticket data. 7210 ([CVE-2015-1791]) 7211 7212 *Matt Caswell* 7213 7214 * Reject DH handshakes with parameters shorter than 768 bits. 7215 7216 *Kurt Roeckx and Emilia Kasper* 7217 7218 * dhparam: generate 2048-bit parameters by default. 7219 7220 *Kurt Roeckx and Emilia Kasper* 7221 7222### Changes between 1.0.1l and 1.0.1m [19 Mar 2015] 7223 7224 * Segmentation fault in ASN1_TYPE_cmp fix 7225 7226 The function ASN1_TYPE_cmp will crash with an invalid read if an attempt is 7227 made to compare ASN.1 boolean types. Since ASN1_TYPE_cmp is used to check 7228 certificate signature algorithm consistency this can be used to crash any 7229 certificate verification operation and exploited in a DoS attack. Any 7230 application which performs certificate verification is vulnerable including 7231 OpenSSL clients and servers which enable client authentication. 7232 ([CVE-2015-0286]) 7233 7234 *Stephen Henson* 7235 7236 * ASN.1 structure reuse memory corruption fix 7237 7238 Reusing a structure in ASN.1 parsing may allow an attacker to cause 7239 memory corruption via an invalid write. Such reuse is and has been 7240 strongly discouraged and is believed to be rare. 7241 7242 Applications that parse structures containing CHOICE or ANY DEFINED BY 7243 components may be affected. Certificate parsing (d2i_X509 and related 7244 functions) are however not affected. OpenSSL clients and servers are 7245 not affected. 7246 ([CVE-2015-0287]) 7247 7248 *Stephen Henson* 7249 7250 * PKCS7 NULL pointer dereferences fix 7251 7252 The PKCS#7 parsing code does not handle missing outer ContentInfo 7253 correctly. An attacker can craft malformed ASN.1-encoded PKCS#7 blobs with 7254 missing content and trigger a NULL pointer dereference on parsing. 7255 7256 Applications that verify PKCS#7 signatures, decrypt PKCS#7 data or 7257 otherwise parse PKCS#7 structures from untrusted sources are 7258 affected. OpenSSL clients and servers are not affected. 7259 7260 This issue was reported to OpenSSL by Michal Zalewski (Google). 7261 ([CVE-2015-0289]) 7262 7263 *Emilia Käsper* 7264 7265 * DoS via reachable assert in SSLv2 servers fix 7266 7267 A malicious client can trigger an OPENSSL_assert (i.e., an abort) in 7268 servers that both support SSLv2 and enable export cipher suites by sending 7269 a specially crafted SSLv2 CLIENT-MASTER-KEY message. 7270 7271 This issue was discovered by Sean Burford (Google) and Emilia Käsper 7272 (OpenSSL development team). 7273 ([CVE-2015-0293]) 7274 7275 *Emilia Käsper* 7276 7277 * Use After Free following d2i_ECPrivatekey error fix 7278 7279 A malformed EC private key file consumed via the d2i_ECPrivateKey function 7280 could cause a use after free condition. This, in turn, could cause a double 7281 free in several private key parsing functions (such as d2i_PrivateKey 7282 or EVP_PKCS82PKEY) and could lead to a DoS attack or memory corruption 7283 for applications that receive EC private keys from untrusted 7284 sources. This scenario is considered rare. 7285 7286 This issue was discovered by the BoringSSL project and fixed in their 7287 commit 517073cd4b. 7288 ([CVE-2015-0209]) 7289 7290 *Matt Caswell* 7291 7292 * X509_to_X509_REQ NULL pointer deref fix 7293 7294 The function X509_to_X509_REQ will crash with a NULL pointer dereference if 7295 the certificate key is invalid. This function is rarely used in practice. 7296 7297 This issue was discovered by Brian Carpenter. 7298 ([CVE-2015-0288]) 7299 7300 *Stephen Henson* 7301 7302 * Removed the export ciphers from the DEFAULT ciphers 7303 7304 *Kurt Roeckx* 7305 7306### Changes between 1.0.1k and 1.0.1l [15 Jan 2015] 7307 7308 * Build fixes for the Windows and OpenVMS platforms 7309 7310 *Matt Caswell and Richard Levitte* 7311 7312### Changes between 1.0.1j and 1.0.1k [8 Jan 2015] 7313 7314 * Fix DTLS segmentation fault in dtls1_get_record. A carefully crafted DTLS 7315 message can cause a segmentation fault in OpenSSL due to a NULL pointer 7316 dereference. This could lead to a Denial Of Service attack. Thanks to 7317 Markus Stenberg of Cisco Systems, Inc. for reporting this issue. 7318 ([CVE-2014-3571]) 7319 7320 *Steve Henson* 7321 7322 * Fix DTLS memory leak in dtls1_buffer_record. A memory leak can occur in the 7323 dtls1_buffer_record function under certain conditions. In particular this 7324 could occur if an attacker sent repeated DTLS records with the same 7325 sequence number but for the next epoch. The memory leak could be exploited 7326 by an attacker in a Denial of Service attack through memory exhaustion. 7327 Thanks to Chris Mueller for reporting this issue. 7328 ([CVE-2015-0206]) 7329 7330 *Matt Caswell* 7331 7332 * Fix issue where no-ssl3 configuration sets method to NULL. When openssl is 7333 built with the no-ssl3 option and a SSL v3 ClientHello is received the ssl 7334 method would be set to NULL which could later result in a NULL pointer 7335 dereference. Thanks to Frank Schmirler for reporting this issue. 7336 ([CVE-2014-3569]) 7337 7338 *Kurt Roeckx* 7339 7340 * Abort handshake if server key exchange message is omitted for ephemeral 7341 ECDH ciphersuites. 7342 7343 Thanks to Karthikeyan Bhargavan of the PROSECCO team at INRIA for 7344 reporting this issue. 7345 ([CVE-2014-3572]) 7346 7347 *Steve Henson* 7348 7349 * Remove non-export ephemeral RSA code on client and server. This code 7350 violated the TLS standard by allowing the use of temporary RSA keys in 7351 non-export ciphersuites and could be used by a server to effectively 7352 downgrade the RSA key length used to a value smaller than the server 7353 certificate. Thanks for Karthikeyan Bhargavan of the PROSECCO team at 7354 INRIA or reporting this issue. 7355 ([CVE-2015-0204]) 7356 7357 *Steve Henson* 7358 7359 * Fixed issue where DH client certificates are accepted without verification. 7360 An OpenSSL server will accept a DH certificate for client authentication 7361 without the certificate verify message. This effectively allows a client to 7362 authenticate without the use of a private key. This only affects servers 7363 which trust a client certificate authority which issues certificates 7364 containing DH keys: these are extremely rare and hardly ever encountered. 7365 Thanks for Karthikeyan Bhargavan of the PROSECCO team at INRIA or reporting 7366 this issue. 7367 ([CVE-2015-0205]) 7368 7369 *Steve Henson* 7370 7371 * Ensure that the session ID context of an SSL is updated when its 7372 SSL_CTX is updated via SSL_set_SSL_CTX. 7373 7374 The session ID context is typically set from the parent SSL_CTX, 7375 and can vary with the CTX. 7376 7377 *Adam Langley* 7378 7379 * Fix various certificate fingerprint issues. 7380 7381 By using non-DER or invalid encodings outside the signed portion of a 7382 certificate the fingerprint can be changed without breaking the signature. 7383 Although no details of the signed portion of the certificate can be changed 7384 this can cause problems with some applications: e.g. those using the 7385 certificate fingerprint for blacklists. 7386 7387 1. Reject signatures with non zero unused bits. 7388 7389 If the BIT STRING containing the signature has non zero unused bits reject 7390 the signature. All current signature algorithms require zero unused bits. 7391 7392 2. Check certificate algorithm consistency. 7393 7394 Check the AlgorithmIdentifier inside TBS matches the one in the 7395 certificate signature. NB: this will result in signature failure 7396 errors for some broken certificates. 7397 7398 Thanks to Konrad Kraszewski from Google for reporting this issue. 7399 7400 3. Check DSA/ECDSA signatures use DER. 7401 7402 Re-encode DSA/ECDSA signatures and compare with the original received 7403 signature. Return an error if there is a mismatch. 7404 7405 This will reject various cases including garbage after signature 7406 (thanks to Antti Karjalainen and Tuomo Untinen from the Codenomicon CROSS 7407 program for discovering this case) and use of BER or invalid ASN.1 INTEGERs 7408 (negative or with leading zeroes). 7409 7410 Further analysis was conducted and fixes were developed by Stephen Henson 7411 of the OpenSSL core team. 7412 7413 ([CVE-2014-8275]) 7414 7415 *Steve Henson* 7416 7417 * Correct Bignum squaring. Bignum squaring (BN_sqr) may produce incorrect 7418 results on some platforms, including x86_64. This bug occurs at random 7419 with a very low probability, and is not known to be exploitable in any 7420 way, though its exact impact is difficult to determine. Thanks to Pieter 7421 Wuille (Blockstream) who reported this issue and also suggested an initial 7422 fix. Further analysis was conducted by the OpenSSL development team and 7423 Adam Langley of Google. The final fix was developed by Andy Polyakov of 7424 the OpenSSL core team. 7425 ([CVE-2014-3570]) 7426 7427 *Andy Polyakov* 7428 7429 * Do not resume sessions on the server if the negotiated protocol 7430 version does not match the session's version. Resuming with a different 7431 version, while not strictly forbidden by the RFC, is of questionable 7432 sanity and breaks all known clients. 7433 7434 *David Benjamin, Emilia Käsper* 7435 7436 * Tighten handling of the ChangeCipherSpec (CCS) message: reject 7437 early CCS messages during renegotiation. (Note that because 7438 renegotiation is encrypted, this early CCS was not exploitable.) 7439 7440 *Emilia Käsper* 7441 7442 * Tighten client-side session ticket handling during renegotiation: 7443 ensure that the client only accepts a session ticket if the server sends 7444 the extension anew in the ServerHello. Previously, a TLS client would 7445 reuse the old extension state and thus accept a session ticket if one was 7446 announced in the initial ServerHello. 7447 7448 Similarly, ensure that the client requires a session ticket if one 7449 was advertised in the ServerHello. Previously, a TLS client would 7450 ignore a missing NewSessionTicket message. 7451 7452 *Emilia Käsper* 7453 7454### Changes between 1.0.1i and 1.0.1j [15 Oct 2014] 7455 7456 * SRTP Memory Leak. 7457 7458 A flaw in the DTLS SRTP extension parsing code allows an attacker, who 7459 sends a carefully crafted handshake message, to cause OpenSSL to fail 7460 to free up to 64k of memory causing a memory leak. This could be 7461 exploited in a Denial Of Service attack. This issue affects OpenSSL 7462 1.0.1 server implementations for both SSL/TLS and DTLS regardless of 7463 whether SRTP is used or configured. Implementations of OpenSSL that 7464 have been compiled with OPENSSL_NO_SRTP defined are not affected. 7465 7466 The fix was developed by the OpenSSL team. 7467 ([CVE-2014-3513]) 7468 7469 *OpenSSL team* 7470 7471 * Session Ticket Memory Leak. 7472 7473 When an OpenSSL SSL/TLS/DTLS server receives a session ticket the 7474 integrity of that ticket is first verified. In the event of a session 7475 ticket integrity check failing, OpenSSL will fail to free memory 7476 causing a memory leak. By sending a large number of invalid session 7477 tickets an attacker could exploit this issue in a Denial Of Service 7478 attack. 7479 ([CVE-2014-3567]) 7480 7481 *Steve Henson* 7482 7483 * Build option no-ssl3 is incomplete. 7484 7485 When OpenSSL is configured with "no-ssl3" as a build option, servers 7486 could accept and complete a SSL 3.0 handshake, and clients could be 7487 configured to send them. 7488 ([CVE-2014-3568]) 7489 7490 *Akamai and the OpenSSL team* 7491 7492 * Add support for TLS_FALLBACK_SCSV. 7493 Client applications doing fallback retries should call 7494 SSL_set_mode(s, SSL_MODE_SEND_FALLBACK_SCSV). 7495 ([CVE-2014-3566]) 7496 7497 *Adam Langley, Bodo Moeller* 7498 7499 * Add additional DigestInfo checks. 7500 7501 Re-encode DigestInto in DER and check against the original when 7502 verifying RSA signature: this will reject any improperly encoded 7503 DigestInfo structures. 7504 7505 Note: this is a precautionary measure and no attacks are currently known. 7506 7507 *Steve Henson* 7508 7509### Changes between 1.0.1h and 1.0.1i [6 Aug 2014] 7510 7511 * Fix SRP buffer overrun vulnerability. Invalid parameters passed to the 7512 SRP code can be overrun an internal buffer. Add sanity check that 7513 g, A, B < N to SRP code. 7514 7515 Thanks to Sean Devlin and Watson Ladd of Cryptography Services, NCC 7516 Group for discovering this issue. 7517 ([CVE-2014-3512]) 7518 7519 *Steve Henson* 7520 7521 * A flaw in the OpenSSL SSL/TLS server code causes the server to negotiate 7522 TLS 1.0 instead of higher protocol versions when the ClientHello message 7523 is badly fragmented. This allows a man-in-the-middle attacker to force a 7524 downgrade to TLS 1.0 even if both the server and the client support a 7525 higher protocol version, by modifying the client's TLS records. 7526 7527 Thanks to David Benjamin and Adam Langley (Google) for discovering and 7528 researching this issue. 7529 ([CVE-2014-3511]) 7530 7531 *David Benjamin* 7532 7533 * OpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are subject 7534 to a denial of service attack. A malicious server can crash the client 7535 with a null pointer dereference (read) by specifying an anonymous (EC)DH 7536 ciphersuite and sending carefully crafted handshake messages. 7537 7538 Thanks to Felix Gröbert (Google) for discovering and researching this 7539 issue. 7540 ([CVE-2014-3510]) 7541 7542 *Emilia Käsper* 7543 7544 * By sending carefully crafted DTLS packets an attacker could cause openssl 7545 to leak memory. This can be exploited through a Denial of Service attack. 7546 Thanks to Adam Langley for discovering and researching this issue. 7547 ([CVE-2014-3507]) 7548 7549 *Adam Langley* 7550 7551 * An attacker can force openssl to consume large amounts of memory whilst 7552 processing DTLS handshake messages. This can be exploited through a 7553 Denial of Service attack. 7554 Thanks to Adam Langley for discovering and researching this issue. 7555 ([CVE-2014-3506]) 7556 7557 *Adam Langley* 7558 7559 * An attacker can force an error condition which causes openssl to crash 7560 whilst processing DTLS packets due to memory being freed twice. This 7561 can be exploited through a Denial of Service attack. 7562 Thanks to Adam Langley and Wan-Teh Chang for discovering and researching 7563 this issue. 7564 ([CVE-2014-3505]) 7565 7566 *Adam Langley* 7567 7568 * If a multithreaded client connects to a malicious server using a resumed 7569 session and the server sends an ec point format extension it could write 7570 up to 255 bytes to freed memory. 7571 7572 Thanks to Gabor Tyukasz (LogMeIn Inc) for discovering and researching this 7573 issue. 7574 ([CVE-2014-3509]) 7575 7576 *Gabor Tyukasz* 7577 7578 * A malicious server can crash an OpenSSL client with a null pointer 7579 dereference (read) by specifying an SRP ciphersuite even though it was not 7580 properly negotiated with the client. This can be exploited through a 7581 Denial of Service attack. 7582 7583 Thanks to Joonas Kuorilehto and Riku Hietamäki (Codenomicon) for 7584 discovering and researching this issue. 7585 ([CVE-2014-5139]) 7586 7587 *Steve Henson* 7588 7589 * A flaw in OBJ_obj2txt may cause pretty printing functions such as 7590 X509_name_oneline, X509_name_print_ex et al. to leak some information 7591 from the stack. Applications may be affected if they echo pretty printing 7592 output to the attacker. 7593 7594 Thanks to Ivan Fratric (Google) for discovering this issue. 7595 ([CVE-2014-3508]) 7596 7597 *Emilia Käsper, and Steve Henson* 7598 7599 * Fix ec_GFp_simple_points_make_affine (thus, EC_POINTs_mul etc.) 7600 for corner cases. (Certain input points at infinity could lead to 7601 bogus results, with non-infinity inputs mapped to infinity too.) 7602 7603 *Bodo Moeller* 7604 7605### Changes between 1.0.1g and 1.0.1h [5 Jun 2014] 7606 7607 * Fix for SSL/TLS MITM flaw. An attacker using a carefully crafted 7608 handshake can force the use of weak keying material in OpenSSL 7609 SSL/TLS clients and servers. 7610 7611 Thanks to KIKUCHI Masashi (Lepidum Co. Ltd.) for discovering and 7612 researching this issue. ([CVE-2014-0224]) 7613 7614 *KIKUCHI Masashi, Steve Henson* 7615 7616 * Fix DTLS recursion flaw. By sending an invalid DTLS handshake to an 7617 OpenSSL DTLS client the code can be made to recurse eventually crashing 7618 in a DoS attack. 7619 7620 Thanks to Imre Rad (Search-Lab Ltd.) for discovering this issue. 7621 ([CVE-2014-0221]) 7622 7623 *Imre Rad, Steve Henson* 7624 7625 * Fix DTLS invalid fragment vulnerability. A buffer overrun attack can 7626 be triggered by sending invalid DTLS fragments to an OpenSSL DTLS 7627 client or server. This is potentially exploitable to run arbitrary 7628 code on a vulnerable client or server. 7629 7630 Thanks to Jüri Aedla for reporting this issue. ([CVE-2014-0195]) 7631 7632 *Jüri Aedla, Steve Henson* 7633 7634 * Fix bug in TLS code where clients enable anonymous ECDH ciphersuites 7635 are subject to a denial of service attack. 7636 7637 Thanks to Felix Gröbert and Ivan Fratric at Google for discovering 7638 this issue. ([CVE-2014-3470]) 7639 7640 *Felix Gröbert, Ivan Fratric, Steve Henson* 7641 7642 * Harmonize version and its documentation. -f flag is used to display 7643 compilation flags. 7644 7645 *mancha <mancha1@zoho.com>* 7646 7647 * Fix eckey_priv_encode so it immediately returns an error upon a failure 7648 in i2d_ECPrivateKey. 7649 7650 *mancha <mancha1@zoho.com>* 7651 7652 * Fix some double frees. These are not thought to be exploitable. 7653 7654 *mancha <mancha1@zoho.com>* 7655 7656### Changes between 1.0.1f and 1.0.1g [7 Apr 2014] 7657 7658 * A missing bounds check in the handling of the TLS heartbeat extension 7659 can be used to reveal up to 64k of memory to a connected client or 7660 server. 7661 7662 Thanks for Neel Mehta of Google Security for discovering this bug and to 7663 Adam Langley <agl@chromium.org> and Bodo Moeller <bmoeller@acm.org> for 7664 preparing the fix ([CVE-2014-0160]) 7665 7666 *Adam Langley, Bodo Moeller* 7667 7668 * Fix for the attack described in the paper "Recovering OpenSSL 7669 ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack" 7670 by Yuval Yarom and Naomi Benger. Details can be obtained from: 7671 <http://eprint.iacr.org/2014/140> 7672 7673 Thanks to Yuval Yarom and Naomi Benger for discovering this 7674 flaw and to Yuval Yarom for supplying a fix ([CVE-2014-0076]) 7675 7676 *Yuval Yarom and Naomi Benger* 7677 7678 * TLS pad extension: draft-agl-tls-padding-03 7679 7680 Workaround for the "TLS hang bug" (see FAQ and PR#2771): if the 7681 TLS client Hello record length value would otherwise be > 255 and 7682 less that 512 pad with a dummy extension containing zeroes so it 7683 is at least 512 bytes long. 7684 7685 *Adam Langley, Steve Henson* 7686 7687### Changes between 1.0.1e and 1.0.1f [6 Jan 2014] 7688 7689 * Fix for TLS record tampering bug. A carefully crafted invalid 7690 handshake could crash OpenSSL with a NULL pointer exception. 7691 Thanks to Anton Johansson for reporting this issues. 7692 ([CVE-2013-4353]) 7693 7694 * Keep original DTLS digest and encryption contexts in retransmission 7695 structures so we can use the previous session parameters if they need 7696 to be resent. ([CVE-2013-6450]) 7697 7698 *Steve Henson* 7699 7700 * Add option SSL_OP_SAFARI_ECDHE_ECDSA_BUG (part of SSL_OP_ALL) which 7701 avoids preferring ECDHE-ECDSA ciphers when the client appears to be 7702 Safari on OS X. Safari on OS X 10.8..10.8.3 advertises support for 7703 several ECDHE-ECDSA ciphers, but fails to negotiate them. The bug 7704 is fixed in OS X 10.8.4, but Apple have ruled out both hot fixing 7705 10.8..10.8.3 and forcing users to upgrade to 10.8.4 or newer. 7706 7707 *Rob Stradling, Adam Langley* 7708 7709### Changes between 1.0.1d and 1.0.1e [11 Feb 2013] 7710 7711 * Correct fix for CVE-2013-0169. The original didn't work on AES-NI 7712 supporting platforms or when small records were transferred. 7713 7714 *Andy Polyakov, Steve Henson* 7715 7716### Changes between 1.0.1c and 1.0.1d [5 Feb 2013] 7717 7718 * Make the decoding of SSLv3, TLS and DTLS CBC records constant time. 7719 7720 This addresses the flaw in CBC record processing discovered by 7721 Nadhem Alfardan and Kenny Paterson. Details of this attack can be found 7722 at: <http://www.isg.rhul.ac.uk/tls/> 7723 7724 Thanks go to Nadhem Alfardan and Kenny Paterson of the Information 7725 Security Group at Royal Holloway, University of London 7726 (www.isg.rhul.ac.uk) for discovering this flaw and Adam Langley and 7727 Emilia Käsper for the initial patch. 7728 ([CVE-2013-0169]) 7729 7730 *Emilia Käsper, Adam Langley, Ben Laurie, Andy Polyakov, Steve Henson* 7731 7732 * Fix flaw in AESNI handling of TLS 1.2 and 1.1 records for CBC mode 7733 ciphersuites which can be exploited in a denial of service attack. 7734 Thanks go to and to Adam Langley <agl@chromium.org> for discovering 7735 and detecting this bug and to Wolfgang Ettlinger 7736 <wolfgang.ettlinger@gmail.com> for independently discovering this issue. 7737 ([CVE-2012-2686]) 7738 7739 *Adam Langley* 7740 7741 * Return an error when checking OCSP signatures when key is NULL. 7742 This fixes a DoS attack. ([CVE-2013-0166]) 7743 7744 *Steve Henson* 7745 7746 * Make openssl verify return errors. 7747 7748 *Chris Palmer <palmer@google.com> and Ben Laurie* 7749 7750 * Call OCSP Stapling callback after ciphersuite has been chosen, so 7751 the right response is stapled. Also change SSL_get_certificate() 7752 so it returns the certificate actually sent. 7753 See <http://rt.openssl.org/Ticket/Display.html?id=2836>. 7754 7755 *Rob Stradling <rob.stradling@comodo.com>* 7756 7757 * Fix possible deadlock when decoding public keys. 7758 7759 *Steve Henson* 7760 7761 * Don't use TLS 1.0 record version number in initial client hello 7762 if renegotiating. 7763 7764 *Steve Henson* 7765 7766### Changes between 1.0.1b and 1.0.1c [10 May 2012] 7767 7768 * Sanity check record length before skipping explicit IV in TLS 7769 1.2, 1.1 and DTLS to fix DoS attack. 7770 7771 Thanks to Codenomicon for discovering this issue using Fuzz-o-Matic 7772 fuzzing as a service testing platform. 7773 ([CVE-2012-2333]) 7774 7775 *Steve Henson* 7776 7777 * Initialise tkeylen properly when encrypting CMS messages. 7778 Thanks to Solar Designer of Openwall for reporting this issue. 7779 7780 *Steve Henson* 7781 7782 * In FIPS mode don't try to use composite ciphers as they are not 7783 approved. 7784 7785 *Steve Henson* 7786 7787### Changes between 1.0.1a and 1.0.1b [26 Apr 2012] 7788 7789 * OpenSSL 1.0.0 sets SSL_OP_ALL to 0x80000FFFL and OpenSSL 1.0.1 and 7790 1.0.1a set SSL_OP_NO_TLSv1_1 to 0x00000400L which would unfortunately 7791 mean any application compiled against OpenSSL 1.0.0 headers setting 7792 SSL_OP_ALL would also set SSL_OP_NO_TLSv1_1, unintentionally disabling 7793 TLS 1.1 also. Fix this by changing the value of SSL_OP_NO_TLSv1_1 to 7794 0x10000000L Any application which was previously compiled against 7795 OpenSSL 1.0.1 or 1.0.1a headers and which cares about SSL_OP_NO_TLSv1_1 7796 will need to be recompiled as a result. Letting be results in 7797 inability to disable specifically TLS 1.1 and in client context, 7798 in unlike event, limit maximum offered version to TLS 1.0 [see below]. 7799 7800 *Steve Henson* 7801 7802 * In order to ensure interoperability SSL_OP_NO_protocolX does not 7803 disable just protocol X, but all protocols above X *if* there are 7804 protocols *below* X still enabled. In more practical terms it means 7805 that if application wants to disable TLS1.0 in favor of TLS1.1 and 7806 above, it's not sufficient to pass `SSL_OP_NO_TLSv1`, one has to pass 7807 `SSL_OP_NO_TLSv1|SSL_OP_NO_SSLv3|SSL_OP_NO_SSLv2`. This applies to 7808 client side. 7809 7810 *Andy Polyakov* 7811 7812### Changes between 1.0.1 and 1.0.1a [19 Apr 2012] 7813 7814 * Check for potentially exploitable overflows in asn1_d2i_read_bio 7815 BUF_mem_grow and BUF_mem_grow_clean. Refuse attempts to shrink buffer 7816 in CRYPTO_realloc_clean. 7817 7818 Thanks to Tavis Ormandy, Google Security Team, for discovering this 7819 issue and to Adam Langley <agl@chromium.org> for fixing it. 7820 ([CVE-2012-2110]) 7821 7822 *Adam Langley (Google), Tavis Ormandy, Google Security Team* 7823 7824 * Don't allow TLS 1.2 SHA-256 ciphersuites in TLS 1.0, 1.1 connections. 7825 7826 *Adam Langley* 7827 7828 * Workarounds for some broken servers that "hang" if a client hello 7829 record length exceeds 255 bytes. 7830 7831 1. Do not use record version number > TLS 1.0 in initial client 7832 hello: some (but not all) hanging servers will now work. 7833 2. If we set OPENSSL_MAX_TLS1_2_CIPHER_LENGTH this will truncate 7834 the number of ciphers sent in the client hello. This should be 7835 set to an even number, such as 50, for example by passing: 7836 -DOPENSSL_MAX_TLS1_2_CIPHER_LENGTH=50 to config or Configure. 7837 Most broken servers should now work. 7838 3. If all else fails setting OPENSSL_NO_TLS1_2_CLIENT will disable 7839 TLS 1.2 client support entirely. 7840 7841 *Steve Henson* 7842 7843 * Fix SEGV in Vector Permutation AES module observed in OpenSSH. 7844 7845 *Andy Polyakov* 7846 7847### Changes between 1.0.0h and 1.0.1 [14 Mar 2012] 7848 7849 * Add compatibility with old MDC2 signatures which use an ASN1 OCTET 7850 STRING form instead of a DigestInfo. 7851 7852 *Steve Henson* 7853 7854 * The format used for MDC2 RSA signatures is inconsistent between EVP 7855 and the RSA_sign/RSA_verify functions. This was made more apparent when 7856 OpenSSL used RSA_sign/RSA_verify for some RSA signatures in particular 7857 those which went through EVP_PKEY_METHOD in 1.0.0 and later. Detect 7858 the correct format in RSA_verify so both forms transparently work. 7859 7860 *Steve Henson* 7861 7862 * Some servers which support TLS 1.0 can choke if we initially indicate 7863 support for TLS 1.2 and later renegotiate using TLS 1.0 in the RSA 7864 encrypted premaster secret. As a workaround use the maximum permitted 7865 client version in client hello, this should keep such servers happy 7866 and still work with previous versions of OpenSSL. 7867 7868 *Steve Henson* 7869 7870 * Add support for TLS/DTLS heartbeats. 7871 7872 *Robin Seggelmann <seggelmann@fh-muenster.de>* 7873 7874 * Add support for SCTP. 7875 7876 *Robin Seggelmann <seggelmann@fh-muenster.de>* 7877 7878 * Improved PRNG seeding for VOS. 7879 7880 *Paul Green <Paul.Green@stratus.com>* 7881 7882 * Extensive assembler packs updates, most notably: 7883 7884 - x86[_64]: AES-NI, PCLMULQDQ, RDRAND support; 7885 - x86[_64]: SSSE3 support (SHA1, vector-permutation AES); 7886 - x86_64: bit-sliced AES implementation; 7887 - ARM: NEON support, contemporary platforms optimizations; 7888 - s390x: z196 support; 7889 - `*`: GHASH and GF(2^m) multiplication implementations; 7890 7891 *Andy Polyakov* 7892 7893 * Make TLS-SRP code conformant with RFC 5054 API cleanup 7894 (removal of unnecessary code) 7895 7896 *Peter Sylvester <peter.sylvester@edelweb.fr>* 7897 7898 * Add TLS key material exporter from RFC 5705. 7899 7900 *Eric Rescorla* 7901 7902 * Add DTLS-SRTP negotiation from RFC 5764. 7903 7904 *Eric Rescorla* 7905 7906 * Add Next Protocol Negotiation, 7907 <http://tools.ietf.org/html/draft-agl-tls-nextprotoneg-00>. Can be 7908 disabled with a no-npn flag to config or Configure. Code donated 7909 by Google. 7910 7911 *Adam Langley <agl@google.com> and Ben Laurie* 7912 7913 * Add optional 64-bit optimized implementations of elliptic curves NIST-P224, 7914 NIST-P256, NIST-P521, with constant-time single point multiplication on 7915 typical inputs. Compiler support for the nonstandard type `__uint128_t` is 7916 required to use this (present in gcc 4.4 and later, for 64-bit builds). 7917 Code made available under Apache License version 2.0. 7918 7919 Specify "enable-ec_nistp_64_gcc_128" on the Configure (or config) command 7920 line to include this in your build of OpenSSL, and run "make depend" (or 7921 "make update"). This enables the following EC_METHODs: 7922 7923 EC_GFp_nistp224_method() 7924 EC_GFp_nistp256_method() 7925 EC_GFp_nistp521_method() 7926 7927 EC_GROUP_new_by_curve_name() will automatically use these (while 7928 EC_GROUP_new_curve_GFp() currently prefers the more flexible 7929 implementations). 7930 7931 *Emilia Käsper, Adam Langley, Bodo Moeller (Google)* 7932 7933 * Use type ossl_ssize_t instead of ssize_t which isn't available on 7934 all platforms. Move ssize_t definition from e_os.h to the public 7935 header file e_os2.h as it now appears in public header file cms.h 7936 7937 *Steve Henson* 7938 7939 * New -sigopt option to the ca, req and x509 utilities. Additional 7940 signature parameters can be passed using this option and in 7941 particular PSS. 7942 7943 *Steve Henson* 7944 7945 * Add RSA PSS signing function. This will generate and set the 7946 appropriate AlgorithmIdentifiers for PSS based on those in the 7947 corresponding EVP_MD_CTX structure. No application support yet. 7948 7949 *Steve Henson* 7950 7951 * Support for companion algorithm specific ASN1 signing routines. 7952 New function ASN1_item_sign_ctx() signs a pre-initialised 7953 EVP_MD_CTX structure and sets AlgorithmIdentifiers based on 7954 the appropriate parameters. 7955 7956 *Steve Henson* 7957 7958 * Add new algorithm specific ASN1 verification initialisation function 7959 to EVP_PKEY_ASN1_METHOD: this is not in EVP_PKEY_METHOD since the ASN1 7960 handling will be the same no matter what EVP_PKEY_METHOD is used. 7961 Add a PSS handler to support verification of PSS signatures: checked 7962 against a number of sample certificates. 7963 7964 *Steve Henson* 7965 7966 * Add signature printing for PSS. Add PSS OIDs. 7967 7968 *Steve Henson, Martin Kaiser <lists@kaiser.cx>* 7969 7970 * Add algorithm specific signature printing. An individual ASN1 method 7971 can now print out signatures instead of the standard hex dump. 7972 7973 More complex signatures (e.g. PSS) can print out more meaningful 7974 information. Include DSA version that prints out the signature 7975 parameters r, s. 7976 7977 *Steve Henson* 7978 7979 * Password based recipient info support for CMS library: implementing 7980 RFC3211. 7981 7982 *Steve Henson* 7983 7984 * Split password based encryption into PBES2 and PBKDF2 functions. This 7985 neatly separates the code into cipher and PBE sections and is required 7986 for some algorithms that split PBES2 into separate pieces (such as 7987 password based CMS). 7988 7989 *Steve Henson* 7990 7991 * Session-handling fixes: 7992 - Fix handling of connections that are resuming with a session ID, 7993 but also support Session Tickets. 7994 - Fix a bug that suppressed issuing of a new ticket if the client 7995 presented a ticket with an expired session. 7996 - Try to set the ticket lifetime hint to something reasonable. 7997 - Make tickets shorter by excluding irrelevant information. 7998 - On the client side, don't ignore renewed tickets. 7999 8000 *Adam Langley, Bodo Moeller (Google)* 8001 8002 * Fix PSK session representation. 8003 8004 *Bodo Moeller* 8005 8006 * Add RC4-MD5 and AESNI-SHA1 "stitched" implementations. 8007 8008 This work was sponsored by Intel. 8009 8010 *Andy Polyakov* 8011 8012 * Add GCM support to TLS library. Some custom code is needed to split 8013 the IV between the fixed (from PRF) and explicit (from TLS record) 8014 portions. This adds all GCM ciphersuites supported by RFC5288 and 8015 RFC5289. Generalise some `AES*` cipherstrings to include GCM and 8016 add a special AESGCM string for GCM only. 8017 8018 *Steve Henson* 8019 8020 * Expand range of ctrls for AES GCM. Permit setting invocation 8021 field on decrypt and retrieval of invocation field only on encrypt. 8022 8023 *Steve Henson* 8024 8025 * Add HMAC ECC ciphersuites from RFC5289. Include SHA384 PRF support. 8026 As required by RFC5289 these ciphersuites cannot be used if for 8027 versions of TLS earlier than 1.2. 8028 8029 *Steve Henson* 8030 8031 * For FIPS capable OpenSSL interpret a NULL default public key method 8032 as unset and return the appropriate default but do *not* set the default. 8033 This means we can return the appropriate method in applications that 8034 switch between FIPS and non-FIPS modes. 8035 8036 *Steve Henson* 8037 8038 * Redirect HMAC and CMAC operations to FIPS module in FIPS mode. If an 8039 ENGINE is used then we cannot handle that in the FIPS module so we 8040 keep original code iff non-FIPS operations are allowed. 8041 8042 *Steve Henson* 8043 8044 * Add -attime option to openssl utilities. 8045 8046 *Peter Eckersley <pde@eff.org>, Ben Laurie and Steve Henson* 8047 8048 * Redirect DSA and DH operations to FIPS module in FIPS mode. 8049 8050 *Steve Henson* 8051 8052 * Redirect ECDSA and ECDH operations to FIPS module in FIPS mode. Also use 8053 FIPS EC methods unconditionally for now. 8054 8055 *Steve Henson* 8056 8057 * New build option no-ec2m to disable characteristic 2 code. 8058 8059 *Steve Henson* 8060 8061 * Backport libcrypto audit of return value checking from 1.1.0-dev; not 8062 all cases can be covered as some introduce binary incompatibilities. 8063 8064 *Steve Henson* 8065 8066 * Redirect RSA operations to FIPS module including keygen, 8067 encrypt, decrypt, sign and verify. Block use of non FIPS RSA methods. 8068 8069 *Steve Henson* 8070 8071 * Add similar low-level API blocking to ciphers. 8072 8073 *Steve Henson* 8074 8075 * low-level digest APIs are not approved in FIPS mode: any attempt 8076 to use these will cause a fatal error. Applications that *really* want 8077 to use them can use the `private_*` version instead. 8078 8079 *Steve Henson* 8080 8081 * Redirect cipher operations to FIPS module for FIPS builds. 8082 8083 *Steve Henson* 8084 8085 * Redirect digest operations to FIPS module for FIPS builds. 8086 8087 *Steve Henson* 8088 8089 * Update build system to add "fips" flag which will link in fipscanister.o 8090 for static and shared library builds embedding a signature if needed. 8091 8092 *Steve Henson* 8093 8094 * Output TLS supported curves in preference order instead of numerical 8095 order. This is currently hardcoded for the highest order curves first. 8096 This should be configurable so applications can judge speed vs strength. 8097 8098 *Steve Henson* 8099 8100 * Add TLS v1.2 server support for client authentication. 8101 8102 *Steve Henson* 8103 8104 * Add support for FIPS mode in ssl library: disable SSLv3, non-FIPS ciphers 8105 and enable MD5. 8106 8107 *Steve Henson* 8108 8109 * Functions FIPS_mode_set() and FIPS_mode() which call the underlying 8110 FIPS modules versions. 8111 8112 *Steve Henson* 8113 8114 * Add TLS v1.2 client side support for client authentication. Keep cache 8115 of handshake records longer as we don't know the hash algorithm to use 8116 until after the certificate request message is received. 8117 8118 *Steve Henson* 8119 8120 * Initial TLS v1.2 client support. Add a default signature algorithms 8121 extension including all the algorithms we support. Parse new signature 8122 format in client key exchange. Relax some ECC signing restrictions for 8123 TLS v1.2 as indicated in RFC5246. 8124 8125 *Steve Henson* 8126 8127 * Add server support for TLS v1.2 signature algorithms extension. Switch 8128 to new signature format when needed using client digest preference. 8129 All server ciphersuites should now work correctly in TLS v1.2. No client 8130 support yet and no support for client certificates. 8131 8132 *Steve Henson* 8133 8134 * Initial TLS v1.2 support. Add new SHA256 digest to ssl code, switch 8135 to SHA256 for PRF when using TLS v1.2 and later. Add new SHA256 based 8136 ciphersuites. At present only RSA key exchange ciphersuites work with 8137 TLS v1.2. Add new option for TLS v1.2 replacing the old and obsolete 8138 SSL_OP_PKCS1_CHECK flags with SSL_OP_NO_TLSv1_2. New TLSv1.2 methods 8139 and version checking. 8140 8141 *Steve Henson* 8142 8143 * New option OPENSSL_NO_SSL_INTERN. If an application can be compiled 8144 with this defined it will not be affected by any changes to ssl internal 8145 structures. Add several utility functions to allow openssl application 8146 to work with OPENSSL_NO_SSL_INTERN defined. 8147 8148 *Steve Henson* 8149 8150 * A long standing patch to add support for SRP from EdelWeb (Peter 8151 Sylvester and Christophe Renou) was integrated. 8152 *Christophe Renou <christophe.renou@edelweb.fr>, Peter Sylvester 8153 <peter.sylvester@edelweb.fr>, Tom Wu <tjw@cs.stanford.edu>, and 8154 Ben Laurie* 8155 8156 * Add functions to copy EVP_PKEY_METHOD and retrieve flags and id. 8157 8158 *Steve Henson* 8159 8160 * Permit abbreviated handshakes when renegotiating using the function 8161 SSL_renegotiate_abbreviated(). 8162 8163 *Robin Seggelmann <seggelmann@fh-muenster.de>* 8164 8165 * Add call to ENGINE_register_all_complete() to 8166 ENGINE_load_builtin_engines(), so some implementations get used 8167 automatically instead of needing explicit application support. 8168 8169 *Steve Henson* 8170 8171 * Add support for TLS key exporter as described in RFC5705. 8172 8173 *Robin Seggelmann <seggelmann@fh-muenster.de>, Steve Henson* 8174 8175 * Initial TLSv1.1 support. Since TLSv1.1 is very similar to TLS v1.0 only 8176 a few changes are required: 8177 8178 Add SSL_OP_NO_TLSv1_1 flag. 8179 Add TLSv1_1 methods. 8180 Update version checking logic to handle version 1.1. 8181 Add explicit IV handling (ported from DTLS code). 8182 Add command line options to s_client/s_server. 8183 8184 *Steve Henson* 8185 8186OpenSSL 1.0.0 8187------------- 8188 8189### Changes between 1.0.0s and 1.0.0t [3 Dec 2015] 8190 8191 * X509_ATTRIBUTE memory leak 8192 8193 When presented with a malformed X509_ATTRIBUTE structure OpenSSL will leak 8194 memory. This structure is used by the PKCS#7 and CMS routines so any 8195 application which reads PKCS#7 or CMS data from untrusted sources is 8196 affected. SSL/TLS is not affected. 8197 8198 This issue was reported to OpenSSL by Adam Langley (Google/BoringSSL) using 8199 libFuzzer. 8200 ([CVE-2015-3195]) 8201 8202 *Stephen Henson* 8203 8204 * Race condition handling PSK identify hint 8205 8206 If PSK identity hints are received by a multi-threaded client then 8207 the values are wrongly updated in the parent SSL_CTX structure. This can 8208 result in a race condition potentially leading to a double free of the 8209 identify hint data. 8210 ([CVE-2015-3196]) 8211 8212 *Stephen Henson* 8213 8214### Changes between 1.0.0r and 1.0.0s [11 Jun 2015] 8215 8216 * Malformed ECParameters causes infinite loop 8217 8218 When processing an ECParameters structure OpenSSL enters an infinite loop 8219 if the curve specified is over a specially malformed binary polynomial 8220 field. 8221 8222 This can be used to perform denial of service against any 8223 system which processes public keys, certificate requests or 8224 certificates. This includes TLS clients and TLS servers with 8225 client authentication enabled. 8226 8227 This issue was reported to OpenSSL by Joseph Barr-Pixton. 8228 ([CVE-2015-1788]) 8229 8230 *Andy Polyakov* 8231 8232 * Exploitable out-of-bounds read in X509_cmp_time 8233 8234 X509_cmp_time does not properly check the length of the ASN1_TIME 8235 string and can read a few bytes out of bounds. In addition, 8236 X509_cmp_time accepts an arbitrary number of fractional seconds in the 8237 time string. 8238 8239 An attacker can use this to craft malformed certificates and CRLs of 8240 various sizes and potentially cause a segmentation fault, resulting in 8241 a DoS on applications that verify certificates or CRLs. TLS clients 8242 that verify CRLs are affected. TLS clients and servers with client 8243 authentication enabled may be affected if they use custom verification 8244 callbacks. 8245 8246 This issue was reported to OpenSSL by Robert Swiecki (Google), and 8247 independently by Hanno Böck. 8248 ([CVE-2015-1789]) 8249 8250 *Emilia Käsper* 8251 8252 * PKCS7 crash with missing EnvelopedContent 8253 8254 The PKCS#7 parsing code does not handle missing inner EncryptedContent 8255 correctly. An attacker can craft malformed ASN.1-encoded PKCS#7 blobs 8256 with missing content and trigger a NULL pointer dereference on parsing. 8257 8258 Applications that decrypt PKCS#7 data or otherwise parse PKCS#7 8259 structures from untrusted sources are affected. OpenSSL clients and 8260 servers are not affected. 8261 8262 This issue was reported to OpenSSL by Michal Zalewski (Google). 8263 ([CVE-2015-1790]) 8264 8265 *Emilia Käsper* 8266 8267 * CMS verify infinite loop with unknown hash function 8268 8269 When verifying a signedData message the CMS code can enter an infinite loop 8270 if presented with an unknown hash function OID. This can be used to perform 8271 denial of service against any system which verifies signedData messages using 8272 the CMS code. 8273 This issue was reported to OpenSSL by Johannes Bauer. 8274 ([CVE-2015-1792]) 8275 8276 *Stephen Henson* 8277 8278 * Race condition handling NewSessionTicket 8279 8280 If a NewSessionTicket is received by a multi-threaded client when attempting to 8281 reuse a previous ticket then a race condition can occur potentially leading to 8282 a double free of the ticket data. 8283 ([CVE-2015-1791]) 8284 8285 *Matt Caswell* 8286 8287### Changes between 1.0.0q and 1.0.0r [19 Mar 2015] 8288 8289 * Segmentation fault in ASN1_TYPE_cmp fix 8290 8291 The function ASN1_TYPE_cmp will crash with an invalid read if an attempt is 8292 made to compare ASN.1 boolean types. Since ASN1_TYPE_cmp is used to check 8293 certificate signature algorithm consistency this can be used to crash any 8294 certificate verification operation and exploited in a DoS attack. Any 8295 application which performs certificate verification is vulnerable including 8296 OpenSSL clients and servers which enable client authentication. 8297 ([CVE-2015-0286]) 8298 8299 *Stephen Henson* 8300 8301 * ASN.1 structure reuse memory corruption fix 8302 8303 Reusing a structure in ASN.1 parsing may allow an attacker to cause 8304 memory corruption via an invalid write. Such reuse is and has been 8305 strongly discouraged and is believed to be rare. 8306 8307 Applications that parse structures containing CHOICE or ANY DEFINED BY 8308 components may be affected. Certificate parsing (d2i_X509 and related 8309 functions) are however not affected. OpenSSL clients and servers are 8310 not affected. 8311 ([CVE-2015-0287]) 8312 8313 *Stephen Henson* 8314 8315 * PKCS7 NULL pointer dereferences fix 8316 8317 The PKCS#7 parsing code does not handle missing outer ContentInfo 8318 correctly. An attacker can craft malformed ASN.1-encoded PKCS#7 blobs with 8319 missing content and trigger a NULL pointer dereference on parsing. 8320 8321 Applications that verify PKCS#7 signatures, decrypt PKCS#7 data or 8322 otherwise parse PKCS#7 structures from untrusted sources are 8323 affected. OpenSSL clients and servers are not affected. 8324 8325 This issue was reported to OpenSSL by Michal Zalewski (Google). 8326 ([CVE-2015-0289]) 8327 8328 *Emilia Käsper* 8329 8330 * DoS via reachable assert in SSLv2 servers fix 8331 8332 A malicious client can trigger an OPENSSL_assert (i.e., an abort) in 8333 servers that both support SSLv2 and enable export cipher suites by sending 8334 a specially crafted SSLv2 CLIENT-MASTER-KEY message. 8335 8336 This issue was discovered by Sean Burford (Google) and Emilia Käsper 8337 (OpenSSL development team). 8338 ([CVE-2015-0293]) 8339 8340 *Emilia Käsper* 8341 8342 * Use After Free following d2i_ECPrivatekey error fix 8343 8344 A malformed EC private key file consumed via the d2i_ECPrivateKey function 8345 could cause a use after free condition. This, in turn, could cause a double 8346 free in several private key parsing functions (such as d2i_PrivateKey 8347 or EVP_PKCS82PKEY) and could lead to a DoS attack or memory corruption 8348 for applications that receive EC private keys from untrusted 8349 sources. This scenario is considered rare. 8350 8351 This issue was discovered by the BoringSSL project and fixed in their 8352 commit 517073cd4b. 8353 ([CVE-2015-0209]) 8354 8355 *Matt Caswell* 8356 8357 * X509_to_X509_REQ NULL pointer deref fix 8358 8359 The function X509_to_X509_REQ will crash with a NULL pointer dereference if 8360 the certificate key is invalid. This function is rarely used in practice. 8361 8362 This issue was discovered by Brian Carpenter. 8363 ([CVE-2015-0288]) 8364 8365 *Stephen Henson* 8366 8367 * Removed the export ciphers from the DEFAULT ciphers 8368 8369 *Kurt Roeckx* 8370 8371### Changes between 1.0.0p and 1.0.0q [15 Jan 2015] 8372 8373 * Build fixes for the Windows and OpenVMS platforms 8374 8375 *Matt Caswell and Richard Levitte* 8376 8377### Changes between 1.0.0o and 1.0.0p [8 Jan 2015] 8378 8379 * Fix DTLS segmentation fault in dtls1_get_record. A carefully crafted DTLS 8380 message can cause a segmentation fault in OpenSSL due to a NULL pointer 8381 dereference. This could lead to a Denial Of Service attack. Thanks to 8382 Markus Stenberg of Cisco Systems, Inc. for reporting this issue. 8383 ([CVE-2014-3571]) 8384 8385 *Steve Henson* 8386 8387 * Fix DTLS memory leak in dtls1_buffer_record. A memory leak can occur in the 8388 dtls1_buffer_record function under certain conditions. In particular this 8389 could occur if an attacker sent repeated DTLS records with the same 8390 sequence number but for the next epoch. The memory leak could be exploited 8391 by an attacker in a Denial of Service attack through memory exhaustion. 8392 Thanks to Chris Mueller for reporting this issue. 8393 ([CVE-2015-0206]) 8394 8395 *Matt Caswell* 8396 8397 * Fix issue where no-ssl3 configuration sets method to NULL. When openssl is 8398 built with the no-ssl3 option and a SSL v3 ClientHello is received the ssl 8399 method would be set to NULL which could later result in a NULL pointer 8400 dereference. Thanks to Frank Schmirler for reporting this issue. 8401 ([CVE-2014-3569]) 8402 8403 *Kurt Roeckx* 8404 8405 * Abort handshake if server key exchange message is omitted for ephemeral 8406 ECDH ciphersuites. 8407 8408 Thanks to Karthikeyan Bhargavan of the PROSECCO team at INRIA for 8409 reporting this issue. 8410 ([CVE-2014-3572]) 8411 8412 *Steve Henson* 8413 8414 * Remove non-export ephemeral RSA code on client and server. This code 8415 violated the TLS standard by allowing the use of temporary RSA keys in 8416 non-export ciphersuites and could be used by a server to effectively 8417 downgrade the RSA key length used to a value smaller than the server 8418 certificate. Thanks for Karthikeyan Bhargavan of the PROSECCO team at 8419 INRIA or reporting this issue. 8420 ([CVE-2015-0204]) 8421 8422 *Steve Henson* 8423 8424 * Fixed issue where DH client certificates are accepted without verification. 8425 An OpenSSL server will accept a DH certificate for client authentication 8426 without the certificate verify message. This effectively allows a client to 8427 authenticate without the use of a private key. This only affects servers 8428 which trust a client certificate authority which issues certificates 8429 containing DH keys: these are extremely rare and hardly ever encountered. 8430 Thanks for Karthikeyan Bhargavan of the PROSECCO team at INRIA or reporting 8431 this issue. 8432 ([CVE-2015-0205]) 8433 8434 *Steve Henson* 8435 8436 * Correct Bignum squaring. Bignum squaring (BN_sqr) may produce incorrect 8437 results on some platforms, including x86_64. This bug occurs at random 8438 with a very low probability, and is not known to be exploitable in any 8439 way, though its exact impact is difficult to determine. Thanks to Pieter 8440 Wuille (Blockstream) who reported this issue and also suggested an initial 8441 fix. Further analysis was conducted by the OpenSSL development team and 8442 Adam Langley of Google. The final fix was developed by Andy Polyakov of 8443 the OpenSSL core team. 8444 ([CVE-2014-3570]) 8445 8446 *Andy Polyakov* 8447 8448 * Fix various certificate fingerprint issues. 8449 8450 By using non-DER or invalid encodings outside the signed portion of a 8451 certificate the fingerprint can be changed without breaking the signature. 8452 Although no details of the signed portion of the certificate can be changed 8453 this can cause problems with some applications: e.g. those using the 8454 certificate fingerprint for blacklists. 8455 8456 1. Reject signatures with non zero unused bits. 8457 8458 If the BIT STRING containing the signature has non zero unused bits reject 8459 the signature. All current signature algorithms require zero unused bits. 8460 8461 2. Check certificate algorithm consistency. 8462 8463 Check the AlgorithmIdentifier inside TBS matches the one in the 8464 certificate signature. NB: this will result in signature failure 8465 errors for some broken certificates. 8466 8467 Thanks to Konrad Kraszewski from Google for reporting this issue. 8468 8469 3. Check DSA/ECDSA signatures use DER. 8470 8471 Reencode DSA/ECDSA signatures and compare with the original received 8472 signature. Return an error if there is a mismatch. 8473 8474 This will reject various cases including garbage after signature 8475 (thanks to Antti Karjalainen and Tuomo Untinen from the Codenomicon CROSS 8476 program for discovering this case) and use of BER or invalid ASN.1 INTEGERs 8477 (negative or with leading zeroes). 8478 8479 Further analysis was conducted and fixes were developed by Stephen Henson 8480 of the OpenSSL core team. 8481 8482 ([CVE-2014-8275]) 8483 8484 *Steve Henson* 8485 8486### Changes between 1.0.0n and 1.0.0o [15 Oct 2014] 8487 8488 * Session Ticket Memory Leak. 8489 8490 When an OpenSSL SSL/TLS/DTLS server receives a session ticket the 8491 integrity of that ticket is first verified. In the event of a session 8492 ticket integrity check failing, OpenSSL will fail to free memory 8493 causing a memory leak. By sending a large number of invalid session 8494 tickets an attacker could exploit this issue in a Denial Of Service 8495 attack. 8496 ([CVE-2014-3567]) 8497 8498 *Steve Henson* 8499 8500 * Build option no-ssl3 is incomplete. 8501 8502 When OpenSSL is configured with "no-ssl3" as a build option, servers 8503 could accept and complete a SSL 3.0 handshake, and clients could be 8504 configured to send them. 8505 ([CVE-2014-3568]) 8506 8507 *Akamai and the OpenSSL team* 8508 8509 * Add support for TLS_FALLBACK_SCSV. 8510 Client applications doing fallback retries should call 8511 SSL_set_mode(s, SSL_MODE_SEND_FALLBACK_SCSV). 8512 ([CVE-2014-3566]) 8513 8514 *Adam Langley, Bodo Moeller* 8515 8516 * Add additional DigestInfo checks. 8517 8518 Reencode DigestInto in DER and check against the original when 8519 verifying RSA signature: this will reject any improperly encoded 8520 DigestInfo structures. 8521 8522 Note: this is a precautionary measure and no attacks are currently known. 8523 8524 *Steve Henson* 8525 8526### Changes between 1.0.0m and 1.0.0n [6 Aug 2014] 8527 8528 * OpenSSL DTLS clients enabling anonymous (EC)DH ciphersuites are subject 8529 to a denial of service attack. A malicious server can crash the client 8530 with a null pointer dereference (read) by specifying an anonymous (EC)DH 8531 ciphersuite and sending carefully crafted handshake messages. 8532 8533 Thanks to Felix Gröbert (Google) for discovering and researching this 8534 issue. 8535 ([CVE-2014-3510]) 8536 8537 *Emilia Käsper* 8538 8539 * By sending carefully crafted DTLS packets an attacker could cause openssl 8540 to leak memory. This can be exploited through a Denial of Service attack. 8541 Thanks to Adam Langley for discovering and researching this issue. 8542 ([CVE-2014-3507]) 8543 8544 *Adam Langley* 8545 8546 * An attacker can force openssl to consume large amounts of memory whilst 8547 processing DTLS handshake messages. This can be exploited through a 8548 Denial of Service attack. 8549 Thanks to Adam Langley for discovering and researching this issue. 8550 ([CVE-2014-3506]) 8551 8552 *Adam Langley* 8553 8554 * An attacker can force an error condition which causes openssl to crash 8555 whilst processing DTLS packets due to memory being freed twice. This 8556 can be exploited through a Denial of Service attack. 8557 Thanks to Adam Langley and Wan-Teh Chang for discovering and researching 8558 this issue. 8559 ([CVE-2014-3505]) 8560 8561 *Adam Langley* 8562 8563 * If a multithreaded client connects to a malicious server using a resumed 8564 session and the server sends an ec point format extension it could write 8565 up to 255 bytes to freed memory. 8566 8567 Thanks to Gabor Tyukasz (LogMeIn Inc) for discovering and researching this 8568 issue. 8569 ([CVE-2014-3509]) 8570 8571 *Gabor Tyukasz* 8572 8573 * A flaw in OBJ_obj2txt may cause pretty printing functions such as 8574 X509_name_oneline, X509_name_print_ex et al. to leak some information 8575 from the stack. Applications may be affected if they echo pretty printing 8576 output to the attacker. 8577 8578 Thanks to Ivan Fratric (Google) for discovering this issue. 8579 ([CVE-2014-3508]) 8580 8581 *Emilia Käsper, and Steve Henson* 8582 8583 * Fix ec_GFp_simple_points_make_affine (thus, EC_POINTs_mul etc.) 8584 for corner cases. (Certain input points at infinity could lead to 8585 bogus results, with non-infinity inputs mapped to infinity too.) 8586 8587 *Bodo Moeller* 8588 8589### Changes between 1.0.0l and 1.0.0m [5 Jun 2014] 8590 8591 * Fix for SSL/TLS MITM flaw. An attacker using a carefully crafted 8592 handshake can force the use of weak keying material in OpenSSL 8593 SSL/TLS clients and servers. 8594 8595 Thanks to KIKUCHI Masashi (Lepidum Co. Ltd.) for discovering and 8596 researching this issue. ([CVE-2014-0224]) 8597 8598 *KIKUCHI Masashi, Steve Henson* 8599 8600 * Fix DTLS recursion flaw. By sending an invalid DTLS handshake to an 8601 OpenSSL DTLS client the code can be made to recurse eventually crashing 8602 in a DoS attack. 8603 8604 Thanks to Imre Rad (Search-Lab Ltd.) for discovering this issue. 8605 ([CVE-2014-0221]) 8606 8607 *Imre Rad, Steve Henson* 8608 8609 * Fix DTLS invalid fragment vulnerability. A buffer overrun attack can 8610 be triggered by sending invalid DTLS fragments to an OpenSSL DTLS 8611 client or server. This is potentially exploitable to run arbitrary 8612 code on a vulnerable client or server. 8613 8614 Thanks to Jüri Aedla for reporting this issue. ([CVE-2014-0195]) 8615 8616 *Jüri Aedla, Steve Henson* 8617 8618 * Fix bug in TLS code where clients enable anonymous ECDH ciphersuites 8619 are subject to a denial of service attack. 8620 8621 Thanks to Felix Gröbert and Ivan Fratric at Google for discovering 8622 this issue. ([CVE-2014-3470]) 8623 8624 *Felix Gröbert, Ivan Fratric, Steve Henson* 8625 8626 * Harmonize version and its documentation. -f flag is used to display 8627 compilation flags. 8628 8629 *mancha <mancha1@zoho.com>* 8630 8631 * Fix eckey_priv_encode so it immediately returns an error upon a failure 8632 in i2d_ECPrivateKey. 8633 8634 *mancha <mancha1@zoho.com>* 8635 8636 * Fix some double frees. These are not thought to be exploitable. 8637 8638 *mancha <mancha1@zoho.com>* 8639 8640 * Fix for the attack described in the paper "Recovering OpenSSL 8641 ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack" 8642 by Yuval Yarom and Naomi Benger. Details can be obtained from: 8643 <http://eprint.iacr.org/2014/140> 8644 8645 Thanks to Yuval Yarom and Naomi Benger for discovering this 8646 flaw and to Yuval Yarom for supplying a fix ([CVE-2014-0076]) 8647 8648 *Yuval Yarom and Naomi Benger* 8649 8650### Changes between 1.0.0k and 1.0.0l [6 Jan 2014] 8651 8652 * Keep original DTLS digest and encryption contexts in retransmission 8653 structures so we can use the previous session parameters if they need 8654 to be resent. ([CVE-2013-6450]) 8655 8656 *Steve Henson* 8657 8658 * Add option SSL_OP_SAFARI_ECDHE_ECDSA_BUG (part of SSL_OP_ALL) which 8659 avoids preferring ECDHE-ECDSA ciphers when the client appears to be 8660 Safari on OS X. Safari on OS X 10.8..10.8.3 advertises support for 8661 several ECDHE-ECDSA ciphers, but fails to negotiate them. The bug 8662 is fixed in OS X 10.8.4, but Apple have ruled out both hot fixing 8663 10.8..10.8.3 and forcing users to upgrade to 10.8.4 or newer. 8664 8665 *Rob Stradling, Adam Langley* 8666 8667### Changes between 1.0.0j and 1.0.0k [5 Feb 2013] 8668 8669 * Make the decoding of SSLv3, TLS and DTLS CBC records constant time. 8670 8671 This addresses the flaw in CBC record processing discovered by 8672 Nadhem Alfardan and Kenny Paterson. Details of this attack can be found 8673 at: <http://www.isg.rhul.ac.uk/tls/> 8674 8675 Thanks go to Nadhem Alfardan and Kenny Paterson of the Information 8676 Security Group at Royal Holloway, University of London 8677 (www.isg.rhul.ac.uk) for discovering this flaw and Adam Langley and 8678 Emilia Käsper for the initial patch. 8679 ([CVE-2013-0169]) 8680 8681 *Emilia Käsper, Adam Langley, Ben Laurie, Andy Polyakov, Steve Henson* 8682 8683 * Return an error when checking OCSP signatures when key is NULL. 8684 This fixes a DoS attack. ([CVE-2013-0166]) 8685 8686 *Steve Henson* 8687 8688 * Call OCSP Stapling callback after ciphersuite has been chosen, so 8689 the right response is stapled. Also change SSL_get_certificate() 8690 so it returns the certificate actually sent. 8691 See <http://rt.openssl.org/Ticket/Display.html?id=2836>. 8692 (This is a backport) 8693 8694 *Rob Stradling <rob.stradling@comodo.com>* 8695 8696 * Fix possible deadlock when decoding public keys. 8697 8698 *Steve Henson* 8699 8700### Changes between 1.0.0i and 1.0.0j [10 May 2012] 8701 8702[NB: OpenSSL 1.0.0i and later 1.0.0 patch levels were released after 8703OpenSSL 1.0.1.] 8704 8705 * Sanity check record length before skipping explicit IV in DTLS 8706 to fix DoS attack. 8707 8708 Thanks to Codenomicon for discovering this issue using Fuzz-o-Matic 8709 fuzzing as a service testing platform. 8710 ([CVE-2012-2333]) 8711 8712 *Steve Henson* 8713 8714 * Initialise tkeylen properly when encrypting CMS messages. 8715 Thanks to Solar Designer of Openwall for reporting this issue. 8716 8717 *Steve Henson* 8718 8719### Changes between 1.0.0h and 1.0.0i [19 Apr 2012] 8720 8721 * Check for potentially exploitable overflows in asn1_d2i_read_bio 8722 BUF_mem_grow and BUF_mem_grow_clean. Refuse attempts to shrink buffer 8723 in CRYPTO_realloc_clean. 8724 8725 Thanks to Tavis Ormandy, Google Security Team, for discovering this 8726 issue and to Adam Langley <agl@chromium.org> for fixing it. 8727 ([CVE-2012-2110]) 8728 8729 *Adam Langley (Google), Tavis Ormandy, Google Security Team* 8730 8731### Changes between 1.0.0g and 1.0.0h [12 Mar 2012] 8732 8733 * Fix MMA (Bleichenbacher's attack on PKCS #1 v1.5 RSA padding) weakness 8734 in CMS and PKCS7 code. When RSA decryption fails use a random key for 8735 content decryption and always return the same error. Note: this attack 8736 needs on average 2^20 messages so it only affects automated senders. The 8737 old behaviour can be re-enabled in the CMS code by setting the 8738 CMS_DEBUG_DECRYPT flag: this is useful for debugging and testing where 8739 an MMA defence is not necessary. 8740 Thanks to Ivan Nestlerode <inestlerode@us.ibm.com> for discovering 8741 this issue. ([CVE-2012-0884]) 8742 8743 *Steve Henson* 8744 8745 * Fix CVE-2011-4619: make sure we really are receiving a 8746 client hello before rejecting multiple SGC restarts. Thanks to 8747 Ivan Nestlerode <inestlerode@us.ibm.com> for discovering this bug. 8748 8749 *Steve Henson* 8750 8751### Changes between 1.0.0f and 1.0.0g [18 Jan 2012] 8752 8753 * Fix for DTLS DoS issue introduced by fix for CVE-2011-4109. 8754 Thanks to Antonio Martin, Enterprise Secure Access Research and 8755 Development, Cisco Systems, Inc. for discovering this bug and 8756 preparing a fix. ([CVE-2012-0050]) 8757 8758 *Antonio Martin* 8759 8760### Changes between 1.0.0e and 1.0.0f [4 Jan 2012] 8761 8762 * Nadhem Alfardan and Kenny Paterson have discovered an extension 8763 of the Vaudenay padding oracle attack on CBC mode encryption 8764 which enables an efficient plaintext recovery attack against 8765 the OpenSSL implementation of DTLS. Their attack exploits timing 8766 differences arising during decryption processing. A research 8767 paper describing this attack can be found at: 8768 <http://www.isg.rhul.ac.uk/~kp/dtls.pdf> 8769 Thanks go to Nadhem Alfardan and Kenny Paterson of the Information 8770 Security Group at Royal Holloway, University of London 8771 (www.isg.rhul.ac.uk) for discovering this flaw and to Robin Seggelmann 8772 <seggelmann@fh-muenster.de> and Michael Tuexen <tuexen@fh-muenster.de> 8773 for preparing the fix. ([CVE-2011-4108]) 8774 8775 *Robin Seggelmann, Michael Tuexen* 8776 8777 * Clear bytes used for block padding of SSL 3.0 records. 8778 ([CVE-2011-4576]) 8779 8780 *Adam Langley (Google)* 8781 8782 * Only allow one SGC handshake restart for SSL/TLS. Thanks to George 8783 Kadianakis <desnacked@gmail.com> for discovering this issue and 8784 Adam Langley for preparing the fix. ([CVE-2011-4619]) 8785 8786 *Adam Langley (Google)* 8787 8788 * Check parameters are not NULL in GOST ENGINE. ([CVE-2012-0027]) 8789 8790 *Andrey Kulikov <amdeich@gmail.com>* 8791 8792 * Prevent malformed RFC3779 data triggering an assertion failure. 8793 Thanks to Andrew Chi, BBN Technologies, for discovering the flaw 8794 and Rob Austein <sra@hactrn.net> for fixing it. ([CVE-2011-4577]) 8795 8796 *Rob Austein <sra@hactrn.net>* 8797 8798 * Improved PRNG seeding for VOS. 8799 8800 *Paul Green <Paul.Green@stratus.com>* 8801 8802 * Fix ssl_ciph.c set-up race. 8803 8804 *Adam Langley (Google)* 8805 8806 * Fix spurious failures in ecdsatest.c. 8807 8808 *Emilia Käsper (Google)* 8809 8810 * Fix the BIO_f_buffer() implementation (which was mixing different 8811 interpretations of the `..._len` fields). 8812 8813 *Adam Langley (Google)* 8814 8815 * Fix handling of BN_BLINDING: now BN_BLINDING_invert_ex (rather than 8816 BN_BLINDING_invert_ex) calls BN_BLINDING_update, ensuring that concurrent 8817 threads won't reuse the same blinding coefficients. 8818 8819 This also avoids the need to obtain the CRYPTO_LOCK_RSA_BLINDING 8820 lock to call BN_BLINDING_invert_ex, and avoids one use of 8821 BN_BLINDING_update for each BN_BLINDING structure (previously, 8822 the last update always remained unused). 8823 8824 *Emilia Käsper (Google)* 8825 8826 * In ssl3_clear, preserve s3->init_extra along with s3->rbuf. 8827 8828 *Bob Buckholz (Google)* 8829 8830### Changes between 1.0.0d and 1.0.0e [6 Sep 2011] 8831 8832 * Fix bug where CRLs with nextUpdate in the past are sometimes accepted 8833 by initialising X509_STORE_CTX properly. ([CVE-2011-3207]) 8834 8835 *Kaspar Brand <ossl@velox.ch>* 8836 8837 * Fix SSL memory handling for (EC)DH ciphersuites, in particular 8838 for multi-threaded use of ECDH. ([CVE-2011-3210]) 8839 8840 *Adam Langley (Google)* 8841 8842 * Fix x509_name_ex_d2i memory leak on bad inputs. 8843 8844 *Bodo Moeller* 8845 8846 * Remove hard coded ecdsaWithSHA1 signature tests in ssl code and check 8847 signature public key algorithm by using OID xref utilities instead. 8848 Before this you could only use some ECC ciphersuites with SHA1 only. 8849 8850 *Steve Henson* 8851 8852 * Add protection against ECDSA timing attacks as mentioned in the paper 8853 by Billy Bob Brumley and Nicola Tuveri, see: 8854 <http://eprint.iacr.org/2011/232.pdf> 8855 8856 *Billy Bob Brumley and Nicola Tuveri* 8857 8858### Changes between 1.0.0c and 1.0.0d [8 Feb 2011] 8859 8860 * Fix parsing of OCSP stapling ClientHello extension. CVE-2011-0014 8861 8862 *Neel Mehta, Adam Langley, Bodo Moeller (Google)* 8863 8864 * Fix bug in string printing code: if *any* escaping is enabled we must 8865 escape the escape character (backslash) or the resulting string is 8866 ambiguous. 8867 8868 *Steve Henson* 8869 8870### Changes between 1.0.0b and 1.0.0c [2 Dec 2010] 8871 8872 * Disable code workaround for ancient and obsolete Netscape browsers 8873 and servers: an attacker can use it in a ciphersuite downgrade attack. 8874 Thanks to Martin Rex for discovering this bug. CVE-2010-4180 8875 8876 *Steve Henson* 8877 8878 * Fixed J-PAKE implementation error, originally discovered by 8879 Sebastien Martini, further info and confirmation from Stefan 8880 Arentz and Feng Hao. Note that this fix is a security fix. CVE-2010-4252 8881 8882 *Ben Laurie* 8883 8884### Changes between 1.0.0a and 1.0.0b [16 Nov 2010] 8885 8886 * Fix extension code to avoid race conditions which can result in a buffer 8887 overrun vulnerability: resumed sessions must not be modified as they can 8888 be shared by multiple threads. CVE-2010-3864 8889 8890 *Steve Henson* 8891 8892 * Fix WIN32 build system to correctly link an ENGINE directory into 8893 a DLL. 8894 8895 *Steve Henson* 8896 8897### Changes between 1.0.0 and 1.0.0a [01 Jun 2010] 8898 8899 * Check return value of int_rsa_verify in pkey_rsa_verifyrecover 8900 ([CVE-2010-1633]) 8901 8902 *Steve Henson, Peter-Michael Hager <hager@dortmund.net>* 8903 8904### Changes between 0.9.8n and 1.0.0 [29 Mar 2010] 8905 8906 * Add "missing" function EVP_CIPHER_CTX_copy(). This copies a cipher 8907 context. The operation can be customised via the ctrl mechanism in 8908 case ENGINEs want to include additional functionality. 8909 8910 *Steve Henson* 8911 8912 * Tolerate yet another broken PKCS#8 key format: private key value negative. 8913 8914 *Steve Henson* 8915 8916 * Add new -subject_hash_old and -issuer_hash_old options to x509 utility to 8917 output hashes compatible with older versions of OpenSSL. 8918 8919 *Willy Weisz <weisz@vcpc.univie.ac.at>* 8920 8921 * Fix compression algorithm handling: if resuming a session use the 8922 compression algorithm of the resumed session instead of determining 8923 it from client hello again. Don't allow server to change algorithm. 8924 8925 *Steve Henson* 8926 8927 * Add load_crls() function to commands tidying load_certs() too. Add option 8928 to verify utility to allow additional CRLs to be included. 8929 8930 *Steve Henson* 8931 8932 * Update OCSP request code to permit adding custom headers to the request: 8933 some responders need this. 8934 8935 *Steve Henson* 8936 8937 * The function EVP_PKEY_sign() returns <=0 on error: check return code 8938 correctly. 8939 8940 *Julia Lawall <julia@diku.dk>* 8941 8942 * Update verify callback code in `apps/s_cb.c` and `apps/verify.c`, it 8943 needlessly dereferenced structures, used obsolete functions and 8944 didn't handle all updated verify codes correctly. 8945 8946 *Steve Henson* 8947 8948 * Disable MD2 in the default configuration. 8949 8950 *Steve Henson* 8951 8952 * In BIO_pop() and BIO_push() use the ctrl argument (which was NULL) to 8953 indicate the initial BIO being pushed or popped. This makes it possible 8954 to determine whether the BIO is the one explicitly called or as a result 8955 of the ctrl being passed down the chain. Fix BIO_pop() and SSL BIOs so 8956 it handles reference counts correctly and doesn't zero out the I/O bio 8957 when it is not being explicitly popped. WARNING: applications which 8958 included workarounds for the old buggy behaviour will need to be modified 8959 or they could free up already freed BIOs. 8960 8961 *Steve Henson* 8962 8963 * Extend the uni2asc/asc2uni => OPENSSL_uni2asc/OPENSSL_asc2uni 8964 renaming to all platforms (within the 0.9.8 branch, this was 8965 done conditionally on Netware platforms to avoid a name clash). 8966 8967 *Guenter <lists@gknw.net>* 8968 8969 * Add ECDHE and PSK support to DTLS. 8970 8971 *Michael Tuexen <tuexen@fh-muenster.de>* 8972 8973 * Add CHECKED_STACK_OF macro to safestack.h, otherwise safestack can't 8974 be used on C++. 8975 8976 *Steve Henson* 8977 8978 * Add "missing" function EVP_MD_flags() (without this the only way to 8979 retrieve a digest flags is by accessing the structure directly. Update 8980 `EVP_MD_do_all*()` and `EVP_CIPHER_do_all*()` to include the name a digest 8981 or cipher is registered as in the "from" argument. Print out all 8982 registered digests in the dgst usage message instead of manually 8983 attempting to work them out. 8984 8985 *Steve Henson* 8986 8987 * If no SSLv2 ciphers are used don't use an SSLv2 compatible client hello: 8988 this allows the use of compression and extensions. Change default cipher 8989 string to remove SSLv2 ciphersuites. This effectively avoids ancient SSLv2 8990 by default unless an application cipher string requests it. 8991 8992 *Steve Henson* 8993 8994 * Alter match criteria in PKCS12_parse(). It used to try to use local 8995 key ids to find matching certificates and keys but some PKCS#12 files 8996 don't follow the (somewhat unwritten) rules and this strategy fails. 8997 Now just gather all certificates together and the first private key 8998 then look for the first certificate that matches the key. 8999 9000 *Steve Henson* 9001 9002 * Support use of registered digest and cipher names for dgst and cipher 9003 commands instead of having to add each one as a special case. So now 9004 you can do: 9005 9006 openssl sha256 foo 9007 9008 as well as: 9009 9010 openssl dgst -sha256 foo 9011 9012 and this works for ENGINE based algorithms too. 9013 9014 *Steve Henson* 9015 9016 * Update Gost ENGINE to support parameter files. 9017 9018 *Victor B. Wagner <vitus@cryptocom.ru>* 9019 9020 * Support GeneralizedTime in ca utility. 9021 9022 *Oliver Martin <oliver@volatilevoid.net>, Steve Henson* 9023 9024 * Enhance the hash format used for certificate directory links. The new 9025 form uses the canonical encoding (meaning equivalent names will work 9026 even if they aren't identical) and uses SHA1 instead of MD5. This form 9027 is incompatible with the older format and as a result c_rehash should 9028 be used to rebuild symbolic links. 9029 9030 *Steve Henson* 9031 9032 * Make PKCS#8 the default write format for private keys, replacing the 9033 traditional format. This form is standardised, more secure and doesn't 9034 include an implicit MD5 dependency. 9035 9036 *Steve Henson* 9037 9038 * Add a $gcc_devteam_warn option to Configure. The idea is that any code 9039 committed to OpenSSL should pass this lot as a minimum. 9040 9041 *Steve Henson* 9042 9043 * Add session ticket override functionality for use by EAP-FAST. 9044 9045 *Jouni Malinen <j@w1.fi>* 9046 9047 * Modify HMAC functions to return a value. Since these can be implemented 9048 in an ENGINE errors can occur. 9049 9050 *Steve Henson* 9051 9052 * Type-checked OBJ_bsearch_ex. 9053 9054 *Ben Laurie* 9055 9056 * Type-checked OBJ_bsearch. Also some constification necessitated 9057 by type-checking. Still to come: TXT_DB, bsearch(?), 9058 OBJ_bsearch_ex, qsort, CRYPTO_EX_DATA, ASN1_VALUE, ASN1_STRING, 9059 CONF_VALUE. 9060 9061 *Ben Laurie* 9062 9063 * New function OPENSSL_gmtime_adj() to add a specific number of days and 9064 seconds to a tm structure directly, instead of going through OS 9065 specific date routines. This avoids any issues with OS routines such 9066 as the year 2038 bug. New `*_adj()` functions for ASN1 time structures 9067 and X509_time_adj_ex() to cover the extended range. The existing 9068 X509_time_adj() is still usable and will no longer have any date issues. 9069 9070 *Steve Henson* 9071 9072 * Delta CRL support. New use deltas option which will attempt to locate 9073 and search any appropriate delta CRLs available. 9074 9075 This work was sponsored by Google. 9076 9077 *Steve Henson* 9078 9079 * Support for CRLs partitioned by reason code. Reorganise CRL processing 9080 code and add additional score elements. Validate alternate CRL paths 9081 as part of the CRL checking and indicate a new error "CRL path validation 9082 error" in this case. Applications wanting additional details can use 9083 the verify callback and check the new "parent" field. If this is not 9084 NULL CRL path validation is taking place. Existing applications won't 9085 see this because it requires extended CRL support which is off by 9086 default. 9087 9088 This work was sponsored by Google. 9089 9090 *Steve Henson* 9091 9092 * Support for freshest CRL extension. 9093 9094 This work was sponsored by Google. 9095 9096 *Steve Henson* 9097 9098 * Initial indirect CRL support. Currently only supported in the CRLs 9099 passed directly and not via lookup. Process certificate issuer 9100 CRL entry extension and lookup CRL entries by bother issuer name 9101 and serial number. Check and process CRL issuer entry in IDP extension. 9102 9103 This work was sponsored by Google. 9104 9105 *Steve Henson* 9106 9107 * Add support for distinct certificate and CRL paths. The CRL issuer 9108 certificate is validated separately in this case. Only enabled if 9109 an extended CRL support flag is set: this flag will enable additional 9110 CRL functionality in future. 9111 9112 This work was sponsored by Google. 9113 9114 *Steve Henson* 9115 9116 * Add support for policy mappings extension. 9117 9118 This work was sponsored by Google. 9119 9120 *Steve Henson* 9121 9122 * Fixes to pathlength constraint, self issued certificate handling, 9123 policy processing to align with RFC3280 and PKITS tests. 9124 9125 This work was sponsored by Google. 9126 9127 *Steve Henson* 9128 9129 * Support for name constraints certificate extension. DN, email, DNS 9130 and URI types are currently supported. 9131 9132 This work was sponsored by Google. 9133 9134 *Steve Henson* 9135 9136 * To cater for systems that provide a pointer-based thread ID rather 9137 than numeric, deprecate the current numeric thread ID mechanism and 9138 replace it with a structure and associated callback type. This 9139 mechanism allows a numeric "hash" to be extracted from a thread ID in 9140 either case, and on platforms where pointers are larger than 'long', 9141 mixing is done to help ensure the numeric 'hash' is usable even if it 9142 can't be guaranteed unique. The default mechanism is to use "&errno" 9143 as a pointer-based thread ID to distinguish between threads. 9144 9145 Applications that want to provide their own thread IDs should now use 9146 CRYPTO_THREADID_set_callback() to register a callback that will call 9147 either CRYPTO_THREADID_set_numeric() or CRYPTO_THREADID_set_pointer(). 9148 9149 Note that ERR_remove_state() is now deprecated, because it is tied 9150 to the assumption that thread IDs are numeric. ERR_remove_state(0) 9151 to free the current thread's error state should be replaced by 9152 ERR_remove_thread_state(NULL). 9153 9154 (This new approach replaces the functions CRYPTO_set_idptr_callback(), 9155 CRYPTO_get_idptr_callback(), and CRYPTO_thread_idptr() that existed in 9156 OpenSSL 0.9.9-dev between June 2006 and August 2008. Also, if an 9157 application was previously providing a numeric thread callback that 9158 was inappropriate for distinguishing threads, then uniqueness might 9159 have been obtained with &errno that happened immediately in the 9160 intermediate development versions of OpenSSL; this is no longer the 9161 case, the numeric thread callback will now override the automatic use 9162 of &errno.) 9163 9164 *Geoff Thorpe, with help from Bodo Moeller* 9165 9166 * Initial support for different CRL issuing certificates. This covers a 9167 simple case where the self issued certificates in the chain exist and 9168 the real CRL issuer is higher in the existing chain. 9169 9170 This work was sponsored by Google. 9171 9172 *Steve Henson* 9173 9174 * Removed effectively defunct crypto/store from the build. 9175 9176 *Ben Laurie* 9177 9178 * Revamp of STACK to provide stronger type-checking. Still to come: 9179 TXT_DB, bsearch(?), OBJ_bsearch, qsort, CRYPTO_EX_DATA, ASN1_VALUE, 9180 ASN1_STRING, CONF_VALUE. 9181 9182 *Ben Laurie* 9183 9184 * Add a new SSL_MODE_RELEASE_BUFFERS mode flag to release unused buffer 9185 RAM on SSL connections. This option can save about 34k per idle SSL. 9186 9187 *Nick Mathewson* 9188 9189 * Revamp of LHASH to provide stronger type-checking. Still to come: 9190 STACK, TXT_DB, bsearch, qsort. 9191 9192 *Ben Laurie* 9193 9194 * Initial support for Cryptographic Message Syntax (aka CMS) based 9195 on RFC3850, RFC3851 and RFC3852. New cms directory and cms utility, 9196 support for data, signedData, compressedData, digestedData and 9197 encryptedData, envelopedData types included. Scripts to check against 9198 RFC4134 examples draft and interop and consistency checks of many 9199 content types and variants. 9200 9201 *Steve Henson* 9202 9203 * Add options to enc utility to support use of zlib compression BIO. 9204 9205 *Steve Henson* 9206 9207 * Extend mk1mf to support importing of options and assembly language 9208 files from Configure script, currently only included in VC-WIN32. 9209 The assembly language rules can now optionally generate the source 9210 files from the associated perl scripts. 9211 9212 *Steve Henson* 9213 9214 * Implement remaining functionality needed to support GOST ciphersuites. 9215 Interop testing has been performed using CryptoPro implementations. 9216 9217 *Victor B. Wagner <vitus@cryptocom.ru>* 9218 9219 * s390x assembler pack. 9220 9221 *Andy Polyakov* 9222 9223 * ARMv4 assembler pack. ARMv4 refers to v4 and later ISA, not CPU 9224 "family." 9225 9226 *Andy Polyakov* 9227 9228 * Implement Opaque PRF Input TLS extension as specified in 9229 draft-rescorla-tls-opaque-prf-input-00.txt. Since this is not an 9230 official specification yet and no extension type assignment by 9231 IANA exists, this extension (for now) will have to be explicitly 9232 enabled when building OpenSSL by providing the extension number 9233 to use. For example, specify an option 9234 9235 -DTLSEXT_TYPE_opaque_prf_input=0x9527 9236 9237 to the "config" or "Configure" script to enable the extension, 9238 assuming extension number 0x9527 (which is a completely arbitrary 9239 and unofficial assignment based on the MD5 hash of the Internet 9240 Draft). Note that by doing so, you potentially lose 9241 interoperability with other TLS implementations since these might 9242 be using the same extension number for other purposes. 9243 9244 SSL_set_tlsext_opaque_prf_input(ssl, src, len) is used to set the 9245 opaque PRF input value to use in the handshake. This will create 9246 an internal copy of the length-'len' string at 'src', and will 9247 return non-zero for success. 9248 9249 To get more control and flexibility, provide a callback function 9250 by using 9251 9252 SSL_CTX_set_tlsext_opaque_prf_input_callback(ctx, cb) 9253 SSL_CTX_set_tlsext_opaque_prf_input_callback_arg(ctx, arg) 9254 9255 where 9256 9257 int (*cb)(SSL *, void *peerinput, size_t len, void *arg); 9258 void *arg; 9259 9260 Callback function 'cb' will be called in handshakes, and is 9261 expected to use SSL_set_tlsext_opaque_prf_input() as appropriate. 9262 Argument 'arg' is for application purposes (the value as given to 9263 SSL_CTX_set_tlsext_opaque_prf_input_callback_arg() will directly 9264 be provided to the callback function). The callback function 9265 has to return non-zero to report success: usually 1 to use opaque 9266 PRF input just if possible, or 2 to enforce use of the opaque PRF 9267 input. In the latter case, the library will abort the handshake 9268 if opaque PRF input is not successfully negotiated. 9269 9270 Arguments 'peerinput' and 'len' given to the callback function 9271 will always be NULL and 0 in the case of a client. A server will 9272 see the client's opaque PRF input through these variables if 9273 available (NULL and 0 otherwise). Note that if the server 9274 provides an opaque PRF input, the length must be the same as the 9275 length of the client's opaque PRF input. 9276 9277 Note that the callback function will only be called when creating 9278 a new session (session resumption can resume whatever was 9279 previously negotiated), and will not be called in SSL 2.0 9280 handshakes; thus, SSL_CTX_set_options(ctx, SSL_OP_NO_SSLv2) or 9281 SSL_set_options(ssl, SSL_OP_NO_SSLv2) is especially recommended 9282 for applications that need to enforce opaque PRF input. 9283 9284 *Bodo Moeller* 9285 9286 * Update ssl code to support digests other than SHA1+MD5 for handshake 9287 MAC. 9288 9289 *Victor B. Wagner <vitus@cryptocom.ru>* 9290 9291 * Add RFC4507 support to OpenSSL. This includes the corrections in 9292 RFC4507bis. The encrypted ticket format is an encrypted encoded 9293 SSL_SESSION structure, that way new session features are automatically 9294 supported. 9295 9296 If a client application caches session in an SSL_SESSION structure 9297 support is transparent because tickets are now stored in the encoded 9298 SSL_SESSION. 9299 9300 The SSL_CTX structure automatically generates keys for ticket 9301 protection in servers so again support should be possible 9302 with no application modification. 9303 9304 If a client or server wishes to disable RFC4507 support then the option 9305 SSL_OP_NO_TICKET can be set. 9306 9307 Add a TLS extension debugging callback to allow the contents of any client 9308 or server extensions to be examined. 9309 9310 This work was sponsored by Google. 9311 9312 *Steve Henson* 9313 9314 * Final changes to avoid use of pointer pointer casts in OpenSSL. 9315 OpenSSL should now compile cleanly on gcc 4.2 9316 9317 *Peter Hartley <pdh@utter.chaos.org.uk>, Steve Henson* 9318 9319 * Update SSL library to use new EVP_PKEY MAC API. Include generic MAC 9320 support including streaming MAC support: this is required for GOST 9321 ciphersuite support. 9322 9323 *Victor B. Wagner <vitus@cryptocom.ru>, Steve Henson* 9324 9325 * Add option -stream to use PKCS#7 streaming in smime utility. New 9326 function i2d_PKCS7_bio_stream() and PEM_write_PKCS7_bio_stream() 9327 to output in BER and PEM format. 9328 9329 *Steve Henson* 9330 9331 * Experimental support for use of HMAC via EVP_PKEY interface. This 9332 allows HMAC to be handled via the `EVP_DigestSign*()` interface. The 9333 EVP_PKEY "key" in this case is the HMAC key, potentially allowing 9334 ENGINE support for HMAC keys which are unextractable. New -mac and 9335 -macopt options to dgst utility. 9336 9337 *Steve Henson* 9338 9339 * New option -sigopt to dgst utility. Update dgst to use 9340 `EVP_Digest{Sign,Verify}*`. These two changes make it possible to use 9341 alternative signing parameters such as X9.31 or PSS in the dgst 9342 utility. 9343 9344 *Steve Henson* 9345 9346 * Change ssl_cipher_apply_rule(), the internal function that does 9347 the work each time a ciphersuite string requests enabling 9348 ("foo+bar"), moving ("+foo+bar"), disabling ("-foo+bar", or 9349 removing ("!foo+bar") a class of ciphersuites: Now it maintains 9350 the order of disabled ciphersuites such that those ciphersuites 9351 that most recently went from enabled to disabled not only stay 9352 in order with respect to each other, but also have higher priority 9353 than other disabled ciphersuites the next time ciphersuites are 9354 enabled again. 9355 9356 This means that you can now say, e.g., "PSK:-PSK:HIGH" to enable 9357 the same ciphersuites as with "HIGH" alone, but in a specific 9358 order where the PSK ciphersuites come first (since they are the 9359 most recently disabled ciphersuites when "HIGH" is parsed). 9360 9361 Also, change ssl_create_cipher_list() (using this new 9362 functionality) such that between otherwise identical 9363 ciphersuites, ephemeral ECDH is preferred over ephemeral DH in 9364 the default order. 9365 9366 *Bodo Moeller* 9367 9368 * Change ssl_create_cipher_list() so that it automatically 9369 arranges the ciphersuites in reasonable order before starting 9370 to process the rule string. Thus, the definition for "DEFAULT" 9371 (SSL_DEFAULT_CIPHER_LIST) now is just "ALL:!aNULL:!eNULL", but 9372 remains equivalent to `"AES:ALL:!aNULL:!eNULL:+aECDH:+kRSA:+RC4:@STRENGTH"`. 9373 This makes it much easier to arrive at a reasonable default order 9374 in applications for which anonymous ciphers are OK (meaning 9375 that you can't actually use DEFAULT). 9376 9377 *Bodo Moeller; suggested by Victor Duchovni* 9378 9379 * Split the SSL/TLS algorithm mask (as used for ciphersuite string 9380 processing) into multiple integers instead of setting 9381 "SSL_MKEY_MASK" bits, "SSL_AUTH_MASK" bits, "SSL_ENC_MASK", 9382 "SSL_MAC_MASK", and "SSL_SSL_MASK" bits all in a single integer. 9383 (These masks as well as the individual bit definitions are hidden 9384 away into the non-exported interface ssl/ssl_locl.h, so this 9385 change to the definition of the SSL_CIPHER structure shouldn't 9386 affect applications.) This give us more bits for each of these 9387 categories, so there is no longer a need to coagulate AES128 and 9388 AES256 into a single algorithm bit, and to coagulate Camellia128 9389 and Camellia256 into a single algorithm bit, which has led to all 9390 kinds of kludges. 9391 9392 Thus, among other things, the kludge introduced in 0.9.7m and 9393 0.9.8e for masking out AES256 independently of AES128 or masking 9394 out Camellia256 independently of AES256 is not needed here in 0.9.9. 9395 9396 With the change, we also introduce new ciphersuite aliases that 9397 so far were missing: "AES128", "AES256", "CAMELLIA128", and 9398 "CAMELLIA256". 9399 9400 *Bodo Moeller* 9401 9402 * Add support for dsa-with-SHA224 and dsa-with-SHA256. 9403 Use the leftmost N bytes of the signature input if the input is 9404 larger than the prime q (with N being the size in bytes of q). 9405 9406 *Nils Larsch* 9407 9408 * Very *very* experimental PKCS#7 streaming encoder support. Nothing uses 9409 it yet and it is largely untested. 9410 9411 *Steve Henson* 9412 9413 * Add support for the ecdsa-with-SHA224/256/384/512 signature types. 9414 9415 *Nils Larsch* 9416 9417 * Initial incomplete changes to avoid need for function casts in OpenSSL 9418 some compilers (gcc 4.2 and later) reject their use. Safestack is 9419 reimplemented. Update ASN1 to avoid use of legacy functions. 9420 9421 *Steve Henson* 9422 9423 * Win32/64 targets are linked with Winsock2. 9424 9425 *Andy Polyakov* 9426 9427 * Add an X509_CRL_METHOD structure to allow CRL processing to be redirected 9428 to external functions. This can be used to increase CRL handling 9429 efficiency especially when CRLs are very large by (for example) storing 9430 the CRL revoked certificates in a database. 9431 9432 *Steve Henson* 9433 9434 * Overhaul of by_dir code. Add support for dynamic loading of CRLs so 9435 new CRLs added to a directory can be used. New command line option 9436 -verify_return_error to s_client and s_server. This causes real errors 9437 to be returned by the verify callback instead of carrying on no matter 9438 what. This reflects the way a "real world" verify callback would behave. 9439 9440 *Steve Henson* 9441 9442 * GOST engine, supporting several GOST algorithms and public key formats. 9443 Kindly donated by Cryptocom. 9444 9445 *Cryptocom* 9446 9447 * Partial support for Issuing Distribution Point CRL extension. CRLs 9448 partitioned by DP are handled but no indirect CRL or reason partitioning 9449 (yet). Complete overhaul of CRL handling: now the most suitable CRL is 9450 selected via a scoring technique which handles IDP and AKID in CRLs. 9451 9452 *Steve Henson* 9453 9454 * New X509_STORE_CTX callbacks lookup_crls() and lookup_certs() which 9455 will ultimately be used for all verify operations: this will remove the 9456 X509_STORE dependency on certificate verification and allow alternative 9457 lookup methods. X509_STORE based implementations of these two callbacks. 9458 9459 *Steve Henson* 9460 9461 * Allow multiple CRLs to exist in an X509_STORE with matching issuer names. 9462 Modify get_crl() to find a valid (unexpired) CRL if possible. 9463 9464 *Steve Henson* 9465 9466 * New function X509_CRL_match() to check if two CRLs are identical. Normally 9467 this would be called X509_CRL_cmp() but that name is already used by 9468 a function that just compares CRL issuer names. Cache several CRL 9469 extensions in X509_CRL structure and cache CRLDP in X509. 9470 9471 *Steve Henson* 9472 9473 * Store a "canonical" representation of X509_NAME structure (ASN1 Name) 9474 this maps equivalent X509_NAME structures into a consistent structure. 9475 Name comparison can then be performed rapidly using memcmp(). 9476 9477 *Steve Henson* 9478 9479 * Non-blocking OCSP request processing. Add -timeout option to ocsp 9480 utility. 9481 9482 *Steve Henson* 9483 9484 * Allow digests to supply their own micalg string for S/MIME type using 9485 the ctrl EVP_MD_CTRL_MICALG. 9486 9487 *Steve Henson* 9488 9489 * During PKCS7 signing pass the PKCS7 SignerInfo structure to the 9490 EVP_PKEY_METHOD before and after signing via the EVP_PKEY_CTRL_PKCS7_SIGN 9491 ctrl. It can then customise the structure before and/or after signing 9492 if necessary. 9493 9494 *Steve Henson* 9495 9496 * New function OBJ_add_sigid() to allow application defined signature OIDs 9497 to be added to OpenSSLs internal tables. New function OBJ_sigid_free() 9498 to free up any added signature OIDs. 9499 9500 *Steve Henson* 9501 9502 * New functions EVP_CIPHER_do_all(), EVP_CIPHER_do_all_sorted(), 9503 EVP_MD_do_all() and EVP_MD_do_all_sorted() to enumerate internal 9504 digest and cipher tables. New options added to openssl utility: 9505 list-message-digest-algorithms and list-cipher-algorithms. 9506 9507 *Steve Henson* 9508 9509 * Change the array representation of binary polynomials: the list 9510 of degrees of non-zero coefficients is now terminated with -1. 9511 Previously it was terminated with 0, which was also part of the 9512 value; thus, the array representation was not applicable to 9513 polynomials where t^0 has coefficient zero. This change makes 9514 the array representation useful in a more general context. 9515 9516 *Douglas Stebila* 9517 9518 * Various modifications and fixes to SSL/TLS cipher string 9519 handling. For ECC, the code now distinguishes between fixed ECDH 9520 with RSA certificates on the one hand and with ECDSA certificates 9521 on the other hand, since these are separate ciphersuites. The 9522 unused code for Fortezza ciphersuites has been removed. 9523 9524 For consistency with EDH, ephemeral ECDH is now called "EECDH" 9525 (not "ECDHE"). For consistency with the code for DH 9526 certificates, use of ECDH certificates is now considered ECDH 9527 authentication, not RSA or ECDSA authentication (the latter is 9528 merely the CA's signing algorithm and not actively used in the 9529 protocol). 9530 9531 The temporary ciphersuite alias "ECCdraft" is no longer 9532 available, and ECC ciphersuites are no longer excluded from "ALL" 9533 and "DEFAULT". The following aliases now exist for RFC 4492 9534 ciphersuites, most of these by analogy with the DH case: 9535 9536 kECDHr - ECDH cert, signed with RSA 9537 kECDHe - ECDH cert, signed with ECDSA 9538 kECDH - ECDH cert (signed with either RSA or ECDSA) 9539 kEECDH - ephemeral ECDH 9540 ECDH - ECDH cert or ephemeral ECDH 9541 9542 aECDH - ECDH cert 9543 aECDSA - ECDSA cert 9544 ECDSA - ECDSA cert 9545 9546 AECDH - anonymous ECDH 9547 EECDH - non-anonymous ephemeral ECDH (equivalent to "kEECDH:-AECDH") 9548 9549 *Bodo Moeller* 9550 9551 * Add additional S/MIME capabilities for AES and GOST ciphers if supported. 9552 Use correct micalg parameters depending on digest(s) in signed message. 9553 9554 *Steve Henson* 9555 9556 * Add engine support for EVP_PKEY_ASN1_METHOD. Add functions to process 9557 an ENGINE asn1 method. Support ENGINE lookups in the ASN1 code. 9558 9559 *Steve Henson* 9560 9561 * Initial engine support for EVP_PKEY_METHOD. New functions to permit 9562 an engine to register a method. Add ENGINE lookups for methods and 9563 functional reference processing. 9564 9565 *Steve Henson* 9566 9567 * New functions `EVP_Digest{Sign,Verify)*`. These are enhanced versions of 9568 `EVP_{Sign,Verify}*` which allow an application to customise the signature 9569 process. 9570 9571 *Steve Henson* 9572 9573 * New -resign option to smime utility. This adds one or more signers 9574 to an existing PKCS#7 signedData structure. Also -md option to use an 9575 alternative message digest algorithm for signing. 9576 9577 *Steve Henson* 9578 9579 * Tidy up PKCS#7 routines and add new functions to make it easier to 9580 create PKCS7 structures containing multiple signers. Update smime 9581 application to support multiple signers. 9582 9583 *Steve Henson* 9584 9585 * New -macalg option to pkcs12 utility to allow setting of an alternative 9586 digest MAC. 9587 9588 *Steve Henson* 9589 9590 * Initial support for PKCS#5 v2.0 PRFs other than default SHA1 HMAC. 9591 Reorganize PBE internals to lookup from a static table using NIDs, 9592 add support for HMAC PBE OID translation. Add a EVP_CIPHER ctrl: 9593 EVP_CTRL_PBE_PRF_NID this allows a cipher to specify an alternative 9594 PRF which will be automatically used with PBES2. 9595 9596 *Steve Henson* 9597 9598 * Replace the algorithm specific calls to generate keys in "req" with the 9599 new API. 9600 9601 *Steve Henson* 9602 9603 * Update PKCS#7 enveloped data routines to use new API. This is now 9604 supported by any public key method supporting the encrypt operation. A 9605 ctrl is added to allow the public key algorithm to examine or modify 9606 the PKCS#7 RecipientInfo structure if it needs to: for RSA this is 9607 a no op. 9608 9609 *Steve Henson* 9610 9611 * Add a ctrl to asn1 method to allow a public key algorithm to express 9612 a default digest type to use. In most cases this will be SHA1 but some 9613 algorithms (such as GOST) need to specify an alternative digest. The 9614 return value indicates how strong the preference is 1 means optional and 9615 2 is mandatory (that is it is the only supported type). Modify 9616 ASN1_item_sign() to accept a NULL digest argument to indicate it should 9617 use the default md. Update openssl utilities to use the default digest 9618 type for signing if it is not explicitly indicated. 9619 9620 *Steve Henson* 9621 9622 * Use OID cross reference table in ASN1_sign() and ASN1_verify(). New 9623 EVP_MD flag EVP_MD_FLAG_PKEY_METHOD_SIGNATURE. This uses the relevant 9624 signing method from the key type. This effectively removes the link 9625 between digests and public key types. 9626 9627 *Steve Henson* 9628 9629 * Add an OID cross reference table and utility functions. Its purpose is to 9630 translate between signature OIDs such as SHA1WithrsaEncryption and SHA1, 9631 rsaEncryption. This will allow some of the algorithm specific hackery 9632 needed to use the correct OID to be removed. 9633 9634 *Steve Henson* 9635 9636 * Remove algorithm specific dependencies when setting PKCS7_SIGNER_INFO 9637 structures for PKCS7_sign(). They are now set up by the relevant public 9638 key ASN1 method. 9639 9640 *Steve Henson* 9641 9642 * Add provisional EC pkey method with support for ECDSA and ECDH. 9643 9644 *Steve Henson* 9645 9646 * Add support for key derivation (agreement) in the API, DH method and 9647 pkeyutl. 9648 9649 *Steve Henson* 9650 9651 * Add DSA pkey method and DH pkey methods, extend DH ASN1 method to support 9652 public and private key formats. As a side effect these add additional 9653 command line functionality not previously available: DSA signatures can be 9654 generated and verified using pkeyutl and DH key support and generation in 9655 pkey, genpkey. 9656 9657 *Steve Henson* 9658 9659 * BeOS support. 9660 9661 *Oliver Tappe <zooey@hirschkaefer.de>* 9662 9663 * New make target "install_html_docs" installs HTML renditions of the 9664 manual pages. 9665 9666 *Oliver Tappe <zooey@hirschkaefer.de>* 9667 9668 * New utility "genpkey" this is analogous to "genrsa" etc except it can 9669 generate keys for any algorithm. Extend and update EVP_PKEY_METHOD to 9670 support key and parameter generation and add initial key generation 9671 functionality for RSA. 9672 9673 *Steve Henson* 9674 9675 * Add functions for main EVP_PKEY_method operations. The undocumented 9676 functions `EVP_PKEY_{encrypt,decrypt}` have been renamed to 9677 `EVP_PKEY_{encrypt,decrypt}_old`. 9678 9679 *Steve Henson* 9680 9681 * Initial definitions for EVP_PKEY_METHOD. This will be a high level public 9682 key API, doesn't do much yet. 9683 9684 *Steve Henson* 9685 9686 * New function EVP_PKEY_asn1_get0_info() to retrieve information about 9687 public key algorithms. New option to openssl utility: 9688 "list-public-key-algorithms" to print out info. 9689 9690 *Steve Henson* 9691 9692 * Implement the Supported Elliptic Curves Extension for 9693 ECC ciphersuites from draft-ietf-tls-ecc-12.txt. 9694 9695 *Douglas Stebila* 9696 9697 * Don't free up OIDs in OBJ_cleanup() if they are in use by EVP_MD or 9698 EVP_CIPHER structures to avoid later problems in EVP_cleanup(). 9699 9700 *Steve Henson* 9701 9702 * New utilities pkey and pkeyparam. These are similar to algorithm specific 9703 utilities such as rsa, dsa, dsaparam etc except they process any key 9704 type. 9705 9706 *Steve Henson* 9707 9708 * Transfer public key printing routines to EVP_PKEY_ASN1_METHOD. New 9709 functions EVP_PKEY_print_public(), EVP_PKEY_print_private(), 9710 EVP_PKEY_print_param() to print public key data from an EVP_PKEY 9711 structure. 9712 9713 *Steve Henson* 9714 9715 * Initial support for pluggable public key ASN1. 9716 De-spaghettify the public key ASN1 handling. Move public and private 9717 key ASN1 handling to a new EVP_PKEY_ASN1_METHOD structure. Relocate 9718 algorithm specific handling to a single module within the relevant 9719 algorithm directory. Add functions to allow (near) opaque processing 9720 of public and private key structures. 9721 9722 *Steve Henson* 9723 9724 * Implement the Supported Point Formats Extension for 9725 ECC ciphersuites from draft-ietf-tls-ecc-12.txt. 9726 9727 *Douglas Stebila* 9728 9729 * Add initial support for RFC 4279 PSK TLS ciphersuites. Add members 9730 for the psk identity [hint] and the psk callback functions to the 9731 SSL_SESSION, SSL and SSL_CTX structure. 9732 9733 New ciphersuites: 9734 PSK-RC4-SHA, PSK-3DES-EDE-CBC-SHA, PSK-AES128-CBC-SHA, 9735 PSK-AES256-CBC-SHA 9736 9737 New functions: 9738 SSL_CTX_use_psk_identity_hint 9739 SSL_get_psk_identity_hint 9740 SSL_get_psk_identity 9741 SSL_use_psk_identity_hint 9742 9743 *Mika Kousa and Pasi Eronen of Nokia Corporation* 9744 9745 * Add RFC 3161 compliant time stamp request creation, response generation 9746 and response verification functionality. 9747 9748 *Zoltán Glózik <zglozik@opentsa.org>, The OpenTSA Project* 9749 9750 * Add initial support for TLS extensions, specifically for the server_name 9751 extension so far. The SSL_SESSION, SSL_CTX, and SSL data structures now 9752 have new members for a host name. The SSL data structure has an 9753 additional member `SSL_CTX *initial_ctx` so that new sessions can be 9754 stored in that context to allow for session resumption, even after the 9755 SSL has been switched to a new SSL_CTX in reaction to a client's 9756 server_name extension. 9757 9758 New functions (subject to change): 9759 9760 SSL_get_servername() 9761 SSL_get_servername_type() 9762 SSL_set_SSL_CTX() 9763 9764 New CTRL codes and macros (subject to change): 9765 9766 SSL_CTRL_SET_TLSEXT_SERVERNAME_CB 9767 - SSL_CTX_set_tlsext_servername_callback() 9768 SSL_CTRL_SET_TLSEXT_SERVERNAME_ARG 9769 - SSL_CTX_set_tlsext_servername_arg() 9770 SSL_CTRL_SET_TLSEXT_HOSTNAME - SSL_set_tlsext_host_name() 9771 9772 openssl s_client has a new '-servername ...' option. 9773 9774 openssl s_server has new options '-servername_host ...', '-cert2 ...', 9775 '-key2 ...', '-servername_fatal' (subject to change). This allows 9776 testing the HostName extension for a specific single host name ('-cert' 9777 and '-key' remain fallbacks for handshakes without HostName 9778 negotiation). If the unrecognized_name alert has to be sent, this by 9779 default is a warning; it becomes fatal with the '-servername_fatal' 9780 option. 9781 9782 *Peter Sylvester, Remy Allais, Christophe Renou* 9783 9784 * Whirlpool hash implementation is added. 9785 9786 *Andy Polyakov* 9787 9788 * BIGNUM code on 64-bit SPARCv9 targets is switched from bn(64,64) to 9789 bn(64,32). Because of instruction set limitations it doesn't have 9790 any negative impact on performance. This was done mostly in order 9791 to make it possible to share assembler modules, such as bn_mul_mont 9792 implementations, between 32- and 64-bit builds without hassle. 9793 9794 *Andy Polyakov* 9795 9796 * Move code previously exiled into file crypto/ec/ec2_smpt.c 9797 to ec2_smpl.c, and no longer require the OPENSSL_EC_BIN_PT_COMP 9798 macro. 9799 9800 *Bodo Moeller* 9801 9802 * New candidate for BIGNUM assembler implementation, bn_mul_mont, 9803 dedicated Montgomery multiplication procedure, is introduced. 9804 BN_MONT_CTX is modified to allow bn_mul_mont to reach for higher 9805 "64-bit" performance on certain 32-bit targets. 9806 9807 *Andy Polyakov* 9808 9809 * New option SSL_OP_NO_COMP to disable use of compression selectively 9810 in SSL structures. New SSL ctrl to set maximum send fragment size. 9811 Save memory by setting the I/O buffer sizes dynamically instead of 9812 using the maximum available value. 9813 9814 *Steve Henson* 9815 9816 * New option -V for 'openssl ciphers'. This prints the ciphersuite code 9817 in addition to the text details. 9818 9819 *Bodo Moeller* 9820 9821 * Very, very preliminary EXPERIMENTAL support for printing of general 9822 ASN1 structures. This currently produces rather ugly output and doesn't 9823 handle several customised structures at all. 9824 9825 *Steve Henson* 9826 9827 * Integrated support for PVK file format and some related formats such 9828 as MS PUBLICKEYBLOB and PRIVATEKEYBLOB. Command line switches to support 9829 these in the 'rsa' and 'dsa' utilities. 9830 9831 *Steve Henson* 9832 9833 * Support for PKCS#1 RSAPublicKey format on rsa utility command line. 9834 9835 *Steve Henson* 9836 9837 * Remove the ancient ASN1_METHOD code. This was only ever used in one 9838 place for the (very old) "NETSCAPE" format certificates which are now 9839 handled using new ASN1 code equivalents. 9840 9841 *Steve Henson* 9842 9843 * Let the TLSv1_method() etc. functions return a 'const' SSL_METHOD 9844 pointer and make the SSL_METHOD parameter in SSL_CTX_new, 9845 SSL_CTX_set_ssl_version and SSL_set_ssl_method 'const'. 9846 9847 *Nils Larsch* 9848 9849 * Modify CRL distribution points extension code to print out previously 9850 unsupported fields. Enhance extension setting code to allow setting of 9851 all fields. 9852 9853 *Steve Henson* 9854 9855 * Add print and set support for Issuing Distribution Point CRL extension. 9856 9857 *Steve Henson* 9858 9859 * Change 'Configure' script to enable Camellia by default. 9860 9861 *NTT* 9862 9863OpenSSL 0.9.x 9864------------- 9865 9866### Changes between 0.9.8m and 0.9.8n [24 Mar 2010] 9867 9868 * When rejecting SSL/TLS records due to an incorrect version number, never 9869 update s->server with a new major version number. As of 9870 - OpenSSL 0.9.8m if 'short' is a 16-bit type, 9871 - OpenSSL 0.9.8f if 'short' is longer than 16 bits, 9872 the previous behavior could result in a read attempt at NULL when 9873 receiving specific incorrect SSL/TLS records once record payload 9874 protection is active. ([CVE-2010-0740]) 9875 9876 *Bodo Moeller, Adam Langley <agl@chromium.org>* 9877 9878 * Fix for CVE-2010-0433 where some kerberos enabled versions of OpenSSL 9879 could be crashed if the relevant tables were not present (e.g. chrooted). 9880 9881 *Tomas Hoger <thoger@redhat.com>* 9882 9883### Changes between 0.9.8l and 0.9.8m [25 Feb 2010] 9884 9885 * Always check bn_wexpand() return values for failure. ([CVE-2009-3245]) 9886 9887 *Martin Olsson, Neel Mehta* 9888 9889 * Fix X509_STORE locking: Every 'objs' access requires a lock (to 9890 accommodate for stack sorting, always a write lock!). 9891 9892 *Bodo Moeller* 9893 9894 * On some versions of WIN32 Heap32Next is very slow. This can cause 9895 excessive delays in the RAND_poll(): over a minute. As a workaround 9896 include a time check in the inner Heap32Next loop too. 9897 9898 *Steve Henson* 9899 9900 * The code that handled flushing of data in SSL/TLS originally used the 9901 BIO_CTRL_INFO ctrl to see if any data was pending first. This caused 9902 the problem outlined in PR#1949. The fix suggested there however can 9903 trigger problems with buggy BIO_CTRL_WPENDING (e.g. some versions 9904 of Apache). So instead simplify the code to flush unconditionally. 9905 This should be fine since flushing with no data to flush is a no op. 9906 9907 *Steve Henson* 9908 9909 * Handle TLS versions 2.0 and later properly and correctly use the 9910 highest version of TLS/SSL supported. Although TLS >= 2.0 is some way 9911 off ancient servers have a habit of sticking around for a while... 9912 9913 *Steve Henson* 9914 9915 * Modify compression code so it frees up structures without using the 9916 ex_data callbacks. This works around a problem where some applications 9917 call CRYPTO_cleanup_all_ex_data() before application exit (e.g. when 9918 restarting) then use compression (e.g. SSL with compression) later. 9919 This results in significant per-connection memory leaks and 9920 has caused some security issues including CVE-2008-1678 and 9921 CVE-2009-4355. 9922 9923 *Steve Henson* 9924 9925 * Constify crypto/cast (i.e., <openssl/cast.h>): a CAST_KEY doesn't 9926 change when encrypting or decrypting. 9927 9928 *Bodo Moeller* 9929 9930 * Add option SSL_OP_LEGACY_SERVER_CONNECT which will allow clients to 9931 connect and renegotiate with servers which do not support RI. 9932 Until RI is more widely deployed this option is enabled by default. 9933 9934 *Steve Henson* 9935 9936 * Add "missing" ssl ctrls to clear options and mode. 9937 9938 *Steve Henson* 9939 9940 * If client attempts to renegotiate and doesn't support RI respond with 9941 a no_renegotiation alert as required by RFC5746. Some renegotiating 9942 TLS clients will continue a connection gracefully when they receive 9943 the alert. Unfortunately OpenSSL mishandled this alert and would hang 9944 waiting for a server hello which it will never receive. Now we treat a 9945 received no_renegotiation alert as a fatal error. This is because 9946 applications requesting a renegotiation might well expect it to succeed 9947 and would have no code in place to handle the server denying it so the 9948 only safe thing to do is to terminate the connection. 9949 9950 *Steve Henson* 9951 9952 * Add ctrl macro SSL_get_secure_renegotiation_support() which returns 1 if 9953 peer supports secure renegotiation and 0 otherwise. Print out peer 9954 renegotiation support in s_client/s_server. 9955 9956 *Steve Henson* 9957 9958 * Replace the highly broken and deprecated SPKAC certification method with 9959 the updated NID creation version. This should correctly handle UTF8. 9960 9961 *Steve Henson* 9962 9963 * Implement RFC5746. Re-enable renegotiation but require the extension 9964 as needed. Unfortunately, SSL3_FLAGS_ALLOW_UNSAFE_LEGACY_RENEGOTIATION 9965 turns out to be a bad idea. It has been replaced by 9966 SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION which can be set with 9967 SSL_CTX_set_options(). This is really not recommended unless you 9968 know what you are doing. 9969 9970 *Eric Rescorla <ekr@networkresonance.com>, Ben Laurie, Steve Henson* 9971 9972 * Fixes to stateless session resumption handling. Use initial_ctx when 9973 issuing and attempting to decrypt tickets in case it has changed during 9974 servername handling. Use a non-zero length session ID when attempting 9975 stateless session resumption: this makes it possible to determine if 9976 a resumption has occurred immediately after receiving server hello 9977 (several places in OpenSSL subtly assume this) instead of later in 9978 the handshake. 9979 9980 *Steve Henson* 9981 9982 * The functions ENGINE_ctrl(), OPENSSL_isservice(), 9983 CMS_get1_RecipientRequest() and RAND_bytes() can return <=0 on error 9984 fixes for a few places where the return code is not checked 9985 correctly. 9986 9987 *Julia Lawall <julia@diku.dk>* 9988 9989 * Add --strict-warnings option to Configure script to include devteam 9990 warnings in other configurations. 9991 9992 *Steve Henson* 9993 9994 * Add support for --libdir option and LIBDIR variable in makefiles. This 9995 makes it possible to install openssl libraries in locations which 9996 have names other than "lib", for example "/usr/lib64" which some 9997 systems need. 9998 9999 *Steve Henson, based on patch from Jeremy Utley* 10000 10001 * Don't allow the use of leading 0x80 in OIDs. This is a violation of 10002 X690 8.9.12 and can produce some misleading textual output of OIDs. 10003 10004 *Steve Henson, reported by Dan Kaminsky* 10005 10006 * Delete MD2 from algorithm tables. This follows the recommendation in 10007 several standards that it is not used in new applications due to 10008 several cryptographic weaknesses. For binary compatibility reasons 10009 the MD2 API is still compiled in by default. 10010 10011 *Steve Henson* 10012 10013 * Add compression id to {d2i,i2d}_SSL_SESSION so it is correctly saved 10014 and restored. 10015 10016 *Steve Henson* 10017 10018 * Rename uni2asc and asc2uni functions to OPENSSL_uni2asc and 10019 OPENSSL_asc2uni conditionally on Netware platforms to avoid a name 10020 clash. 10021 10022 *Guenter <lists@gknw.net>* 10023 10024 * Fix the server certificate chain building code to use X509_verify_cert(), 10025 it used to have an ad-hoc builder which was unable to cope with anything 10026 other than a simple chain. 10027 10028 *David Woodhouse <dwmw2@infradead.org>, Steve Henson* 10029 10030 * Don't check self signed certificate signatures in X509_verify_cert() 10031 by default (a flag can override this): it just wastes time without 10032 adding any security. As a useful side effect self signed root CAs 10033 with non-FIPS digests are now usable in FIPS mode. 10034 10035 *Steve Henson* 10036 10037 * In dtls1_process_out_of_seq_message() the check if the current message 10038 is already buffered was missing. For every new message was memory 10039 allocated, allowing an attacker to perform an denial of service attack 10040 with sending out of seq handshake messages until there is no memory 10041 left. Additionally every future message was buffered, even if the 10042 sequence number made no sense and would be part of another handshake. 10043 So only messages with sequence numbers less than 10 in advance will be 10044 buffered. ([CVE-2009-1378]) 10045 10046 *Robin Seggelmann, discovered by Daniel Mentz* 10047 10048 * Records are buffered if they arrive with a future epoch to be 10049 processed after finishing the corresponding handshake. There is 10050 currently no limitation to this buffer allowing an attacker to perform 10051 a DOS attack with sending records with future epochs until there is no 10052 memory left. This patch adds the pqueue_size() function to determine 10053 the size of a buffer and limits the record buffer to 100 entries. 10054 ([CVE-2009-1377]) 10055 10056 *Robin Seggelmann, discovered by Daniel Mentz* 10057 10058 * Keep a copy of frag->msg_header.frag_len so it can be used after the 10059 parent structure is freed. ([CVE-2009-1379]) 10060 10061 *Daniel Mentz* 10062 10063 * Handle non-blocking I/O properly in SSL_shutdown() call. 10064 10065 *Darryl Miles <darryl-mailinglists@netbauds.net>* 10066 10067 * Add `2.5.4.*` OIDs 10068 10069 *Ilya O. <vrghost@gmail.com>* 10070 10071### Changes between 0.9.8k and 0.9.8l [5 Nov 2009] 10072 10073 * Disable renegotiation completely - this fixes a severe security 10074 problem ([CVE-2009-3555]) at the cost of breaking all 10075 renegotiation. Renegotiation can be re-enabled by setting 10076 SSL3_FLAGS_ALLOW_UNSAFE_LEGACY_RENEGOTIATION in s3->flags at 10077 run-time. This is really not recommended unless you know what 10078 you're doing. 10079 10080 *Ben Laurie* 10081 10082### Changes between 0.9.8j and 0.9.8k [25 Mar 2009] 10083 10084 * Don't set val to NULL when freeing up structures, it is freed up by 10085 underlying code. If `sizeof(void *) > sizeof(long)` this can result in 10086 zeroing past the valid field. ([CVE-2009-0789]) 10087 10088 *Paolo Ganci <Paolo.Ganci@AdNovum.CH>* 10089 10090 * Fix bug where return value of CMS_SignerInfo_verify_content() was not 10091 checked correctly. This would allow some invalid signed attributes to 10092 appear to verify correctly. ([CVE-2009-0591]) 10093 10094 *Ivan Nestlerode <inestlerode@us.ibm.com>* 10095 10096 * Reject UniversalString and BMPString types with invalid lengths. This 10097 prevents a crash in ASN1_STRING_print_ex() which assumes the strings have 10098 a legal length. ([CVE-2009-0590]) 10099 10100 *Steve Henson* 10101 10102 * Set S/MIME signing as the default purpose rather than setting it 10103 unconditionally. This allows applications to override it at the store 10104 level. 10105 10106 *Steve Henson* 10107 10108 * Permit restricted recursion of ASN1 strings. This is needed in practice 10109 to handle some structures. 10110 10111 *Steve Henson* 10112 10113 * Improve efficiency of mem_gets: don't search whole buffer each time 10114 for a '\n' 10115 10116 *Jeremy Shapiro <jnshapir@us.ibm.com>* 10117 10118 * New -hex option for openssl rand. 10119 10120 *Matthieu Herrb* 10121 10122 * Print out UTF8String and NumericString when parsing ASN1. 10123 10124 *Steve Henson* 10125 10126 * Support NumericString type for name components. 10127 10128 *Steve Henson* 10129 10130 * Allow CC in the environment to override the automatically chosen 10131 compiler. Note that nothing is done to ensure flags work with the 10132 chosen compiler. 10133 10134 *Ben Laurie* 10135 10136### Changes between 0.9.8i and 0.9.8j [07 Jan 2009] 10137 10138 * Properly check EVP_VerifyFinal() and similar return values 10139 ([CVE-2008-5077]). 10140 10141 *Ben Laurie, Bodo Moeller, Google Security Team* 10142 10143 * Enable TLS extensions by default. 10144 10145 *Ben Laurie* 10146 10147 * Allow the CHIL engine to be loaded, whether the application is 10148 multithreaded or not. (This does not release the developer from the 10149 obligation to set up the dynamic locking callbacks.) 10150 10151 *Sander Temme <sander@temme.net>* 10152 10153 * Use correct exit code if there is an error in dgst command. 10154 10155 *Steve Henson; problem pointed out by Roland Dirlewanger* 10156 10157 * Tweak Configure so that you need to say "experimental-jpake" to enable 10158 JPAKE, and need to use -DOPENSSL_EXPERIMENTAL_JPAKE in applications. 10159 10160 *Bodo Moeller* 10161 10162 * Add experimental JPAKE support, including demo authentication in 10163 s_client and s_server. 10164 10165 *Ben Laurie* 10166 10167 * Set the comparison function in v3_addr_canonize(). 10168 10169 *Rob Austein <sra@hactrn.net>* 10170 10171 * Add support for XMPP STARTTLS in s_client. 10172 10173 *Philip Paeps <philip@freebsd.org>* 10174 10175 * Change the server-side SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG behavior 10176 to ensure that even with this option, only ciphersuites in the 10177 server's preference list will be accepted. (Note that the option 10178 applies only when resuming a session, so the earlier behavior was 10179 just about the algorithm choice for symmetric cryptography.) 10180 10181 *Bodo Moeller* 10182 10183### Changes between 0.9.8h and 0.9.8i [15 Sep 2008] 10184 10185 * Fix NULL pointer dereference if a DTLS server received 10186 ChangeCipherSpec as first record ([CVE-2009-1386]). 10187 10188 *PR #1679* 10189 10190 * Fix a state transition in s3_srvr.c and d1_srvr.c 10191 (was using SSL3_ST_CW_CLNT_HELLO_B, should be `..._ST_SW_SRVR_...`). 10192 10193 *Nagendra Modadugu* 10194 10195 * The fix in 0.9.8c that supposedly got rid of unsafe 10196 double-checked locking was incomplete for RSA blinding, 10197 addressing just one layer of what turns out to have been 10198 doubly unsafe triple-checked locking. 10199 10200 So now fix this for real by retiring the MONT_HELPER macro 10201 in crypto/rsa/rsa_eay.c. 10202 10203 *Bodo Moeller; problem pointed out by Marius Schilder* 10204 10205 * Various precautionary measures: 10206 10207 - Avoid size_t integer overflow in HASH_UPDATE (md32_common.h). 10208 10209 - Avoid a buffer overflow in d2i_SSL_SESSION() (ssl_asn1.c). 10210 (NB: This would require knowledge of the secret session ticket key 10211 to exploit, in which case you'd be SOL either way.) 10212 10213 - Change bn_nist.c so that it will properly handle input BIGNUMs 10214 outside the expected range. 10215 10216 - Enforce the 'num' check in BN_div() (bn_div.c) for non-BN_DEBUG 10217 builds. 10218 10219 *Neel Mehta, Bodo Moeller* 10220 10221 * Allow engines to be "soft loaded" - i.e. optionally don't die if 10222 the load fails. Useful for distros. 10223 10224 *Ben Laurie and the FreeBSD team* 10225 10226 * Add support for Local Machine Keyset attribute in PKCS#12 files. 10227 10228 *Steve Henson* 10229 10230 * Fix BN_GF2m_mod_arr() top-bit cleanup code. 10231 10232 *Huang Ying* 10233 10234 * Expand ENGINE to support engine supplied SSL client certificate functions. 10235 10236 This work was sponsored by Logica. 10237 10238 *Steve Henson* 10239 10240 * Add CryptoAPI ENGINE to support use of RSA and DSA keys held in Windows 10241 keystores. Support for SSL/TLS client authentication too. 10242 Not compiled unless enable-capieng specified to Configure. 10243 10244 This work was sponsored by Logica. 10245 10246 *Steve Henson* 10247 10248 * Fix bug in X509_ATTRIBUTE creation: don't set attribute using 10249 ASN1_TYPE_set1 if MBSTRING flag set. This bug would crash certain 10250 attribute creation routines such as certificate requests and PKCS#12 10251 files. 10252 10253 *Steve Henson* 10254 10255### Changes between 0.9.8g and 0.9.8h [28 May 2008] 10256 10257 * Fix flaw if 'Server Key exchange message' is omitted from a TLS 10258 handshake which could lead to a client crash as found using the 10259 Codenomicon TLS test suite ([CVE-2008-1672]) 10260 10261 *Steve Henson, Mark Cox* 10262 10263 * Fix double free in TLS server name extensions which could lead to 10264 a remote crash found by Codenomicon TLS test suite ([CVE-2008-0891]) 10265 10266 *Joe Orton* 10267 10268 * Clear error queue in SSL_CTX_use_certificate_chain_file() 10269 10270 Clear the error queue to ensure that error entries left from 10271 older function calls do not interfere with the correct operation. 10272 10273 *Lutz Jaenicke, Erik de Castro Lopo* 10274 10275 * Remove root CA certificates of commercial CAs: 10276 10277 The OpenSSL project does not recommend any specific CA and does not 10278 have any policy with respect to including or excluding any CA. 10279 Therefore it does not make any sense to ship an arbitrary selection 10280 of root CA certificates with the OpenSSL software. 10281 10282 *Lutz Jaenicke* 10283 10284 * RSA OAEP patches to fix two separate invalid memory reads. 10285 The first one involves inputs when 'lzero' is greater than 10286 'SHA_DIGEST_LENGTH' (it would read about SHA_DIGEST_LENGTH bytes 10287 before the beginning of from). The second one involves inputs where 10288 the 'db' section contains nothing but zeroes (there is a one-byte 10289 invalid read after the end of 'db'). 10290 10291 *Ivan Nestlerode <inestlerode@us.ibm.com>* 10292 10293 * Partial backport from 0.9.9-dev: 10294 10295 Introduce bn_mul_mont (dedicated Montgomery multiplication 10296 procedure) as a candidate for BIGNUM assembler implementation. 10297 While 0.9.9-dev uses assembler for various architectures, only 10298 x86_64 is available by default here in the 0.9.8 branch, and 10299 32-bit x86 is available through a compile-time setting. 10300 10301 To try the 32-bit x86 assembler implementation, use Configure 10302 option "enable-montasm" (which exists only for this backport). 10303 10304 As "enable-montasm" for 32-bit x86 disclaims code stability 10305 anyway, in this constellation we activate additional code 10306 backported from 0.9.9-dev for further performance improvements, 10307 namely BN_from_montgomery_word. (To enable this otherwise, 10308 e.g. x86_64, try `-DMONT_FROM_WORD___NON_DEFAULT_0_9_8_BUILD`.) 10309 10310 *Andy Polyakov (backport partially by Bodo Moeller)* 10311 10312 * Add TLS session ticket callback. This allows an application to set 10313 TLS ticket cipher and HMAC keys rather than relying on hardcoded fixed 10314 values. This is useful for key rollover for example where several key 10315 sets may exist with different names. 10316 10317 *Steve Henson* 10318 10319 * Reverse ENGINE-internal logic for caching default ENGINE handles. 10320 This was broken until now in 0.9.8 releases, such that the only way 10321 a registered ENGINE could be used (assuming it initialises 10322 successfully on the host) was to explicitly set it as the default 10323 for the relevant algorithms. This is in contradiction with 0.9.7 10324 behaviour and the documentation. With this fix, when an ENGINE is 10325 registered into a given algorithm's table of implementations, the 10326 'uptodate' flag is reset so that auto-discovery will be used next 10327 time a new context for that algorithm attempts to select an 10328 implementation. 10329 10330 *Ian Lister (tweaked by Geoff Thorpe)* 10331 10332 * Backport of CMS code to OpenSSL 0.9.8. This differs from the 0.9.9 10333 implementation in the following ways: 10334 10335 Lack of EVP_PKEY_ASN1_METHOD means algorithm parameters have to be 10336 hard coded. 10337 10338 Lack of BER streaming support means one pass streaming processing is 10339 only supported if data is detached: setting the streaming flag is 10340 ignored for embedded content. 10341 10342 CMS support is disabled by default and must be explicitly enabled 10343 with the enable-cms configuration option. 10344 10345 *Steve Henson* 10346 10347 * Update the GMP engine glue to do direct copies between BIGNUM and 10348 mpz_t when openssl and GMP use the same limb size. Otherwise the 10349 existing "conversion via a text string export" trick is still used. 10350 10351 *Paul Sheer <paulsheer@gmail.com>* 10352 10353 * Zlib compression BIO. This is a filter BIO which compressed and 10354 uncompresses any data passed through it. 10355 10356 *Steve Henson* 10357 10358 * Add AES_wrap_key() and AES_unwrap_key() functions to implement 10359 RFC3394 compatible AES key wrapping. 10360 10361 *Steve Henson* 10362 10363 * Add utility functions to handle ASN1 structures. ASN1_STRING_set0(): 10364 sets string data without copying. X509_ALGOR_set0() and 10365 X509_ALGOR_get0(): set and retrieve X509_ALGOR (AlgorithmIdentifier) 10366 data. Attribute function X509at_get0_data_by_OBJ(): retrieves data 10367 from an X509_ATTRIBUTE structure optionally checking it occurs only 10368 once. ASN1_TYPE_set1(): set and ASN1_TYPE structure copying supplied 10369 data. 10370 10371 *Steve Henson* 10372 10373 * Fix BN flag handling in RSA_eay_mod_exp() and BN_MONT_CTX_set() 10374 to get the expected BN_FLG_CONSTTIME behavior. 10375 10376 *Bodo Moeller (Google)* 10377 10378 * Netware support: 10379 10380 - fixed wrong usage of ioctlsocket() when build for LIBC BSD sockets 10381 - fixed do_tests.pl to run the test suite with CLIB builds too (CLIB_OPT) 10382 - added some more tests to do_tests.pl 10383 - fixed RunningProcess usage so that it works with newer LIBC NDKs too 10384 - removed usage of BN_LLONG for CLIB builds to avoid runtime dependency 10385 - added new Configure targets netware-clib-bsdsock, netware-clib-gcc, 10386 netware-clib-bsdsock-gcc, netware-libc-bsdsock-gcc 10387 - various changes to netware.pl to enable gcc-cross builds on Win32 10388 platform 10389 - changed crypto/bio/b_sock.c to work with macro functions (CLIB BSD) 10390 - various changes to fix missing prototype warnings 10391 - fixed x86nasm.pl to create correct asm files for NASM COFF output 10392 - added AES, WHIRLPOOL and CPUID assembler code to build files 10393 - added missing AES assembler make rules to mk1mf.pl 10394 - fixed order of includes in `apps/ocsp.c` so that `e_os.h` settings apply 10395 10396 *Guenter Knauf <eflash@gmx.net>* 10397 10398 * Implement certificate status request TLS extension defined in RFC3546. 10399 A client can set the appropriate parameters and receive the encoded 10400 OCSP response via a callback. A server can query the supplied parameters 10401 and set the encoded OCSP response in the callback. Add simplified examples 10402 to s_client and s_server. 10403 10404 *Steve Henson* 10405 10406### Changes between 0.9.8f and 0.9.8g [19 Oct 2007] 10407 10408 * Fix various bugs: 10409 + Binary incompatibility of ssl_ctx_st structure 10410 + DTLS interoperation with non-compliant servers 10411 + Don't call get_session_cb() without proposed session 10412 + Fix ia64 assembler code 10413 10414 *Andy Polyakov, Steve Henson* 10415 10416### Changes between 0.9.8e and 0.9.8f [11 Oct 2007] 10417 10418 * DTLS Handshake overhaul. There were longstanding issues with 10419 OpenSSL DTLS implementation, which were making it impossible for 10420 RFC 4347 compliant client to communicate with OpenSSL server. 10421 Unfortunately just fixing these incompatibilities would "cut off" 10422 pre-0.9.8f clients. To allow for hassle free upgrade post-0.9.8e 10423 server keeps tolerating non RFC compliant syntax. The opposite is 10424 not true, 0.9.8f client can not communicate with earlier server. 10425 This update even addresses CVE-2007-4995. 10426 10427 *Andy Polyakov* 10428 10429 * Changes to avoid need for function casts in OpenSSL: some compilers 10430 (gcc 4.2 and later) reject their use. 10431 *Kurt Roeckx <kurt@roeckx.be>, Peter Hartley <pdh@utter.chaos.org.uk>, 10432 Steve Henson* 10433 10434 * Add RFC4507 support to OpenSSL. This includes the corrections in 10435 RFC4507bis. The encrypted ticket format is an encrypted encoded 10436 SSL_SESSION structure, that way new session features are automatically 10437 supported. 10438 10439 If a client application caches session in an SSL_SESSION structure 10440 support is transparent because tickets are now stored in the encoded 10441 SSL_SESSION. 10442 10443 The SSL_CTX structure automatically generates keys for ticket 10444 protection in servers so again support should be possible 10445 with no application modification. 10446 10447 If a client or server wishes to disable RFC4507 support then the option 10448 SSL_OP_NO_TICKET can be set. 10449 10450 Add a TLS extension debugging callback to allow the contents of any client 10451 or server extensions to be examined. 10452 10453 This work was sponsored by Google. 10454 10455 *Steve Henson* 10456 10457 * Add initial support for TLS extensions, specifically for the server_name 10458 extension so far. The SSL_SESSION, SSL_CTX, and SSL data structures now 10459 have new members for a host name. The SSL data structure has an 10460 additional member `SSL_CTX *initial_ctx` so that new sessions can be 10461 stored in that context to allow for session resumption, even after the 10462 SSL has been switched to a new SSL_CTX in reaction to a client's 10463 server_name extension. 10464 10465 New functions (subject to change): 10466 10467 SSL_get_servername() 10468 SSL_get_servername_type() 10469 SSL_set_SSL_CTX() 10470 10471 New CTRL codes and macros (subject to change): 10472 10473 SSL_CTRL_SET_TLSEXT_SERVERNAME_CB 10474 - SSL_CTX_set_tlsext_servername_callback() 10475 SSL_CTRL_SET_TLSEXT_SERVERNAME_ARG 10476 - SSL_CTX_set_tlsext_servername_arg() 10477 SSL_CTRL_SET_TLSEXT_HOSTNAME - SSL_set_tlsext_host_name() 10478 10479 openssl s_client has a new '-servername ...' option. 10480 10481 openssl s_server has new options '-servername_host ...', '-cert2 ...', 10482 '-key2 ...', '-servername_fatal' (subject to change). This allows 10483 testing the HostName extension for a specific single host name ('-cert' 10484 and '-key' remain fallbacks for handshakes without HostName 10485 negotiation). If the unrecognized_name alert has to be sent, this by 10486 default is a warning; it becomes fatal with the '-servername_fatal' 10487 option. 10488 10489 *Peter Sylvester, Remy Allais, Christophe Renou, Steve Henson* 10490 10491 * Add AES and SSE2 assembly language support to VC++ build. 10492 10493 *Steve Henson* 10494 10495 * Mitigate attack on final subtraction in Montgomery reduction. 10496 10497 *Andy Polyakov* 10498 10499 * Fix crypto/ec/ec_mult.c to work properly with scalars of value 0 10500 (which previously caused an internal error). 10501 10502 *Bodo Moeller* 10503 10504 * Squeeze another 10% out of IGE mode when in != out. 10505 10506 *Ben Laurie* 10507 10508 * AES IGE mode speedup. 10509 10510 *Dean Gaudet (Google)* 10511 10512 * Add the Korean symmetric 128-bit cipher SEED (see 10513 <http://www.kisa.or.kr/kisa/seed/jsp/seed_eng.jsp>) and 10514 add SEED ciphersuites from RFC 4162: 10515 10516 TLS_RSA_WITH_SEED_CBC_SHA = "SEED-SHA" 10517 TLS_DHE_DSS_WITH_SEED_CBC_SHA = "DHE-DSS-SEED-SHA" 10518 TLS_DHE_RSA_WITH_SEED_CBC_SHA = "DHE-RSA-SEED-SHA" 10519 TLS_DH_anon_WITH_SEED_CBC_SHA = "ADH-SEED-SHA" 10520 10521 To minimize changes between patchlevels in the OpenSSL 0.9.8 10522 series, SEED remains excluded from compilation unless OpenSSL 10523 is configured with 'enable-seed'. 10524 10525 *KISA, Bodo Moeller* 10526 10527 * Mitigate branch prediction attacks, which can be practical if a 10528 single processor is shared, allowing a spy process to extract 10529 information. For detailed background information, see 10530 <http://eprint.iacr.org/2007/039> (O. Aciicmez, S. Gueron, 10531 J.-P. Seifert, "New Branch Prediction Vulnerabilities in OpenSSL 10532 and Necessary Software Countermeasures"). The core of the change 10533 are new versions BN_div_no_branch() and 10534 BN_mod_inverse_no_branch() of BN_div() and BN_mod_inverse(), 10535 respectively, which are slower, but avoid the security-relevant 10536 conditional branches. These are automatically called by BN_div() 10537 and BN_mod_inverse() if the flag BN_FLG_CONSTTIME is set for one 10538 of the input BIGNUMs. Also, BN_is_bit_set() has been changed to 10539 remove a conditional branch. 10540 10541 BN_FLG_CONSTTIME is the new name for the previous 10542 BN_FLG_EXP_CONSTTIME flag, since it now affects more than just 10543 modular exponentiation. (Since OpenSSL 0.9.7h, setting this flag 10544 in the exponent causes BN_mod_exp_mont() to use the alternative 10545 implementation in BN_mod_exp_mont_consttime().) The old name 10546 remains as a deprecated alias. 10547 10548 Similarly, RSA_FLAG_NO_EXP_CONSTTIME is replaced by a more general 10549 RSA_FLAG_NO_CONSTTIME flag since the RSA implementation now uses 10550 constant-time implementations for more than just exponentiation. 10551 Here too the old name is kept as a deprecated alias. 10552 10553 BN_BLINDING_new() will now use BN_dup() for the modulus so that 10554 the BN_BLINDING structure gets an independent copy of the 10555 modulus. This means that the previous `BIGNUM *m` argument to 10556 BN_BLINDING_new() and to BN_BLINDING_create_param() now 10557 essentially becomes `const BIGNUM *m`, although we can't actually 10558 change this in the header file before 0.9.9. It allows 10559 RSA_setup_blinding() to use BN_with_flags() on the modulus to 10560 enable BN_FLG_CONSTTIME. 10561 10562 *Matthew D Wood (Intel Corp)* 10563 10564 * In the SSL/TLS server implementation, be strict about session ID 10565 context matching (which matters if an application uses a single 10566 external cache for different purposes). Previously, 10567 out-of-context reuse was forbidden only if SSL_VERIFY_PEER was 10568 set. This did ensure strict client verification, but meant that, 10569 with applications using a single external cache for quite 10570 different requirements, clients could circumvent ciphersuite 10571 restrictions for a given session ID context by starting a session 10572 in a different context. 10573 10574 *Bodo Moeller* 10575 10576 * Include "!eNULL" in SSL_DEFAULT_CIPHER_LIST to make sure that 10577 a ciphersuite string such as "DEFAULT:RSA" cannot enable 10578 authentication-only ciphersuites. 10579 10580 *Bodo Moeller* 10581 10582 * Update the SSL_get_shared_ciphers() fix CVE-2006-3738 which was 10583 not complete and could lead to a possible single byte overflow 10584 ([CVE-2007-5135]) [Ben Laurie] 10585 10586### Changes between 0.9.8d and 0.9.8e [23 Feb 2007] 10587 10588 * Since AES128 and AES256 (and similarly Camellia128 and 10589 Camellia256) share a single mask bit in the logic of 10590 ssl/ssl_ciph.c, the code for masking out disabled ciphers needs a 10591 kludge to work properly if AES128 is available and AES256 isn't 10592 (or if Camellia128 is available and Camellia256 isn't). 10593 10594 *Victor Duchovni* 10595 10596 * Fix the BIT STRING encoding generated by crypto/ec/ec_asn1.c 10597 (within i2d_ECPrivateKey, i2d_ECPKParameters, i2d_ECParameters): 10598 When a point or a seed is encoded in a BIT STRING, we need to 10599 prevent the removal of trailing zero bits to get the proper DER 10600 encoding. (By default, crypto/asn1/a_bitstr.c assumes the case 10601 of a NamedBitList, for which trailing 0 bits need to be removed.) 10602 10603 *Bodo Moeller* 10604 10605 * Have SSL/TLS server implementation tolerate "mismatched" record 10606 protocol version while receiving ClientHello even if the 10607 ClientHello is fragmented. (The server can't insist on the 10608 particular protocol version it has chosen before the ServerHello 10609 message has informed the client about his choice.) 10610 10611 *Bodo Moeller* 10612 10613 * Add RFC 3779 support. 10614 10615 *Rob Austein for ARIN, Ben Laurie* 10616 10617 * Load error codes if they are not already present instead of using a 10618 static variable. This allows them to be cleanly unloaded and reloaded. 10619 Improve header file function name parsing. 10620 10621 *Steve Henson* 10622 10623 * extend SMTP and IMAP protocol emulation in s_client to use EHLO 10624 or CAPABILITY handshake as required by RFCs. 10625 10626 *Goetz Babin-Ebell* 10627 10628### Changes between 0.9.8c and 0.9.8d [28 Sep 2006] 10629 10630 * Introduce limits to prevent malicious keys being able to 10631 cause a denial of service. ([CVE-2006-2940]) 10632 10633 *Steve Henson, Bodo Moeller* 10634 10635 * Fix ASN.1 parsing of certain invalid structures that can result 10636 in a denial of service. ([CVE-2006-2937]) [Steve Henson] 10637 10638 * Fix buffer overflow in SSL_get_shared_ciphers() function. 10639 ([CVE-2006-3738]) [Tavis Ormandy and Will Drewry, Google Security Team] 10640 10641 * Fix SSL client code which could crash if connecting to a 10642 malicious SSLv2 server. ([CVE-2006-4343]) 10643 10644 *Tavis Ormandy and Will Drewry, Google Security Team* 10645 10646 * Since 0.9.8b, ciphersuite strings naming explicit ciphersuites 10647 match only those. Before that, "AES256-SHA" would be interpreted 10648 as a pattern and match "AES128-SHA" too (since AES128-SHA got 10649 the same strength classification in 0.9.7h) as we currently only 10650 have a single AES bit in the ciphersuite description bitmap. 10651 That change, however, also applied to ciphersuite strings such as 10652 "RC4-MD5" that intentionally matched multiple ciphersuites -- 10653 namely, SSL 2.0 ciphersuites in addition to the more common ones 10654 from SSL 3.0/TLS 1.0. 10655 10656 So we change the selection algorithm again: Naming an explicit 10657 ciphersuite selects this one ciphersuite, and any other similar 10658 ciphersuite (same bitmap) from *other* protocol versions. 10659 Thus, "RC4-MD5" again will properly select both the SSL 2.0 10660 ciphersuite and the SSL 3.0/TLS 1.0 ciphersuite. 10661 10662 Since SSL 2.0 does not have any ciphersuites for which the 10663 128/256 bit distinction would be relevant, this works for now. 10664 The proper fix will be to use different bits for AES128 and 10665 AES256, which would have avoided the problems from the beginning; 10666 however, bits are scarce, so we can only do this in a new release 10667 (not just a patchlevel) when we can change the SSL_CIPHER 10668 definition to split the single 'unsigned long mask' bitmap into 10669 multiple values to extend the available space. 10670 10671 *Bodo Moeller* 10672 10673### Changes between 0.9.8b and 0.9.8c [05 Sep 2006] 10674 10675 * Avoid PKCS #1 v1.5 signature attack discovered by Daniel Bleichenbacher 10676 ([CVE-2006-4339]) [Ben Laurie and Google Security Team] 10677 10678 * Add AES IGE and biIGE modes. 10679 10680 *Ben Laurie* 10681 10682 * Change the Unix randomness entropy gathering to use poll() when 10683 possible instead of select(), since the latter has some 10684 undesirable limitations. 10685 10686 *Darryl Miles via Richard Levitte and Bodo Moeller* 10687 10688 * Disable "ECCdraft" ciphersuites more thoroughly. Now special 10689 treatment in ssl/ssl_ciph.s makes sure that these ciphersuites 10690 cannot be implicitly activated as part of, e.g., the "AES" alias. 10691 However, please upgrade to OpenSSL 0.9.9[-dev] for 10692 non-experimental use of the ECC ciphersuites to get TLS extension 10693 support, which is required for curve and point format negotiation 10694 to avoid potential handshake problems. 10695 10696 *Bodo Moeller* 10697 10698 * Disable rogue ciphersuites: 10699 10700 - SSLv2 0x08 0x00 0x80 ("RC4-64-MD5") 10701 - SSLv3/TLSv1 0x00 0x61 ("EXP1024-RC2-CBC-MD5") 10702 - SSLv3/TLSv1 0x00 0x60 ("EXP1024-RC4-MD5") 10703 10704 The latter two were purportedly from 10705 draft-ietf-tls-56-bit-ciphersuites-0[01].txt, but do not really 10706 appear there. 10707 10708 Also deactivate the remaining ciphersuites from 10709 draft-ietf-tls-56-bit-ciphersuites-01.txt. These are just as 10710 unofficial, and the ID has long expired. 10711 10712 *Bodo Moeller* 10713 10714 * Fix RSA blinding Heisenbug (problems sometimes occurred on 10715 dual-core machines) and other potential thread-safety issues. 10716 10717 *Bodo Moeller* 10718 10719 * Add the symmetric cipher Camellia (128-bit, 192-bit, 256-bit key 10720 versions), which is now available for royalty-free use 10721 (see <http://info.isl.ntt.co.jp/crypt/eng/info/chiteki.html>). 10722 Also, add Camellia TLS ciphersuites from RFC 4132. 10723 10724 To minimize changes between patchlevels in the OpenSSL 0.9.8 10725 series, Camellia remains excluded from compilation unless OpenSSL 10726 is configured with 'enable-camellia'. 10727 10728 *NTT* 10729 10730 * Disable the padding bug check when compression is in use. The padding 10731 bug check assumes the first packet is of even length, this is not 10732 necessarily true if compression is enabled and can result in false 10733 positives causing handshake failure. The actual bug test is ancient 10734 code so it is hoped that implementations will either have fixed it by 10735 now or any which still have the bug do not support compression. 10736 10737 *Steve Henson* 10738 10739### Changes between 0.9.8a and 0.9.8b [04 May 2006] 10740 10741 * When applying a cipher rule check to see if string match is an explicit 10742 cipher suite and only match that one cipher suite if it is. 10743 10744 *Steve Henson* 10745 10746 * Link in manifests for VC++ if needed. 10747 10748 *Austin Ziegler <halostatue@gmail.com>* 10749 10750 * Update support for ECC-based TLS ciphersuites according to 10751 draft-ietf-tls-ecc-12.txt with proposed changes (but without 10752 TLS extensions, which are supported starting with the 0.9.9 10753 branch, not in the OpenSSL 0.9.8 branch). 10754 10755 *Douglas Stebila* 10756 10757 * New functions EVP_CIPHER_CTX_new() and EVP_CIPHER_CTX_free() to support 10758 opaque EVP_CIPHER_CTX handling. 10759 10760 *Steve Henson* 10761 10762 * Fixes and enhancements to zlib compression code. We now only use 10763 "zlib1.dll" and use the default `__cdecl` calling convention on Win32 10764 to conform with the standards mentioned here: 10765 <http://www.zlib.net/DLL_FAQ.txt> 10766 Static zlib linking now works on Windows and the new --with-zlib-include 10767 --with-zlib-lib options to Configure can be used to supply the location 10768 of the headers and library. Gracefully handle case where zlib library 10769 can't be loaded. 10770 10771 *Steve Henson* 10772 10773 * Several fixes and enhancements to the OID generation code. The old code 10774 sometimes allowed invalid OIDs (1.X for X >= 40 for example), couldn't 10775 handle numbers larger than ULONG_MAX, truncated printing and had a 10776 non standard OBJ_obj2txt() behaviour. 10777 10778 *Steve Henson* 10779 10780 * Add support for building of engines under engine/ as shared libraries 10781 under VC++ build system. 10782 10783 *Steve Henson* 10784 10785 * Corrected the numerous bugs in the Win32 path splitter in DSO. 10786 Hopefully, we will not see any false combination of paths any more. 10787 10788 *Richard Levitte* 10789 10790### Changes between 0.9.8 and 0.9.8a [11 Oct 2005] 10791 10792 * Remove the functionality of SSL_OP_MSIE_SSLV2_RSA_PADDING 10793 (part of SSL_OP_ALL). This option used to disable the 10794 countermeasure against man-in-the-middle protocol-version 10795 rollback in the SSL 2.0 server implementation, which is a bad 10796 idea. ([CVE-2005-2969]) 10797 10798 *Bodo Moeller; problem pointed out by Yutaka Oiwa (Research Center 10799 for Information Security, National Institute of Advanced Industrial 10800 Science and Technology [AIST], Japan)* 10801 10802 * Add two function to clear and return the verify parameter flags. 10803 10804 *Steve Henson* 10805 10806 * Keep cipherlists sorted in the source instead of sorting them at 10807 runtime, thus removing the need for a lock. 10808 10809 *Nils Larsch* 10810 10811 * Avoid some small subgroup attacks in Diffie-Hellman. 10812 10813 *Nick Mathewson and Ben Laurie* 10814 10815 * Add functions for well-known primes. 10816 10817 *Nick Mathewson* 10818 10819 * Extended Windows CE support. 10820 10821 *Satoshi Nakamura and Andy Polyakov* 10822 10823 * Initialize SSL_METHOD structures at compile time instead of during 10824 runtime, thus removing the need for a lock. 10825 10826 *Steve Henson* 10827 10828 * Make PKCS7_decrypt() work even if no certificate is supplied by 10829 attempting to decrypt each encrypted key in turn. Add support to 10830 smime utility. 10831 10832 *Steve Henson* 10833 10834### Changes between 0.9.7h and 0.9.8 [05 Jul 2005] 10835 10836[NB: OpenSSL 0.9.7i and later 0.9.7 patch levels were released after 10837OpenSSL 0.9.8.] 10838 10839 * Add libcrypto.pc and libssl.pc for those who feel they need them. 10840 10841 *Richard Levitte* 10842 10843 * Change CA.sh and CA.pl so they don't bundle the CSR and the private 10844 key into the same file any more. 10845 10846 *Richard Levitte* 10847 10848 * Add initial support for Win64, both IA64 and AMD64/x64 flavors. 10849 10850 *Andy Polyakov* 10851 10852 * Add -utf8 command line and config file option to 'ca'. 10853 10854 *Stefan <stf@udoma.org* 10855 10856 * Removed the macro des_crypt(), as it seems to conflict with some 10857 libraries. Use DES_crypt(). 10858 10859 *Richard Levitte* 10860 10861 * Correct naming of the 'chil' and '4758cca' ENGINEs. This 10862 involves renaming the source and generated shared-libs for 10863 both. The engines will accept the corrected or legacy ids 10864 ('ncipher' and '4758_cca' respectively) when binding. NB, 10865 this only applies when building 'shared'. 10866 10867 *Corinna Vinschen <vinschen@redhat.com> and Geoff Thorpe* 10868 10869 * Add attribute functions to EVP_PKEY structure. Modify 10870 PKCS12_create() to recognize a CSP name attribute and 10871 use it. Make -CSP option work again in pkcs12 utility. 10872 10873 *Steve Henson* 10874 10875 * Add new functionality to the bn blinding code: 10876 - automatic re-creation of the BN_BLINDING parameters after 10877 a fixed number of uses (currently 32) 10878 - add new function for parameter creation 10879 - introduce flags to control the update behaviour of the 10880 BN_BLINDING parameters 10881 - hide BN_BLINDING structure 10882 Add a second BN_BLINDING slot to the RSA structure to improve 10883 performance when a single RSA object is shared among several 10884 threads. 10885 10886 *Nils Larsch* 10887 10888 * Add support for DTLS. 10889 10890 *Nagendra Modadugu <nagendra@cs.stanford.edu> and Ben Laurie* 10891 10892 * Add support for DER encoded private keys (SSL_FILETYPE_ASN1) 10893 to SSL_CTX_use_PrivateKey_file() and SSL_use_PrivateKey_file() 10894 10895 *Walter Goulet* 10896 10897 * Remove buggy and incomplete DH cert support from 10898 ssl/ssl_rsa.c and ssl/s3_both.c 10899 10900 *Nils Larsch* 10901 10902 * Use SHA-1 instead of MD5 as the default digest algorithm for 10903 the `apps/openssl` commands. 10904 10905 *Nils Larsch* 10906 10907 * Compile clean with "-Wall -Wmissing-prototypes 10908 -Wstrict-prototypes -Wmissing-declarations -Werror". Currently 10909 DEBUG_SAFESTACK must also be set. 10910 10911 *Ben Laurie* 10912 10913 * Change ./Configure so that certain algorithms can be disabled by default. 10914 The new counterpiece to "no-xxx" is "enable-xxx". 10915 10916 The patented RC5 and MDC2 algorithms will now be disabled unless 10917 "enable-rc5" and "enable-mdc2", respectively, are specified. 10918 10919 (IDEA remains enabled despite being patented. This is because IDEA 10920 is frequently required for interoperability, and there is no license 10921 fee for non-commercial use. As before, "no-idea" can be used to 10922 avoid this algorithm.) 10923 10924 *Bodo Moeller* 10925 10926 * Add processing of proxy certificates (see RFC 3820). This work was 10927 sponsored by KTH (The Royal Institute of Technology in Stockholm) and 10928 EGEE (Enabling Grids for E-science in Europe). 10929 10930 *Richard Levitte* 10931 10932 * RC4 performance overhaul on modern architectures/implementations, such 10933 as Intel P4, IA-64 and AMD64. 10934 10935 *Andy Polyakov* 10936 10937 * New utility extract-section.pl. This can be used specify an alternative 10938 section number in a pod file instead of having to treat each file as 10939 a separate case in Makefile. This can be done by adding two lines to the 10940 pod file: 10941 10942 =for comment openssl_section:XXX 10943 10944 The blank line is mandatory. 10945 10946 *Steve Henson* 10947 10948 * New arguments -certform, -keyform and -pass for s_client and s_server 10949 to allow alternative format key and certificate files and passphrase 10950 sources. 10951 10952 *Steve Henson* 10953 10954 * New structure X509_VERIFY_PARAM which combines current verify parameters, 10955 update associated structures and add various utility functions. 10956 10957 Add new policy related verify parameters, include policy checking in 10958 standard verify code. Enhance 'smime' application with extra parameters 10959 to support policy checking and print out. 10960 10961 *Steve Henson* 10962 10963 * Add a new engine to support VIA PadLock ACE extensions in the VIA C3 10964 Nehemiah processors. These extensions support AES encryption in hardware 10965 as well as RNG (though RNG support is currently disabled). 10966 10967 *Michal Ludvig <michal@logix.cz>, with help from Andy Polyakov* 10968 10969 * Deprecate `BN_[get|set]_params()` functions (they were ignored internally). 10970 10971 *Geoff Thorpe* 10972 10973 * New FIPS 180-2 algorithms, SHA-224/-256/-384/-512 are implemented. 10974 10975 *Andy Polyakov and a number of other people* 10976 10977 * Improved PowerPC platform support. Most notably BIGNUM assembler 10978 implementation contributed by IBM. 10979 10980 *Suresh Chari, Peter Waltenberg, Andy Polyakov* 10981 10982 * The new 'RSA_generate_key_ex' function now takes a BIGNUM for the public 10983 exponent rather than 'unsigned long'. There is a corresponding change to 10984 the new 'rsa_keygen' element of the RSA_METHOD structure. 10985 10986 *Jelte Jansen, Geoff Thorpe* 10987 10988 * Functionality for creating the initial serial number file is now 10989 moved from CA.pl to the 'ca' utility with a new option -create_serial. 10990 10991 (Before OpenSSL 0.9.7e, CA.pl used to initialize the serial 10992 number file to 1, which is bound to cause problems. To avoid 10993 the problems while respecting compatibility between different 0.9.7 10994 patchlevels, 0.9.7e employed 'openssl x509 -next_serial' in 10995 CA.pl for serial number initialization. With the new release 0.9.8, 10996 we can fix the problem directly in the 'ca' utility.) 10997 10998 *Steve Henson* 10999 11000 * Reduced header interdependencies by declaring more opaque objects in 11001 ossl_typ.h. As a consequence, including some headers (eg. engine.h) will 11002 give fewer recursive includes, which could break lazy source code - so 11003 this change is covered by the OPENSSL_NO_DEPRECATED symbol. As always, 11004 developers should define this symbol when building and using openssl to 11005 ensure they track the recommended behaviour, interfaces, [etc], but 11006 backwards-compatible behaviour prevails when this isn't defined. 11007 11008 *Geoff Thorpe* 11009 11010 * New function X509_POLICY_NODE_print() which prints out policy nodes. 11011 11012 *Steve Henson* 11013 11014 * Add new EVP function EVP_CIPHER_CTX_rand_key and associated functionality. 11015 This will generate a random key of the appropriate length based on the 11016 cipher context. The EVP_CIPHER can provide its own random key generation 11017 routine to support keys of a specific form. This is used in the des and 11018 3des routines to generate a key of the correct parity. Update S/MIME 11019 code to use new functions and hence generate correct parity DES keys. 11020 Add EVP_CHECK_DES_KEY #define to return an error if the key is not 11021 valid (weak or incorrect parity). 11022 11023 *Steve Henson* 11024 11025 * Add a local set of CRLs that can be used by X509_verify_cert() as well 11026 as looking them up. This is useful when the verified structure may contain 11027 CRLs, for example PKCS#7 signedData. Modify PKCS7_verify() to use any CRLs 11028 present unless the new PKCS7_NO_CRL flag is asserted. 11029 11030 *Steve Henson* 11031 11032 * Extend ASN1 oid configuration module. It now additionally accepts the 11033 syntax: 11034 11035 shortName = some long name, 1.2.3.4 11036 11037 *Steve Henson* 11038 11039 * Reimplemented the BN_CTX implementation. There is now no more static 11040 limitation on the number of variables it can handle nor the depth of the 11041 "stack" handling for BN_CTX_start()/BN_CTX_end() pairs. The stack 11042 information can now expand as required, and rather than having a single 11043 static array of bignums, BN_CTX now uses a linked-list of such arrays 11044 allowing it to expand on demand whilst maintaining the usefulness of 11045 BN_CTX's "bundling". 11046 11047 *Geoff Thorpe* 11048 11049 * Add a missing BN_CTX parameter to the 'rsa_mod_exp' callback in RSA_METHOD 11050 to allow all RSA operations to function using a single BN_CTX. 11051 11052 *Geoff Thorpe* 11053 11054 * Preliminary support for certificate policy evaluation and checking. This 11055 is initially intended to pass the tests outlined in "Conformance Testing 11056 of Relying Party Client Certificate Path Processing Logic" v1.07. 11057 11058 *Steve Henson* 11059 11060 * bn_dup_expand() has been deprecated, it was introduced in 0.9.7 and 11061 remained unused and not that useful. A variety of other little bignum 11062 tweaks and fixes have also been made continuing on from the audit (see 11063 below). 11064 11065 *Geoff Thorpe* 11066 11067 * Constify all or almost all d2i, c2i, s2i and r2i functions, along with 11068 associated ASN1, EVP and SSL functions and old ASN1 macros. 11069 11070 *Richard Levitte* 11071 11072 * BN_zero() only needs to set 'top' and 'neg' to zero for correct results, 11073 and this should never fail. So the return value from the use of 11074 BN_set_word() (which can fail due to needless expansion) is now deprecated; 11075 if OPENSSL_NO_DEPRECATED is defined, BN_zero() is a void macro. 11076 11077 *Geoff Thorpe* 11078 11079 * BN_CTX_get() should return zero-valued bignums, providing the same 11080 initialised value as BN_new(). 11081 11082 *Geoff Thorpe, suggested by Ulf Möller* 11083 11084 * Support for inhibitAnyPolicy certificate extension. 11085 11086 *Steve Henson* 11087 11088 * An audit of the BIGNUM code is underway, for which debugging code is 11089 enabled when BN_DEBUG is defined. This makes stricter enforcements on what 11090 is considered valid when processing BIGNUMs, and causes execution to 11091 assert() when a problem is discovered. If BN_DEBUG_RAND is defined, 11092 further steps are taken to deliberately pollute unused data in BIGNUM 11093 structures to try and expose faulty code further on. For now, openssl will 11094 (in its default mode of operation) continue to tolerate the inconsistent 11095 forms that it has tolerated in the past, but authors and packagers should 11096 consider trying openssl and their own applications when compiled with 11097 these debugging symbols defined. It will help highlight potential bugs in 11098 their own code, and will improve the test coverage for OpenSSL itself. At 11099 some point, these tighter rules will become openssl's default to improve 11100 maintainability, though the assert()s and other overheads will remain only 11101 in debugging configurations. See bn.h for more details. 11102 11103 *Geoff Thorpe, Nils Larsch, Ulf Möller* 11104 11105 * BN_CTX_init() has been deprecated, as BN_CTX is an opaque structure 11106 that can only be obtained through BN_CTX_new() (which implicitly 11107 initialises it). The presence of this function only made it possible 11108 to overwrite an existing structure (and cause memory leaks). 11109 11110 *Geoff Thorpe* 11111 11112 * Because of the callback-based approach for implementing LHASH as a 11113 template type, lh_insert() adds opaque objects to hash-tables and 11114 lh_doall() or lh_doall_arg() are typically used with a destructor callback 11115 to clean up those corresponding objects before destroying the hash table 11116 (and losing the object pointers). So some over-zealous constifications in 11117 LHASH have been relaxed so that lh_insert() does not take (nor store) the 11118 objects as "const" and the `lh_doall[_arg]` callback wrappers are not 11119 prototyped to have "const" restrictions on the object pointers they are 11120 given (and so aren't required to cast them away any more). 11121 11122 *Geoff Thorpe* 11123 11124 * The tmdiff.h API was so ugly and minimal that our own timing utility 11125 (speed) prefers to use its own implementation. The two implementations 11126 haven't been consolidated as yet (volunteers?) but the tmdiff API has had 11127 its object type properly exposed (MS_TM) instead of casting to/from 11128 `char *`. This may still change yet if someone realises MS_TM and 11129 `ms_time_***` 11130 aren't necessarily the greatest nomenclatures - but this is what was used 11131 internally to the implementation so I've used that for now. 11132 11133 *Geoff Thorpe* 11134 11135 * Ensure that deprecated functions do not get compiled when 11136 OPENSSL_NO_DEPRECATED is defined. Some "openssl" subcommands and a few of 11137 the self-tests were still using deprecated key-generation functions so 11138 these have been updated also. 11139 11140 *Geoff Thorpe* 11141 11142 * Reorganise PKCS#7 code to separate the digest location functionality 11143 into PKCS7_find_digest(), digest addition into PKCS7_bio_add_digest(). 11144 New function PKCS7_set_digest() to set the digest type for PKCS#7 11145 digestedData type. Add additional code to correctly generate the 11146 digestedData type and add support for this type in PKCS7 initialization 11147 functions. 11148 11149 *Steve Henson* 11150 11151 * New function PKCS7_set0_type_other() this initializes a PKCS7 11152 structure of type "other". 11153 11154 *Steve Henson* 11155 11156 * Fix prime generation loop in crypto/bn/bn_prime.pl by making 11157 sure the loop does correctly stop and breaking ("division by zero") 11158 modulus operations are not performed. The (pre-generated) prime 11159 table crypto/bn/bn_prime.h was already correct, but it could not be 11160 re-generated on some platforms because of the "division by zero" 11161 situation in the script. 11162 11163 *Ralf S. Engelschall* 11164 11165 * Update support for ECC-based TLS ciphersuites according to 11166 draft-ietf-tls-ecc-03.txt: the KDF1 key derivation function with 11167 SHA-1 now is only used for "small" curves (where the 11168 representation of a field element takes up to 24 bytes); for 11169 larger curves, the field element resulting from ECDH is directly 11170 used as premaster secret. 11171 11172 *Douglas Stebila (Sun Microsystems Laboratories)* 11173 11174 * Add code for kP+lQ timings to crypto/ec/ectest.c, and add SEC2 11175 curve secp160r1 to the tests. 11176 11177 *Douglas Stebila (Sun Microsystems Laboratories)* 11178 11179 * Add the possibility to load symbols globally with DSO. 11180 11181 *Götz Babin-Ebell <babin-ebell@trustcenter.de> via Richard Levitte* 11182 11183 * Add the functions ERR_set_mark() and ERR_pop_to_mark() for better 11184 control of the error stack. 11185 11186 *Richard Levitte* 11187 11188 * Add support for STORE in ENGINE. 11189 11190 *Richard Levitte* 11191 11192 * Add the STORE type. The intention is to provide a common interface 11193 to certificate and key stores, be they simple file-based stores, or 11194 HSM-type store, or LDAP stores, or... 11195 NOTE: The code is currently UNTESTED and isn't really used anywhere. 11196 11197 *Richard Levitte* 11198 11199 * Add a generic structure called OPENSSL_ITEM. This can be used to 11200 pass a list of arguments to any function as well as provide a way 11201 for a function to pass data back to the caller. 11202 11203 *Richard Levitte* 11204 11205 * Add the functions BUF_strndup() and BUF_memdup(). BUF_strndup() 11206 works like BUF_strdup() but can be used to duplicate a portion of 11207 a string. The copy gets NUL-terminated. BUF_memdup() duplicates 11208 a memory area. 11209 11210 *Richard Levitte* 11211 11212 * Add the function sk_find_ex() which works like sk_find(), but will 11213 return an index to an element even if an exact match couldn't be 11214 found. The index is guaranteed to point at the element where the 11215 searched-for key would be inserted to preserve sorting order. 11216 11217 *Richard Levitte* 11218 11219 * Add the function OBJ_bsearch_ex() which works like OBJ_bsearch() but 11220 takes an extra flags argument for optional functionality. Currently, 11221 the following flags are defined: 11222 11223 OBJ_BSEARCH_VALUE_ON_NOMATCH 11224 This one gets OBJ_bsearch_ex() to return a pointer to the first 11225 element where the comparing function returns a negative or zero 11226 number. 11227 11228 OBJ_BSEARCH_FIRST_VALUE_ON_MATCH 11229 This one gets OBJ_bsearch_ex() to return a pointer to the first 11230 element where the comparing function returns zero. This is useful 11231 if there are more than one element where the comparing function 11232 returns zero. 11233 11234 *Richard Levitte* 11235 11236 * Make it possible to create self-signed certificates with 'openssl ca' 11237 in such a way that the self-signed certificate becomes part of the 11238 CA database and uses the same mechanisms for serial number generation 11239 as all other certificate signing. The new flag '-selfsign' enables 11240 this functionality. Adapt CA.sh and CA.pl.in. 11241 11242 *Richard Levitte* 11243 11244 * Add functionality to check the public key of a certificate request 11245 against a given private. This is useful to check that a certificate 11246 request can be signed by that key (self-signing). 11247 11248 *Richard Levitte* 11249 11250 * Make it possible to have multiple active certificates with the same 11251 subject in the CA index file. This is done only if the keyword 11252 'unique_subject' is set to 'no' in the main CA section (default 11253 if 'CA_default') of the configuration file. The value is saved 11254 with the database itself in a separate index attribute file, 11255 named like the index file with '.attr' appended to the name. 11256 11257 *Richard Levitte* 11258 11259 * Generate multi-valued AVAs using '+' notation in config files for 11260 req and dirName. 11261 11262 *Steve Henson* 11263 11264 * Support for nameConstraints certificate extension. 11265 11266 *Steve Henson* 11267 11268 * Support for policyConstraints certificate extension. 11269 11270 *Steve Henson* 11271 11272 * Support for policyMappings certificate extension. 11273 11274 *Steve Henson* 11275 11276 * Make sure the default DSA_METHOD implementation only uses its 11277 dsa_mod_exp() and/or bn_mod_exp() handlers if they are non-NULL, 11278 and change its own handlers to be NULL so as to remove unnecessary 11279 indirection. This lets alternative implementations fallback to the 11280 default implementation more easily. 11281 11282 *Geoff Thorpe* 11283 11284 * Support for directoryName in GeneralName related extensions 11285 in config files. 11286 11287 *Steve Henson* 11288 11289 * Make it possible to link applications using Makefile.shared. 11290 Make that possible even when linking against static libraries! 11291 11292 *Richard Levitte* 11293 11294 * Support for single pass processing for S/MIME signing. This now 11295 means that S/MIME signing can be done from a pipe, in addition 11296 cleartext signing (multipart/signed type) is effectively streaming 11297 and the signed data does not need to be all held in memory. 11298 11299 This is done with a new flag PKCS7_STREAM. When this flag is set 11300 PKCS7_sign() only initializes the PKCS7 structure and the actual signing 11301 is done after the data is output (and digests calculated) in 11302 SMIME_write_PKCS7(). 11303 11304 *Steve Henson* 11305 11306 * Add full support for -rpath/-R, both in shared libraries and 11307 applications, at least on the platforms where it's known how 11308 to do it. 11309 11310 *Richard Levitte* 11311 11312 * In crypto/ec/ec_mult.c, implement fast point multiplication with 11313 precomputation, based on wNAF splitting: EC_GROUP_precompute_mult() 11314 will now compute a table of multiples of the generator that 11315 makes subsequent invocations of EC_POINTs_mul() or EC_POINT_mul() 11316 faster (notably in the case of a single point multiplication, 11317 scalar * generator). 11318 11319 *Nils Larsch, Bodo Moeller* 11320 11321 * IPv6 support for certificate extensions. The various extensions 11322 which use the IP:a.b.c.d can now take IPv6 addresses using the 11323 formats of RFC1884 2.2 . IPv6 addresses are now also displayed 11324 correctly. 11325 11326 *Steve Henson* 11327 11328 * Added an ENGINE that implements RSA by performing private key 11329 exponentiations with the GMP library. The conversions to and from 11330 GMP's mpz_t format aren't optimised nor are any montgomery forms 11331 cached, and on x86 it appears OpenSSL's own performance has caught up. 11332 However there are likely to be other architectures where GMP could 11333 provide a boost. This ENGINE is not built in by default, but it can be 11334 specified at Configure time and should be accompanied by the necessary 11335 linker additions, eg; 11336 ./config -DOPENSSL_USE_GMP -lgmp 11337 11338 *Geoff Thorpe* 11339 11340 * "openssl engine" will not display ENGINE/DSO load failure errors when 11341 testing availability of engines with "-t" - the old behaviour is 11342 produced by increasing the feature's verbosity with "-tt". 11343 11344 *Geoff Thorpe* 11345 11346 * ECDSA routines: under certain error conditions uninitialized BN objects 11347 could be freed. Solution: make sure initialization is performed early 11348 enough. (Reported and fix supplied by Nils Larsch <nla@trustcenter.de> 11349 via PR#459) 11350 11351 *Lutz Jaenicke* 11352 11353 * Key-generation can now be implemented in RSA_METHOD, DSA_METHOD 11354 and DH_METHOD (eg. by ENGINE implementations) to override the normal 11355 software implementations. For DSA and DH, parameter generation can 11356 also be overridden by providing the appropriate method callbacks. 11357 11358 *Geoff Thorpe* 11359 11360 * Change the "progress" mechanism used in key-generation and 11361 primality testing to functions that take a new BN_GENCB pointer in 11362 place of callback/argument pairs. The new API functions have `_ex` 11363 postfixes and the older functions are reimplemented as wrappers for 11364 the new ones. The OPENSSL_NO_DEPRECATED symbol can be used to hide 11365 declarations of the old functions to help (graceful) attempts to 11366 migrate to the new functions. Also, the new key-generation API 11367 functions operate on a caller-supplied key-structure and return 11368 success/failure rather than returning a key or NULL - this is to 11369 help make "keygen" another member function of RSA_METHOD etc. 11370 11371 Example for using the new callback interface: 11372 11373 int (*my_callback)(int a, int b, BN_GENCB *cb) = ...; 11374 void *my_arg = ...; 11375 BN_GENCB my_cb; 11376 11377 BN_GENCB_set(&my_cb, my_callback, my_arg); 11378 11379 return BN_is_prime_ex(some_bignum, BN_prime_checks, NULL, &cb); 11380 /* For the meaning of a, b in calls to my_callback(), see the 11381 * documentation of the function that calls the callback. 11382 * cb will point to my_cb; my_arg can be retrieved as cb->arg. 11383 * my_callback should return 1 if it wants BN_is_prime_ex() 11384 * to continue, or 0 to stop. 11385 */ 11386 11387 *Geoff Thorpe* 11388 11389 * Change the ZLIB compression method to be stateful, and make it 11390 available to TLS with the number defined in 11391 draft-ietf-tls-compression-04.txt. 11392 11393 *Richard Levitte* 11394 11395 * Add the ASN.1 structures and functions for CertificatePair, which 11396 is defined as follows (according to X.509_4thEditionDraftV6.pdf): 11397 11398 CertificatePair ::= SEQUENCE { 11399 forward [0] Certificate OPTIONAL, 11400 reverse [1] Certificate OPTIONAL, 11401 -- at least one of the pair shall be present -- } 11402 11403 Also implement the PEM functions to read and write certificate 11404 pairs, and defined the PEM tag as "CERTIFICATE PAIR". 11405 11406 This needed to be defined, mostly for the sake of the LDAP 11407 attribute crossCertificatePair, but may prove useful elsewhere as 11408 well. 11409 11410 *Richard Levitte* 11411 11412 * Make it possible to inhibit symlinking of shared libraries in 11413 Makefile.shared, for Cygwin's sake. 11414 11415 *Richard Levitte* 11416 11417 * Extend the BIGNUM API by creating a function 11418 void BN_set_negative(BIGNUM *a, int neg); 11419 and a macro that behave like 11420 int BN_is_negative(const BIGNUM *a); 11421 11422 to avoid the need to access 'a->neg' directly in applications. 11423 11424 *Nils Larsch* 11425 11426 * Implement fast modular reduction for pseudo-Mersenne primes 11427 used in NIST curves (crypto/bn/bn_nist.c, crypto/ec/ecp_nist.c). 11428 EC_GROUP_new_curve_GFp() will now automatically use this 11429 if applicable. 11430 11431 *Nils Larsch <nla@trustcenter.de>* 11432 11433 * Add new lock type (CRYPTO_LOCK_BN). 11434 11435 *Bodo Moeller* 11436 11437 * Change the ENGINE framework to automatically load engines 11438 dynamically from specific directories unless they could be 11439 found to already be built in or loaded. Move all the 11440 current engines except for the cryptodev one to a new 11441 directory engines/. 11442 The engines in engines/ are built as shared libraries if 11443 the "shared" options was given to ./Configure or ./config. 11444 Otherwise, they are inserted in libcrypto.a. 11445 /usr/local/ssl/engines is the default directory for dynamic 11446 engines, but that can be overridden at configure time through 11447 the usual use of --prefix and/or --openssldir, and at run 11448 time with the environment variable OPENSSL_ENGINES. 11449 11450 *Geoff Thorpe and Richard Levitte* 11451 11452 * Add Makefile.shared, a helper makefile to build shared 11453 libraries. Adapt Makefile.org. 11454 11455 *Richard Levitte* 11456 11457 * Add version info to Win32 DLLs. 11458 11459 *Peter 'Luna' Runestig" <peter@runestig.com>* 11460 11461 * Add new 'medium level' PKCS#12 API. Certificates and keys 11462 can be added using this API to created arbitrary PKCS#12 11463 files while avoiding the low-level API. 11464 11465 New options to PKCS12_create(), key or cert can be NULL and 11466 will then be omitted from the output file. The encryption 11467 algorithm NIDs can be set to -1 for no encryption, the mac 11468 iteration count can be set to 0 to omit the mac. 11469 11470 Enhance pkcs12 utility by making the -nokeys and -nocerts 11471 options work when creating a PKCS#12 file. New option -nomac 11472 to omit the mac, NONE can be set for an encryption algorithm. 11473 New code is modified to use the enhanced PKCS12_create() 11474 instead of the low-level API. 11475 11476 *Steve Henson* 11477 11478 * Extend ASN1 encoder to support indefinite length constructed 11479 encoding. This can output sequences tags and octet strings in 11480 this form. Modify pk7_asn1.c to support indefinite length 11481 encoding. This is experimental and needs additional code to 11482 be useful, such as an ASN1 bio and some enhanced streaming 11483 PKCS#7 code. 11484 11485 Extend template encode functionality so that tagging is passed 11486 down to the template encoder. 11487 11488 *Steve Henson* 11489 11490 * Let 'openssl req' fail if an argument to '-newkey' is not 11491 recognized instead of using RSA as a default. 11492 11493 *Bodo Moeller* 11494 11495 * Add support for ECC-based ciphersuites from draft-ietf-tls-ecc-01.txt. 11496 As these are not official, they are not included in "ALL"; 11497 the "ECCdraft" ciphersuite group alias can be used to select them. 11498 11499 *Vipul Gupta and Sumit Gupta (Sun Microsystems Laboratories)* 11500 11501 * Add ECDH engine support. 11502 11503 *Nils Gura and Douglas Stebila (Sun Microsystems Laboratories)* 11504 11505 * Add ECDH in new directory crypto/ecdh/. 11506 11507 *Douglas Stebila (Sun Microsystems Laboratories)* 11508 11509 * Let BN_rand_range() abort with an error after 100 iterations 11510 without success (which indicates a broken PRNG). 11511 11512 *Bodo Moeller* 11513 11514 * Change BN_mod_sqrt() so that it verifies that the input value 11515 is really the square of the return value. (Previously, 11516 BN_mod_sqrt would show GIGO behaviour.) 11517 11518 *Bodo Moeller* 11519 11520 * Add named elliptic curves over binary fields from X9.62, SECG, 11521 and WAP/WTLS; add OIDs that were still missing. 11522 11523 *Sheueling Chang Shantz and Douglas Stebila (Sun Microsystems Laboratories)* 11524 11525 * Extend the EC library for elliptic curves over binary fields 11526 (new files ec2_smpl.c, ec2_smpt.c, ec2_mult.c in crypto/ec/). 11527 New EC_METHOD: 11528 11529 EC_GF2m_simple_method 11530 11531 New API functions: 11532 11533 EC_GROUP_new_curve_GF2m 11534 EC_GROUP_set_curve_GF2m 11535 EC_GROUP_get_curve_GF2m 11536 EC_POINT_set_affine_coordinates_GF2m 11537 EC_POINT_get_affine_coordinates_GF2m 11538 EC_POINT_set_compressed_coordinates_GF2m 11539 11540 Point compression for binary fields is disabled by default for 11541 patent reasons (compile with OPENSSL_EC_BIN_PT_COMP defined to 11542 enable it). 11543 11544 As binary polynomials are represented as BIGNUMs, various members 11545 of the EC_GROUP and EC_POINT data structures can be shared 11546 between the implementations for prime fields and binary fields; 11547 the above `..._GF2m functions` (except for EX_GROUP_new_curve_GF2m) 11548 are essentially identical to their `..._GFp` counterparts. 11549 (For simplicity, the `..._GFp` prefix has been dropped from 11550 various internal method names.) 11551 11552 An internal 'field_div' method (similar to 'field_mul' and 11553 'field_sqr') has been added; this is used only for binary fields. 11554 11555 *Sheueling Chang Shantz and Douglas Stebila (Sun Microsystems Laboratories)* 11556 11557 * Optionally dispatch EC_POINT_mul(), EC_POINT_precompute_mult() 11558 through methods ('mul', 'precompute_mult'). 11559 11560 The generic implementations (now internally called 'ec_wNAF_mul' 11561 and 'ec_wNAF_precomputed_mult') remain the default if these 11562 methods are undefined. 11563 11564 *Sheueling Chang Shantz and Douglas Stebila (Sun Microsystems Laboratories)* 11565 11566 * New function EC_GROUP_get_degree, which is defined through 11567 EC_METHOD. For curves over prime fields, this returns the bit 11568 length of the modulus. 11569 11570 *Sheueling Chang Shantz and Douglas Stebila (Sun Microsystems Laboratories)* 11571 11572 * New functions EC_GROUP_dup, EC_POINT_dup. 11573 (These simply call ..._new and ..._copy). 11574 11575 *Sheueling Chang Shantz and Douglas Stebila (Sun Microsystems Laboratories)* 11576 11577 * Add binary polynomial arithmetic software in crypto/bn/bn_gf2m.c. 11578 Polynomials are represented as BIGNUMs (where the sign bit is not 11579 used) in the following functions [macros]: 11580 11581 BN_GF2m_add 11582 BN_GF2m_sub [= BN_GF2m_add] 11583 BN_GF2m_mod [wrapper for BN_GF2m_mod_arr] 11584 BN_GF2m_mod_mul [wrapper for BN_GF2m_mod_mul_arr] 11585 BN_GF2m_mod_sqr [wrapper for BN_GF2m_mod_sqr_arr] 11586 BN_GF2m_mod_inv 11587 BN_GF2m_mod_exp [wrapper for BN_GF2m_mod_exp_arr] 11588 BN_GF2m_mod_sqrt [wrapper for BN_GF2m_mod_sqrt_arr] 11589 BN_GF2m_mod_solve_quad [wrapper for BN_GF2m_mod_solve_quad_arr] 11590 BN_GF2m_cmp [= BN_ucmp] 11591 11592 (Note that only the 'mod' functions are actually for fields GF(2^m). 11593 BN_GF2m_add() is misnomer, but this is for the sake of consistency.) 11594 11595 For some functions, an the irreducible polynomial defining a 11596 field can be given as an 'unsigned int[]' with strictly 11597 decreasing elements giving the indices of those bits that are set; 11598 i.e., p[] represents the polynomial 11599 f(t) = t^p[0] + t^p[1] + ... + t^p[k] 11600 where 11601 p[0] > p[1] > ... > p[k] = 0. 11602 This applies to the following functions: 11603 11604 BN_GF2m_mod_arr 11605 BN_GF2m_mod_mul_arr 11606 BN_GF2m_mod_sqr_arr 11607 BN_GF2m_mod_inv_arr [wrapper for BN_GF2m_mod_inv] 11608 BN_GF2m_mod_div_arr [wrapper for BN_GF2m_mod_div] 11609 BN_GF2m_mod_exp_arr 11610 BN_GF2m_mod_sqrt_arr 11611 BN_GF2m_mod_solve_quad_arr 11612 BN_GF2m_poly2arr 11613 BN_GF2m_arr2poly 11614 11615 Conversion can be performed by the following functions: 11616 11617 BN_GF2m_poly2arr 11618 BN_GF2m_arr2poly 11619 11620 bntest.c has additional tests for binary polynomial arithmetic. 11621 11622 Two implementations for BN_GF2m_mod_div() are available. 11623 The default algorithm simply uses BN_GF2m_mod_inv() and 11624 BN_GF2m_mod_mul(). The alternative algorithm is compiled in only 11625 if OPENSSL_SUN_GF2M_DIV is defined (patent pending; read the 11626 copyright notice in crypto/bn/bn_gf2m.c before enabling it). 11627 11628 *Sheueling Chang Shantz and Douglas Stebila (Sun Microsystems Laboratories)* 11629 11630 * Add new error code 'ERR_R_DISABLED' that can be used when some 11631 functionality is disabled at compile-time. 11632 11633 *Douglas Stebila <douglas.stebila@sun.com>* 11634 11635 * Change default behaviour of 'openssl asn1parse' so that more 11636 information is visible when viewing, e.g., a certificate: 11637 11638 Modify asn1_parse2 (crypto/asn1/asn1_par.c) so that in non-'dump' 11639 mode the content of non-printable OCTET STRINGs is output in a 11640 style similar to INTEGERs, but with '[HEX DUMP]' prepended to 11641 avoid the appearance of a printable string. 11642 11643 *Nils Larsch <nla@trustcenter.de>* 11644 11645 * Add 'asn1_flag' and 'asn1_form' member to EC_GROUP with access 11646 functions 11647 EC_GROUP_set_asn1_flag() 11648 EC_GROUP_get_asn1_flag() 11649 EC_GROUP_set_point_conversion_form() 11650 EC_GROUP_get_point_conversion_form() 11651 These control ASN1 encoding details: 11652 - Curves (i.e., groups) are encoded explicitly unless asn1_flag 11653 has been set to OPENSSL_EC_NAMED_CURVE. 11654 - Points are encoded in uncompressed form by default; options for 11655 asn1_for are as for point2oct, namely 11656 POINT_CONVERSION_COMPRESSED 11657 POINT_CONVERSION_UNCOMPRESSED 11658 POINT_CONVERSION_HYBRID 11659 11660 Also add 'seed' and 'seed_len' members to EC_GROUP with access 11661 functions 11662 EC_GROUP_set_seed() 11663 EC_GROUP_get0_seed() 11664 EC_GROUP_get_seed_len() 11665 This is used only for ASN1 purposes (so far). 11666 11667 *Nils Larsch <nla@trustcenter.de>* 11668 11669 * Add 'field_type' member to EC_METHOD, which holds the NID 11670 of the appropriate field type OID. The new function 11671 EC_METHOD_get_field_type() returns this value. 11672 11673 *Nils Larsch <nla@trustcenter.de>* 11674 11675 * Add functions 11676 EC_POINT_point2bn() 11677 EC_POINT_bn2point() 11678 EC_POINT_point2hex() 11679 EC_POINT_hex2point() 11680 providing useful interfaces to EC_POINT_point2oct() and 11681 EC_POINT_oct2point(). 11682 11683 *Nils Larsch <nla@trustcenter.de>* 11684 11685 * Change internals of the EC library so that the functions 11686 EC_GROUP_set_generator() 11687 EC_GROUP_get_generator() 11688 EC_GROUP_get_order() 11689 EC_GROUP_get_cofactor() 11690 are implemented directly in crypto/ec/ec_lib.c and not dispatched 11691 to methods, which would lead to unnecessary code duplication when 11692 adding different types of curves. 11693 11694 *Nils Larsch <nla@trustcenter.de> with input by Bodo Moeller* 11695 11696 * Implement compute_wNAF (crypto/ec/ec_mult.c) without BIGNUM 11697 arithmetic, and such that modified wNAFs are generated 11698 (which avoid length expansion in many cases). 11699 11700 *Bodo Moeller* 11701 11702 * Add a function EC_GROUP_check_discriminant() (defined via 11703 EC_METHOD) that verifies that the curve discriminant is non-zero. 11704 11705 Add a function EC_GROUP_check() that makes some sanity tests 11706 on a EC_GROUP, its generator and order. This includes 11707 EC_GROUP_check_discriminant(). 11708 11709 *Nils Larsch <nla@trustcenter.de>* 11710 11711 * Add ECDSA in new directory crypto/ecdsa/. 11712 11713 Add applications 'openssl ecparam' and 'openssl ecdsa' 11714 (these are based on 'openssl dsaparam' and 'openssl dsa'). 11715 11716 ECDSA support is also included in various other files across the 11717 library. Most notably, 11718 - 'openssl req' now has a '-newkey ecdsa:file' option; 11719 - EVP_PKCS82PKEY (crypto/evp/evp_pkey.c) now can handle ECDSA; 11720 - X509_PUBKEY_get (crypto/asn1/x_pubkey.c) and 11721 d2i_PublicKey (crypto/asn1/d2i_pu.c) have been modified to make 11722 them suitable for ECDSA where domain parameters must be 11723 extracted before the specific public key; 11724 - ECDSA engine support has been added. 11725 11726 *Nils Larsch <nla@trustcenter.de>* 11727 11728 * Include some named elliptic curves, and add OIDs from X9.62, 11729 SECG, and WAP/WTLS. Each curve can be obtained from the new 11730 function 11731 EC_GROUP_new_by_curve_name(), 11732 and the list of available named curves can be obtained with 11733 EC_get_builtin_curves(). 11734 Also add a 'curve_name' member to EC_GROUP objects, which can be 11735 accessed via 11736 EC_GROUP_set_curve_name() 11737 EC_GROUP_get_curve_name() 11738 11739 *Nils Larsch <larsch@trustcenter.de, Bodo Moeller* 11740 11741 * Remove a few calls to bn_wexpand() in BN_sqr() (the one in there 11742 was actually never needed) and in BN_mul(). The removal in BN_mul() 11743 required a small change in bn_mul_part_recursive() and the addition 11744 of the functions bn_cmp_part_words(), bn_sub_part_words() and 11745 bn_add_part_words(), which do the same thing as bn_cmp_words(), 11746 bn_sub_words() and bn_add_words() except they take arrays with 11747 differing sizes. 11748 11749 *Richard Levitte* 11750 11751### Changes between 0.9.7l and 0.9.7m [23 Feb 2007] 11752 11753 * Cleanse PEM buffers before freeing them since they may contain 11754 sensitive data. 11755 11756 *Benjamin Bennett <ben@psc.edu>* 11757 11758 * Include "!eNULL" in SSL_DEFAULT_CIPHER_LIST to make sure that 11759 a ciphersuite string such as "DEFAULT:RSA" cannot enable 11760 authentication-only ciphersuites. 11761 11762 *Bodo Moeller* 11763 11764 * Since AES128 and AES256 share a single mask bit in the logic of 11765 ssl/ssl_ciph.c, the code for masking out disabled ciphers needs a 11766 kludge to work properly if AES128 is available and AES256 isn't. 11767 11768 *Victor Duchovni* 11769 11770 * Expand security boundary to match 1.1.1 module. 11771 11772 *Steve Henson* 11773 11774 * Remove redundant features: hash file source, editing of test vectors 11775 modify fipsld to use external fips_premain.c signature. 11776 11777 *Steve Henson* 11778 11779 * New perl script mkfipsscr.pl to create shell scripts or batch files to 11780 run algorithm test programs. 11781 11782 *Steve Henson* 11783 11784 * Make algorithm test programs more tolerant of whitespace. 11785 11786 *Steve Henson* 11787 11788 * Have SSL/TLS server implementation tolerate "mismatched" record 11789 protocol version while receiving ClientHello even if the 11790 ClientHello is fragmented. (The server can't insist on the 11791 particular protocol version it has chosen before the ServerHello 11792 message has informed the client about his choice.) 11793 11794 *Bodo Moeller* 11795 11796 * Load error codes if they are not already present instead of using a 11797 static variable. This allows them to be cleanly unloaded and reloaded. 11798 11799 *Steve Henson* 11800 11801### Changes between 0.9.7k and 0.9.7l [28 Sep 2006] 11802 11803 * Introduce limits to prevent malicious keys being able to 11804 cause a denial of service. ([CVE-2006-2940]) 11805 11806 *Steve Henson, Bodo Moeller* 11807 11808 * Fix ASN.1 parsing of certain invalid structures that can result 11809 in a denial of service. ([CVE-2006-2937]) [Steve Henson] 11810 11811 * Fix buffer overflow in SSL_get_shared_ciphers() function. 11812 ([CVE-2006-3738]) [Tavis Ormandy and Will Drewry, Google Security Team] 11813 11814 * Fix SSL client code which could crash if connecting to a 11815 malicious SSLv2 server. ([CVE-2006-4343]) 11816 11817 *Tavis Ormandy and Will Drewry, Google Security Team* 11818 11819 * Change ciphersuite string processing so that an explicit 11820 ciphersuite selects this one ciphersuite (so that "AES256-SHA" 11821 will no longer include "AES128-SHA"), and any other similar 11822 ciphersuite (same bitmap) from *other* protocol versions (so that 11823 "RC4-MD5" will still include both the SSL 2.0 ciphersuite and the 11824 SSL 3.0/TLS 1.0 ciphersuite). This is a backport combining 11825 changes from 0.9.8b and 0.9.8d. 11826 11827 *Bodo Moeller* 11828 11829### Changes between 0.9.7j and 0.9.7k [05 Sep 2006] 11830 11831 * Avoid PKCS #1 v1.5 signature attack discovered by Daniel Bleichenbacher 11832 ([CVE-2006-4339]) [Ben Laurie and Google Security Team] 11833 11834 * Change the Unix randomness entropy gathering to use poll() when 11835 possible instead of select(), since the latter has some 11836 undesirable limitations. 11837 11838 *Darryl Miles via Richard Levitte and Bodo Moeller* 11839 11840 * Disable rogue ciphersuites: 11841 11842 - SSLv2 0x08 0x00 0x80 ("RC4-64-MD5") 11843 - SSLv3/TLSv1 0x00 0x61 ("EXP1024-RC2-CBC-MD5") 11844 - SSLv3/TLSv1 0x00 0x60 ("EXP1024-RC4-MD5") 11845 11846 The latter two were purportedly from 11847 draft-ietf-tls-56-bit-ciphersuites-0[01].txt, but do not really 11848 appear there. 11849 11850 Also deactivate the remaining ciphersuites from 11851 draft-ietf-tls-56-bit-ciphersuites-01.txt. These are just as 11852 unofficial, and the ID has long expired. 11853 11854 *Bodo Moeller* 11855 11856 * Fix RSA blinding Heisenbug (problems sometimes occurred on 11857 dual-core machines) and other potential thread-safety issues. 11858 11859 *Bodo Moeller* 11860 11861### Changes between 0.9.7i and 0.9.7j [04 May 2006] 11862 11863 * Adapt fipsld and the build system to link against the validated FIPS 11864 module in FIPS mode. 11865 11866 *Steve Henson* 11867 11868 * Fixes for VC++ 2005 build under Windows. 11869 11870 *Steve Henson* 11871 11872 * Add new Windows build target VC-32-GMAKE for VC++. This uses GNU make 11873 from a Windows bash shell such as MSYS. It is autodetected from the 11874 "config" script when run from a VC++ environment. Modify standard VC++ 11875 build to use fipscanister.o from the GNU make build. 11876 11877 *Steve Henson* 11878 11879### Changes between 0.9.7h and 0.9.7i [14 Oct 2005] 11880 11881 * Wrapped the definition of EVP_MAX_MD_SIZE in a #ifdef OPENSSL_FIPS. 11882 The value now differs depending on if you build for FIPS or not. 11883 BEWARE! A program linked with a shared FIPSed libcrypto can't be 11884 safely run with a non-FIPSed libcrypto, as it may crash because of 11885 the difference induced by this change. 11886 11887 *Andy Polyakov* 11888 11889### Changes between 0.9.7g and 0.9.7h [11 Oct 2005] 11890 11891 * Remove the functionality of SSL_OP_MSIE_SSLV2_RSA_PADDING 11892 (part of SSL_OP_ALL). This option used to disable the 11893 countermeasure against man-in-the-middle protocol-version 11894 rollback in the SSL 2.0 server implementation, which is a bad 11895 idea. ([CVE-2005-2969]) 11896 11897 *Bodo Moeller; problem pointed out by Yutaka Oiwa (Research Center 11898 for Information Security, National Institute of Advanced Industrial 11899 Science and Technology [AIST, Japan)]* 11900 11901 * Minimal support for X9.31 signatures and PSS padding modes. This is 11902 mainly for FIPS compliance and not fully integrated at this stage. 11903 11904 *Steve Henson* 11905 11906 * For DSA signing, unless DSA_FLAG_NO_EXP_CONSTTIME is set, perform 11907 the exponentiation using a fixed-length exponent. (Otherwise, 11908 the information leaked through timing could expose the secret key 11909 after many signatures; cf. Bleichenbacher's attack on DSA with 11910 biased k.) 11911 11912 *Bodo Moeller* 11913 11914 * Make a new fixed-window mod_exp implementation the default for 11915 RSA, DSA, and DH private-key operations so that the sequence of 11916 squares and multiplies and the memory access pattern are 11917 independent of the particular secret key. This will mitigate 11918 cache-timing and potential related attacks. 11919 11920 BN_mod_exp_mont_consttime() is the new exponentiation implementation, 11921 and this is automatically used by BN_mod_exp_mont() if the new flag 11922 BN_FLG_EXP_CONSTTIME is set for the exponent. RSA, DSA, and DH 11923 will use this BN flag for private exponents unless the flag 11924 RSA_FLAG_NO_EXP_CONSTTIME, DSA_FLAG_NO_EXP_CONSTTIME, or 11925 DH_FLAG_NO_EXP_CONSTTIME, respectively, is set. 11926 11927 *Matthew D Wood (Intel Corp), with some changes by Bodo Moeller* 11928 11929 * Change the client implementation for SSLv23_method() and 11930 SSLv23_client_method() so that is uses the SSL 3.0/TLS 1.0 11931 Client Hello message format if the SSL_OP_NO_SSLv2 option is set. 11932 (Previously, the SSL 2.0 backwards compatible Client Hello 11933 message format would be used even with SSL_OP_NO_SSLv2.) 11934 11935 *Bodo Moeller* 11936 11937 * Add support for smime-type MIME parameter in S/MIME messages which some 11938 clients need. 11939 11940 *Steve Henson* 11941 11942 * New function BN_MONT_CTX_set_locked() to set montgomery parameters in 11943 a threadsafe manner. Modify rsa code to use new function and add calls 11944 to dsa and dh code (which had race conditions before). 11945 11946 *Steve Henson* 11947 11948 * Include the fixed error library code in the C error file definitions 11949 instead of fixing them up at runtime. This keeps the error code 11950 structures constant. 11951 11952 *Steve Henson* 11953 11954### Changes between 0.9.7f and 0.9.7g [11 Apr 2005] 11955 11956[NB: OpenSSL 0.9.7h and later 0.9.7 patch levels were released after 11957OpenSSL 0.9.8.] 11958 11959 * Fixes for newer kerberos headers. NB: the casts are needed because 11960 the 'length' field is signed on one version and unsigned on another 11961 with no (?) obvious way to tell the difference, without these VC++ 11962 complains. Also the "definition" of FAR (blank) is no longer included 11963 nor is the error ENOMEM. KRB5_PRIVATE has to be set to 1 to pick up 11964 some needed definitions. 11965 11966 *Steve Henson* 11967 11968 * Undo Cygwin change. 11969 11970 *Ulf Möller* 11971 11972 * Added support for proxy certificates according to RFC 3820. 11973 Because they may be a security thread to unaware applications, 11974 they must be explicitly allowed in run-time. See 11975 docs/HOWTO/proxy_certificates.txt for further information. 11976 11977 *Richard Levitte* 11978 11979### Changes between 0.9.7e and 0.9.7f [22 Mar 2005] 11980 11981 * Use (SSL_RANDOM_VALUE - 4) bytes of pseudo random data when generating 11982 server and client random values. Previously 11983 (SSL_RANDOM_VALUE - sizeof(time_t)) would be used which would result in 11984 less random data when sizeof(time_t) > 4 (some 64 bit platforms). 11985 11986 This change has negligible security impact because: 11987 11988 1. Server and client random values still have 24 bytes of pseudo random 11989 data. 11990 11991 2. Server and client random values are sent in the clear in the initial 11992 handshake. 11993 11994 3. The master secret is derived using the premaster secret (48 bytes in 11995 size for static RSA ciphersuites) as well as client server and random 11996 values. 11997 11998 The OpenSSL team would like to thank the UK NISCC for bringing this issue 11999 to our attention. 12000 12001 *Stephen Henson, reported by UK NISCC* 12002 12003 * Use Windows randomness collection on Cygwin. 12004 12005 *Ulf Möller* 12006 12007 * Fix hang in EGD/PRNGD query when communication socket is closed 12008 prematurely by EGD/PRNGD. 12009 12010 *Darren Tucker <dtucker@zip.com.au> via Lutz Jänicke, resolves #1014* 12011 12012 * Prompt for pass phrases when appropriate for PKCS12 input format. 12013 12014 *Steve Henson* 12015 12016 * Back-port of selected performance improvements from development 12017 branch, as well as improved support for PowerPC platforms. 12018 12019 *Andy Polyakov* 12020 12021 * Add lots of checks for memory allocation failure, error codes to indicate 12022 failure and freeing up memory if a failure occurs. 12023 12024 *Nauticus Networks SSL Team <openssl@nauticusnet.com>, Steve Henson* 12025 12026 * Add new -passin argument to dgst. 12027 12028 *Steve Henson* 12029 12030 * Perform some character comparisons of different types in X509_NAME_cmp: 12031 this is needed for some certificates that re-encode DNs into UTF8Strings 12032 (in violation of RFC3280) and can't or won't issue name rollover 12033 certificates. 12034 12035 *Steve Henson* 12036 12037 * Make an explicit check during certificate validation to see that 12038 the CA setting in each certificate on the chain is correct. As a 12039 side effect always do the following basic checks on extensions, 12040 not just when there's an associated purpose to the check: 12041 12042 - if there is an unhandled critical extension (unless the user 12043 has chosen to ignore this fault) 12044 - if the path length has been exceeded (if one is set at all) 12045 - that certain extensions fit the associated purpose (if one has 12046 been given) 12047 12048 *Richard Levitte* 12049 12050### Changes between 0.9.7d and 0.9.7e [25 Oct 2004] 12051 12052 * Avoid a race condition when CRLs are checked in a multi threaded 12053 environment. This would happen due to the reordering of the revoked 12054 entries during signature checking and serial number lookup. Now the 12055 encoding is cached and the serial number sort performed under a lock. 12056 Add new STACK function sk_is_sorted(). 12057 12058 *Steve Henson* 12059 12060 * Add Delta CRL to the extension code. 12061 12062 *Steve Henson* 12063 12064 * Various fixes to s3_pkt.c so alerts are sent properly. 12065 12066 *David Holmes <d.holmes@f5.com>* 12067 12068 * Reduce the chances of duplicate issuer name and serial numbers (in 12069 violation of RFC3280) using the OpenSSL certificate creation utilities. 12070 This is done by creating a random 64 bit value for the initial serial 12071 number when a serial number file is created or when a self signed 12072 certificate is created using 'openssl req -x509'. The initial serial 12073 number file is created using 'openssl x509 -next_serial' in CA.pl 12074 rather than being initialized to 1. 12075 12076 *Steve Henson* 12077 12078### Changes between 0.9.7c and 0.9.7d [17 Mar 2004] 12079 12080 * Fix null-pointer assignment in do_change_cipher_spec() revealed 12081 by using the Codenomicon TLS Test Tool ([CVE-2004-0079]) 12082 12083 *Joe Orton, Steve Henson* 12084 12085 * Fix flaw in SSL/TLS handshaking when using Kerberos ciphersuites 12086 ([CVE-2004-0112]) 12087 12088 *Joe Orton, Steve Henson* 12089 12090 * Make it possible to have multiple active certificates with the same 12091 subject in the CA index file. This is done only if the keyword 12092 'unique_subject' is set to 'no' in the main CA section (default 12093 if 'CA_default') of the configuration file. The value is saved 12094 with the database itself in a separate index attribute file, 12095 named like the index file with '.attr' appended to the name. 12096 12097 *Richard Levitte* 12098 12099 * X509 verify fixes. Disable broken certificate workarounds when 12100 X509_V_FLAGS_X509_STRICT is set. Check CRL issuer has cRLSign set if 12101 keyUsage extension present. Don't accept CRLs with unhandled critical 12102 extensions: since verify currently doesn't process CRL extensions this 12103 rejects a CRL with *any* critical extensions. Add new verify error codes 12104 for these cases. 12105 12106 *Steve Henson* 12107 12108 * When creating an OCSP nonce use an OCTET STRING inside the extnValue. 12109 A clarification of RFC2560 will require the use of OCTET STRINGs and 12110 some implementations cannot handle the current raw format. Since OpenSSL 12111 copies and compares OCSP nonces as opaque blobs without any attempt at 12112 parsing them this should not create any compatibility issues. 12113 12114 *Steve Henson* 12115 12116 * New md flag EVP_MD_CTX_FLAG_REUSE this allows md_data to be reused when 12117 calling EVP_MD_CTX_copy_ex() to avoid calling OPENSSL_malloc(). Without 12118 this HMAC (and other) operations are several times slower than OpenSSL 12119 < 0.9.7. 12120 12121 *Steve Henson* 12122 12123 * Print out GeneralizedTime and UTCTime in ASN1_STRING_print_ex(). 12124 12125 *Peter Sylvester <Peter.Sylvester@EdelWeb.fr>* 12126 12127 * Use the correct content when signing type "other". 12128 12129 *Steve Henson* 12130 12131### Changes between 0.9.7b and 0.9.7c [30 Sep 2003] 12132 12133 * Fix various bugs revealed by running the NISCC test suite: 12134 12135 Stop out of bounds reads in the ASN1 code when presented with 12136 invalid tags (CVE-2003-0543 and CVE-2003-0544). 12137 12138 Free up ASN1_TYPE correctly if ANY type is invalid ([CVE-2003-0545]). 12139 12140 If verify callback ignores invalid public key errors don't try to check 12141 certificate signature with the NULL public key. 12142 12143 *Steve Henson* 12144 12145 * New -ignore_err option in ocsp application to stop the server 12146 exiting on the first error in a request. 12147 12148 *Steve Henson* 12149 12150 * In ssl3_accept() (ssl/s3_srvr.c) only accept a client certificate 12151 if the server requested one: as stated in TLS 1.0 and SSL 3.0 12152 specifications. 12153 12154 *Steve Henson* 12155 12156 * In ssl3_get_client_hello() (ssl/s3_srvr.c), tolerate additional 12157 extra data after the compression methods not only for TLS 1.0 12158 but also for SSL 3.0 (as required by the specification). 12159 12160 *Bodo Moeller; problem pointed out by Matthias Loepfe* 12161 12162 * Change X509_certificate_type() to mark the key as exported/exportable 12163 when it's 512 *bits* long, not 512 bytes. 12164 12165 *Richard Levitte* 12166 12167 * Change AES_cbc_encrypt() so it outputs exact multiple of 12168 blocks during encryption. 12169 12170 *Richard Levitte* 12171 12172 * Various fixes to base64 BIO and non blocking I/O. On write 12173 flushes were not handled properly if the BIO retried. On read 12174 data was not being buffered properly and had various logic bugs. 12175 This also affects blocking I/O when the data being decoded is a 12176 certain size. 12177 12178 *Steve Henson* 12179 12180 * Various S/MIME bugfixes and compatibility changes: 12181 output correct application/pkcs7 MIME type if 12182 PKCS7_NOOLDMIMETYPE is set. Tolerate some broken signatures. 12183 Output CR+LF for EOL if PKCS7_CRLFEOL is set (this makes opening 12184 of files as .eml work). Correctly handle very long lines in MIME 12185 parser. 12186 12187 *Steve Henson* 12188 12189### Changes between 0.9.7a and 0.9.7b [10 Apr 2003] 12190 12191 * Countermeasure against the Klima-Pokorny-Rosa extension of 12192 Bleichbacher's attack on PKCS #1 v1.5 padding: treat 12193 a protocol version number mismatch like a decryption error 12194 in ssl3_get_client_key_exchange (ssl/s3_srvr.c). 12195 12196 *Bodo Moeller* 12197 12198 * Turn on RSA blinding by default in the default implementation 12199 to avoid a timing attack. Applications that don't want it can call 12200 RSA_blinding_off() or use the new flag RSA_FLAG_NO_BLINDING. 12201 They would be ill-advised to do so in most cases. 12202 12203 *Ben Laurie, Steve Henson, Geoff Thorpe, Bodo Moeller* 12204 12205 * Change RSA blinding code so that it works when the PRNG is not 12206 seeded (in this case, the secret RSA exponent is abused as 12207 an unpredictable seed -- if it is not unpredictable, there 12208 is no point in blinding anyway). Make RSA blinding thread-safe 12209 by remembering the creator's thread ID in rsa->blinding and 12210 having all other threads use local one-time blinding factors 12211 (this requires more computation than sharing rsa->blinding, but 12212 avoids excessive locking; and if an RSA object is not shared 12213 between threads, blinding will still be very fast). 12214 12215 *Bodo Moeller* 12216 12217 * Fixed a typo bug that would cause ENGINE_set_default() to set an 12218 ENGINE as defaults for all supported algorithms irrespective of 12219 the 'flags' parameter. 'flags' is now honoured, so applications 12220 should make sure they are passing it correctly. 12221 12222 *Geoff Thorpe* 12223 12224 * Target "mingw" now allows native Windows code to be generated in 12225 the Cygwin environment as well as with the MinGW compiler. 12226 12227 *Ulf Moeller* 12228 12229### Changes between 0.9.7 and 0.9.7a [19 Feb 2003] 12230 12231 * In ssl3_get_record (ssl/s3_pkt.c), minimize information leaked 12232 via timing by performing a MAC computation even if incorrect 12233 block cipher padding has been found. This is a countermeasure 12234 against active attacks where the attacker has to distinguish 12235 between bad padding and a MAC verification error. ([CVE-2003-0078]) 12236 12237 *Bodo Moeller; problem pointed out by Brice Canvel (EPFL), 12238 Alain Hiltgen (UBS), Serge Vaudenay (EPFL), and 12239 Martin Vuagnoux (EPFL, Ilion)* 12240 12241 * Make the no-err option work as intended. The intention with no-err 12242 is not to have the whole error stack handling routines removed from 12243 libcrypto, it's only intended to remove all the function name and 12244 reason texts, thereby removing some of the footprint that may not 12245 be interesting if those errors aren't displayed anyway. 12246 12247 NOTE: it's still possible for any application or module to have its 12248 own set of error texts inserted. The routines are there, just not 12249 used by default when no-err is given. 12250 12251 *Richard Levitte* 12252 12253 * Add support for FreeBSD on IA64. 12254 12255 *dirk.meyer@dinoex.sub.org via Richard Levitte, resolves #454* 12256 12257 * Adjust DES_cbc_cksum() so it returns the same value as the MIT 12258 Kerberos function mit_des_cbc_cksum(). Before this change, 12259 the value returned by DES_cbc_cksum() was like the one from 12260 mit_des_cbc_cksum(), except the bytes were swapped. 12261 12262 *Kevin Greaney <Kevin.Greaney@hp.com> and Richard Levitte* 12263 12264 * Allow an application to disable the automatic SSL chain building. 12265 Before this a rather primitive chain build was always performed in 12266 ssl3_output_cert_chain(): an application had no way to send the 12267 correct chain if the automatic operation produced an incorrect result. 12268 12269 Now the chain builder is disabled if either: 12270 12271 1. Extra certificates are added via SSL_CTX_add_extra_chain_cert(). 12272 12273 2. The mode flag SSL_MODE_NO_AUTO_CHAIN is set. 12274 12275 The reasoning behind this is that an application would not want the 12276 auto chain building to take place if extra chain certificates are 12277 present and it might also want a means of sending no additional 12278 certificates (for example the chain has two certificates and the 12279 root is omitted). 12280 12281 *Steve Henson* 12282 12283 * Add the possibility to build without the ENGINE framework. 12284 12285 *Steven Reddie <smr@essemer.com.au> via Richard Levitte* 12286 12287 * Under Win32 gmtime() can return NULL: check return value in 12288 OPENSSL_gmtime(). Add error code for case where gmtime() fails. 12289 12290 *Steve Henson* 12291 12292 * DSA routines: under certain error conditions uninitialized BN objects 12293 could be freed. Solution: make sure initialization is performed early 12294 enough. (Reported and fix supplied by Ivan D Nestlerode <nestler@MIT.EDU>, 12295 Nils Larsch <nla@trustcenter.de> via PR#459) 12296 12297 *Lutz Jaenicke* 12298 12299 * Another fix for SSLv2 session ID handling: the session ID was incorrectly 12300 checked on reconnect on the client side, therefore session resumption 12301 could still fail with a "ssl session id is different" error. This 12302 behaviour is masked when SSL_OP_ALL is used due to 12303 SSL_OP_MICROSOFT_SESS_ID_BUG being set. 12304 Behaviour observed by Crispin Flowerday <crispin@flowerday.cx> as 12305 followup to PR #377. 12306 12307 *Lutz Jaenicke* 12308 12309 * IA-32 assembler support enhancements: unified ELF targets, support 12310 for SCO/Caldera platforms, fix for Cygwin shared build. 12311 12312 *Andy Polyakov* 12313 12314 * Add support for FreeBSD on sparc64. As a consequence, support for 12315 FreeBSD on non-x86 processors is separate from x86 processors on 12316 the config script, much like the NetBSD support. 12317 12318 *Richard Levitte & Kris Kennaway <kris@obsecurity.org>* 12319 12320### Changes between 0.9.6h and 0.9.7 [31 Dec 2002] 12321 12322[NB: OpenSSL 0.9.6i and later 0.9.6 patch levels were released after 12323OpenSSL 0.9.7.] 12324 12325 * Fix session ID handling in SSLv2 client code: the SERVER FINISHED 12326 code (06) was taken as the first octet of the session ID and the last 12327 octet was ignored consequently. As a result SSLv2 client side session 12328 caching could not have worked due to the session ID mismatch between 12329 client and server. 12330 Behaviour observed by Crispin Flowerday <crispin@flowerday.cx> as 12331 PR #377. 12332 12333 *Lutz Jaenicke* 12334 12335 * Change the declaration of needed Kerberos libraries to use EX_LIBS 12336 instead of the special (and badly supported) LIBKRB5. LIBKRB5 is 12337 removed entirely. 12338 12339 *Richard Levitte* 12340 12341 * The hw_ncipher.c engine requires dynamic locks. Unfortunately, it 12342 seems that in spite of existing for more than a year, many application 12343 author have done nothing to provide the necessary callbacks, which 12344 means that this particular engine will not work properly anywhere. 12345 This is a very unfortunate situation which forces us, in the name 12346 of usability, to give the hw_ncipher.c a static lock, which is part 12347 of libcrypto. 12348 NOTE: This is for the 0.9.7 series ONLY. This hack will never 12349 appear in 0.9.8 or later. We EXPECT application authors to have 12350 dealt properly with this when 0.9.8 is released (unless we actually 12351 make such changes in the libcrypto locking code that changes will 12352 have to be made anyway). 12353 12354 *Richard Levitte* 12355 12356 * In asn1_d2i_read_bio() repeatedly call BIO_read() until all content 12357 octets have been read, EOF or an error occurs. Without this change 12358 some truncated ASN1 structures will not produce an error. 12359 12360 *Steve Henson* 12361 12362 * Disable Heimdal support, since it hasn't been fully implemented. 12363 Still give the possibility to force the use of Heimdal, but with 12364 warnings and a request that patches get sent to openssl-dev. 12365 12366 *Richard Levitte* 12367 12368 * Add the VC-CE target, introduce the WINCE sysname, and add 12369 INSTALL.WCE and appropriate conditionals to make it build. 12370 12371 *Steven Reddie <smr@essemer.com.au> via Richard Levitte* 12372 12373 * Change the DLL names for Cygwin to cygcrypto-x.y.z.dll and 12374 cygssl-x.y.z.dll, where x, y and z are the major, minor and 12375 edit numbers of the version. 12376 12377 *Corinna Vinschen <vinschen@redhat.com> and Richard Levitte* 12378 12379 * Introduce safe string copy and catenation functions 12380 (BUF_strlcpy() and BUF_strlcat()). 12381 12382 *Ben Laurie (CHATS) and Richard Levitte* 12383 12384 * Avoid using fixed-size buffers for one-line DNs. 12385 12386 *Ben Laurie (CHATS)* 12387 12388 * Add BUF_MEM_grow_clean() to avoid information leakage when 12389 resizing buffers containing secrets, and use where appropriate. 12390 12391 *Ben Laurie (CHATS)* 12392 12393 * Avoid using fixed size buffers for configuration file location. 12394 12395 *Ben Laurie (CHATS)* 12396 12397 * Avoid filename truncation for various CA files. 12398 12399 *Ben Laurie (CHATS)* 12400 12401 * Use sizeof in preference to magic numbers. 12402 12403 *Ben Laurie (CHATS)* 12404 12405 * Avoid filename truncation in cert requests. 12406 12407 *Ben Laurie (CHATS)* 12408 12409 * Add assertions to check for (supposedly impossible) buffer 12410 overflows. 12411 12412 *Ben Laurie (CHATS)* 12413 12414 * Don't cache truncated DNS entries in the local cache (this could 12415 potentially lead to a spoofing attack). 12416 12417 *Ben Laurie (CHATS)* 12418 12419 * Fix various buffers to be large enough for hex/decimal 12420 representations in a platform independent manner. 12421 12422 *Ben Laurie (CHATS)* 12423 12424 * Add CRYPTO_realloc_clean() to avoid information leakage when 12425 resizing buffers containing secrets, and use where appropriate. 12426 12427 *Ben Laurie (CHATS)* 12428 12429 * Add BIO_indent() to avoid much slightly worrying code to do 12430 indents. 12431 12432 *Ben Laurie (CHATS)* 12433 12434 * Convert sprintf()/BIO_puts() to BIO_printf(). 12435 12436 *Ben Laurie (CHATS)* 12437 12438 * buffer_gets() could terminate with the buffer only half 12439 full. Fixed. 12440 12441 *Ben Laurie (CHATS)* 12442 12443 * Add assertions to prevent user-supplied crypto functions from 12444 overflowing internal buffers by having large block sizes, etc. 12445 12446 *Ben Laurie (CHATS)* 12447 12448 * New OPENSSL_assert() macro (similar to assert(), but enabled 12449 unconditionally). 12450 12451 *Ben Laurie (CHATS)* 12452 12453 * Eliminate unused copy of key in RC4. 12454 12455 *Ben Laurie (CHATS)* 12456 12457 * Eliminate unused and incorrectly sized buffers for IV in pem.h. 12458 12459 *Ben Laurie (CHATS)* 12460 12461 * Fix off-by-one error in EGD path. 12462 12463 *Ben Laurie (CHATS)* 12464 12465 * If RANDFILE path is too long, ignore instead of truncating. 12466 12467 *Ben Laurie (CHATS)* 12468 12469 * Eliminate unused and incorrectly sized X.509 structure 12470 CBCParameter. 12471 12472 *Ben Laurie (CHATS)* 12473 12474 * Eliminate unused and dangerous function knumber(). 12475 12476 *Ben Laurie (CHATS)* 12477 12478 * Eliminate unused and dangerous structure, KSSL_ERR. 12479 12480 *Ben Laurie (CHATS)* 12481 12482 * Protect against overlong session ID context length in an encoded 12483 session object. Since these are local, this does not appear to be 12484 exploitable. 12485 12486 *Ben Laurie (CHATS)* 12487 12488 * Change from security patch (see 0.9.6e below) that did not affect 12489 the 0.9.6 release series: 12490 12491 Remote buffer overflow in SSL3 protocol - an attacker could 12492 supply an oversized master key in Kerberos-enabled versions. 12493 ([CVE-2002-0657]) 12494 12495 *Ben Laurie (CHATS)* 12496 12497 * Change the SSL kerb5 codes to match RFC 2712. 12498 12499 *Richard Levitte* 12500 12501 * Make -nameopt work fully for req and add -reqopt switch. 12502 12503 *Michael Bell <michael.bell@rz.hu-berlin.de>, Steve Henson* 12504 12505 * The "block size" for block ciphers in CFB and OFB mode should be 1. 12506 12507 *Steve Henson, reported by Yngve Nysaeter Pettersen <yngve@opera.com>* 12508 12509 * Make sure tests can be performed even if the corresponding algorithms 12510 have been removed entirely. This was also the last step to make 12511 OpenSSL compilable with DJGPP under all reasonable conditions. 12512 12513 *Richard Levitte, Doug Kaufman <dkaufman@rahul.net>* 12514 12515 * Add cipher selection rules COMPLEMENTOFALL and COMPLEMENTOFDEFAULT 12516 to allow version independent disabling of normally unselected ciphers, 12517 which may be activated as a side-effect of selecting a single cipher. 12518 12519 (E.g., cipher list string "RSA" enables ciphersuites that are left 12520 out of "ALL" because they do not provide symmetric encryption. 12521 "RSA:!COMPLEMEMENTOFALL" avoids these unsafe ciphersuites.) 12522 12523 *Lutz Jaenicke, Bodo Moeller* 12524 12525 * Add appropriate support for separate platform-dependent build 12526 directories. The recommended way to make a platform-dependent 12527 build directory is the following (tested on Linux), maybe with 12528 some local tweaks: 12529 12530 # Place yourself outside of the OpenSSL source tree. In 12531 # this example, the environment variable OPENSSL_SOURCE 12532 # is assumed to contain the absolute OpenSSL source directory. 12533 mkdir -p objtree/"`uname -s`-`uname -r`-`uname -m`" 12534 cd objtree/"`uname -s`-`uname -r`-`uname -m`" 12535 (cd $OPENSSL_SOURCE; find . -type f) | while read F; do 12536 mkdir -p `dirname $F` 12537 ln -s $OPENSSL_SOURCE/$F $F 12538 done 12539 12540 To be absolutely sure not to disturb the source tree, a "make clean" 12541 is a good thing. If it isn't successful, don't worry about it, 12542 it probably means the source directory is very clean. 12543 12544 *Richard Levitte* 12545 12546 * Make sure any ENGINE control commands make local copies of string 12547 pointers passed to them whenever necessary. Otherwise it is possible 12548 the caller may have overwritten (or deallocated) the original string 12549 data when a later ENGINE operation tries to use the stored values. 12550 12551 *Götz Babin-Ebell <babinebell@trustcenter.de>* 12552 12553 * Improve diagnostics in file reading and command-line digests. 12554 12555 *Ben Laurie aided and abetted by Solar Designer <solar@openwall.com>* 12556 12557 * Add AES modes CFB and OFB to the object database. Correct an 12558 error in AES-CFB decryption. 12559 12560 *Richard Levitte* 12561 12562 * Remove most calls to EVP_CIPHER_CTX_cleanup() in evp_enc.c, this 12563 allows existing EVP_CIPHER_CTX structures to be reused after 12564 calling `EVP_*Final()`. This behaviour is used by encryption 12565 BIOs and some applications. This has the side effect that 12566 applications must explicitly clean up cipher contexts with 12567 EVP_CIPHER_CTX_cleanup() or they will leak memory. 12568 12569 *Steve Henson* 12570 12571 * Check the values of dna and dnb in bn_mul_recursive before calling 12572 bn_mul_comba (a non zero value means the a or b arrays do not contain 12573 n2 elements) and fallback to bn_mul_normal if either is not zero. 12574 12575 *Steve Henson* 12576 12577 * Fix escaping of non-ASCII characters when using the -subj option 12578 of the "openssl req" command line tool. (Robert Joop <joop@fokus.gmd.de>) 12579 12580 *Lutz Jaenicke* 12581 12582 * Make object definitions compliant to LDAP (RFC2256): SN is the short 12583 form for "surname", serialNumber has no short form. 12584 Use "mail" as the short name for "rfc822Mailbox" according to RFC2798; 12585 therefore remove "mail" short name for "internet 7". 12586 The OID for unique identifiers in X509 certificates is 12587 x500UniqueIdentifier, not uniqueIdentifier. 12588 Some more OID additions. (Michael Bell <michael.bell@rz.hu-berlin.de>) 12589 12590 *Lutz Jaenicke* 12591 12592 * Add an "init" command to the ENGINE config module and auto initialize 12593 ENGINEs. Without any "init" command the ENGINE will be initialized 12594 after all ctrl commands have been executed on it. If init=1 the 12595 ENGINE is initialized at that point (ctrls before that point are run 12596 on the uninitialized ENGINE and after on the initialized one). If 12597 init=0 then the ENGINE will not be initialized at all. 12598 12599 *Steve Henson* 12600 12601 * Fix the 'app_verify_callback' interface so that the user-defined 12602 argument is actually passed to the callback: In the 12603 SSL_CTX_set_cert_verify_callback() prototype, the callback 12604 declaration has been changed from 12605 int (*cb)() 12606 into 12607 int (*cb)(X509_STORE_CTX *,void *); 12608 in ssl_verify_cert_chain (ssl/ssl_cert.c), the call 12609 i=s->ctx->app_verify_callback(&ctx) 12610 has been changed into 12611 i=s->ctx->app_verify_callback(&ctx, s->ctx->app_verify_arg). 12612 12613 To update applications using SSL_CTX_set_cert_verify_callback(), 12614 a dummy argument can be added to their callback functions. 12615 12616 *D. K. Smetters <smetters@parc.xerox.com>* 12617 12618 * Added the '4758cca' ENGINE to support IBM 4758 cards. 12619 12620 *Maurice Gittens <maurice@gittens.nl>, touchups by Geoff Thorpe* 12621 12622 * Add and OPENSSL_LOAD_CONF define which will cause 12623 OpenSSL_add_all_algorithms() to load the openssl.cnf config file. 12624 This allows older applications to transparently support certain 12625 OpenSSL features: such as crypto acceleration and dynamic ENGINE loading. 12626 Two new functions OPENSSL_add_all_algorithms_noconf() which will never 12627 load the config file and OPENSSL_add_all_algorithms_conf() which will 12628 always load it have also been added. 12629 12630 *Steve Henson* 12631 12632 * Add the OFB, CFB and CTR (all with 128 bit feedback) to AES. 12633 Adjust NIDs and EVP layer. 12634 12635 *Stephen Sprunk <stephen@sprunk.org> and Richard Levitte* 12636 12637 * Config modules support in openssl utility. 12638 12639 Most commands now load modules from the config file, 12640 though in a few (such as version) this isn't done 12641 because it couldn't be used for anything. 12642 12643 In the case of ca and req the config file used is 12644 the same as the utility itself: that is the -config 12645 command line option can be used to specify an 12646 alternative file. 12647 12648 *Steve Henson* 12649 12650 * Move default behaviour from OPENSSL_config(). If appname is NULL 12651 use "openssl_conf" if filename is NULL use default openssl config file. 12652 12653 *Steve Henson* 12654 12655 * Add an argument to OPENSSL_config() to allow the use of an alternative 12656 config section name. Add a new flag to tolerate a missing config file 12657 and move code to CONF_modules_load_file(). 12658 12659 *Steve Henson* 12660 12661 * Support for crypto accelerator cards from Accelerated Encryption 12662 Processing, www.aep.ie. (Use engine 'aep') 12663 The support was copied from 0.9.6c [engine] and adapted/corrected 12664 to work with the new engine framework. 12665 12666 *AEP Inc. and Richard Levitte* 12667 12668 * Support for SureWare crypto accelerator cards from Baltimore 12669 Technologies. (Use engine 'sureware') 12670 The support was copied from 0.9.6c [engine] and adapted 12671 to work with the new engine framework. 12672 12673 *Richard Levitte* 12674 12675 * Have the CHIL engine fork-safe (as defined by nCipher) and actually 12676 make the newer ENGINE framework commands for the CHIL engine work. 12677 12678 *Toomas Kiisk <vix@cyber.ee> and Richard Levitte* 12679 12680 * Make it possible to produce shared libraries on ReliantUNIX. 12681 12682 *Robert Dahlem <Robert.Dahlem@ffm2.siemens.de> via Richard Levitte* 12683 12684 * Add the configuration target debug-linux-ppro. 12685 Make 'openssl rsa' use the general key loading routines 12686 implemented in `apps.c`, and make those routines able to 12687 handle the key format FORMAT_NETSCAPE and the variant 12688 FORMAT_IISSGC. 12689 12690 *Toomas Kiisk <vix@cyber.ee> via Richard Levitte* 12691 12692 * Fix a crashbug and a logic bug in hwcrhk_load_pubkey(). 12693 12694 *Toomas Kiisk <vix@cyber.ee> via Richard Levitte* 12695 12696 * Add -keyform to rsautl, and document -engine. 12697 12698 *Richard Levitte, inspired by Toomas Kiisk <vix@cyber.ee>* 12699 12700 * Change BIO_new_file (crypto/bio/bss_file.c) to use new 12701 BIO_R_NO_SUCH_FILE error code rather than the generic 12702 ERR_R_SYS_LIB error code if fopen() fails with ENOENT. 12703 12704 *Ben Laurie* 12705 12706 * Add new functions 12707 ERR_peek_last_error 12708 ERR_peek_last_error_line 12709 ERR_peek_last_error_line_data. 12710 These are similar to 12711 ERR_peek_error 12712 ERR_peek_error_line 12713 ERR_peek_error_line_data, 12714 but report on the latest error recorded rather than the first one 12715 still in the error queue. 12716 12717 *Ben Laurie, Bodo Moeller* 12718 12719 * default_algorithms option in ENGINE config module. This allows things 12720 like: 12721 default_algorithms = ALL 12722 default_algorithms = RSA, DSA, RAND, CIPHERS, DIGESTS 12723 12724 *Steve Henson* 12725 12726 * Preliminary ENGINE config module. 12727 12728 *Steve Henson* 12729 12730 * New experimental application configuration code. 12731 12732 *Steve Henson* 12733 12734 * Change the AES code to follow the same name structure as all other 12735 symmetric ciphers, and behave the same way. Move everything to 12736 the directory crypto/aes, thereby obsoleting crypto/rijndael. 12737 12738 *Stephen Sprunk <stephen@sprunk.org> and Richard Levitte* 12739 12740 * SECURITY: remove unsafe setjmp/signal interaction from ui_openssl.c. 12741 12742 *Ben Laurie and Theo de Raadt* 12743 12744 * Add option to output public keys in req command. 12745 12746 *Massimiliano Pala madwolf@openca.org* 12747 12748 * Use wNAFs in EC_POINTs_mul() for improved efficiency 12749 (up to about 10% better than before for P-192 and P-224). 12750 12751 *Bodo Moeller* 12752 12753 * New functions/macros 12754 12755 SSL_CTX_set_msg_callback(ctx, cb) 12756 SSL_CTX_set_msg_callback_arg(ctx, arg) 12757 SSL_set_msg_callback(ssl, cb) 12758 SSL_set_msg_callback_arg(ssl, arg) 12759 12760 to request calling a callback function 12761 12762 void cb(int write_p, int version, int content_type, 12763 const void *buf, size_t len, SSL *ssl, void *arg) 12764 12765 whenever a protocol message has been completely received 12766 (write_p == 0) or sent (write_p == 1). Here 'version' is the 12767 protocol version according to which the SSL library interprets 12768 the current protocol message (SSL2_VERSION, SSL3_VERSION, or 12769 TLS1_VERSION). 'content_type' is 0 in the case of SSL 2.0, or 12770 the content type as defined in the SSL 3.0/TLS 1.0 protocol 12771 specification (change_cipher_spec(20), alert(21), handshake(22)). 12772 'buf' and 'len' point to the actual message, 'ssl' to the 12773 SSL object, and 'arg' is the application-defined value set by 12774 SSL[_CTX]_set_msg_callback_arg(). 12775 12776 'openssl s_client' and 'openssl s_server' have new '-msg' options 12777 to enable a callback that displays all protocol messages. 12778 12779 *Bodo Moeller* 12780 12781 * Change the shared library support so shared libraries are built as 12782 soon as the corresponding static library is finished, and thereby get 12783 openssl and the test programs linked against the shared library. 12784 This still only happens when the keyword "shard" has been given to 12785 the configuration scripts. 12786 12787 NOTE: shared library support is still an experimental thing, and 12788 backward binary compatibility is still not guaranteed. 12789 12790 *"Maciej W. Rozycki" <macro@ds2.pg.gda.pl> and Richard Levitte* 12791 12792 * Add support for Subject Information Access extension. 12793 12794 *Peter Sylvester <Peter.Sylvester@EdelWeb.fr>* 12795 12796 * Make BUF_MEM_grow() behaviour more consistent: Initialise to zero 12797 additional bytes when new memory had to be allocated, not just 12798 when reusing an existing buffer. 12799 12800 *Bodo Moeller* 12801 12802 * New command line and configuration option 'utf8' for the req command. 12803 This allows field values to be specified as UTF8 strings. 12804 12805 *Steve Henson* 12806 12807 * Add -multi and -mr options to "openssl speed" - giving multiple parallel 12808 runs for the former and machine-readable output for the latter. 12809 12810 *Ben Laurie* 12811 12812 * Add '-noemailDN' option to 'openssl ca'. This prevents inclusion 12813 of the e-mail address in the DN (i.e., it will go into a certificate 12814 extension only). The new configuration file option 'email_in_dn = no' 12815 has the same effect. 12816 12817 *Massimiliano Pala madwolf@openca.org* 12818 12819 * Change all functions with names starting with `des_` to be starting 12820 with `DES_` instead. Add wrappers that are compatible with libdes, 12821 but are named `_ossl_old_des_*`. Finally, add macros that map the 12822 `des_*` symbols to the corresponding `_ossl_old_des_*` if libdes 12823 compatibility is desired. If OpenSSL 0.9.6c compatibility is 12824 desired, the `des_*` symbols will be mapped to `DES_*`, with one 12825 exception. 12826 12827 Since we provide two compatibility mappings, the user needs to 12828 define the macro OPENSSL_DES_LIBDES_COMPATIBILITY if libdes 12829 compatibility is desired. The default (i.e., when that macro 12830 isn't defined) is OpenSSL 0.9.6c compatibility. 12831 12832 There are also macros that enable and disable the support of old 12833 des functions altogether. Those are OPENSSL_ENABLE_OLD_DES_SUPPORT 12834 and OPENSSL_DISABLE_OLD_DES_SUPPORT. If none or both of those 12835 are defined, the default will apply: to support the old des routines. 12836 12837 In either case, one must include openssl/des.h to get the correct 12838 definitions. Do not try to just include openssl/des_old.h, that 12839 won't work. 12840 12841 NOTE: This is a major break of an old API into a new one. Software 12842 authors are encouraged to switch to the `DES_` style functions. Some 12843 time in the future, des_old.h and the libdes compatibility functions 12844 will be disable (i.e. OPENSSL_DISABLE_OLD_DES_SUPPORT will be the 12845 default), and then completely removed. 12846 12847 *Richard Levitte* 12848 12849 * Test for certificates which contain unsupported critical extensions. 12850 If such a certificate is found during a verify operation it is 12851 rejected by default: this behaviour can be overridden by either 12852 handling the new error X509_V_ERR_UNHANDLED_CRITICAL_EXTENSION or 12853 by setting the verify flag X509_V_FLAG_IGNORE_CRITICAL. A new function 12854 X509_supported_extension() has also been added which returns 1 if a 12855 particular extension is supported. 12856 12857 *Steve Henson* 12858 12859 * Modify the behaviour of EVP cipher functions in similar way to digests 12860 to retain compatibility with existing code. 12861 12862 *Steve Henson* 12863 12864 * Modify the behaviour of EVP_DigestInit() and EVP_DigestFinal() to retain 12865 compatibility with existing code. In particular the 'ctx' parameter does 12866 not have to be to be initialized before the call to EVP_DigestInit() and 12867 it is tidied up after a call to EVP_DigestFinal(). New function 12868 EVP_DigestFinal_ex() which does not tidy up the ctx. Similarly function 12869 EVP_MD_CTX_copy() changed to not require the destination to be 12870 initialized valid and new function EVP_MD_CTX_copy_ex() added which 12871 requires the destination to be valid. 12872 12873 Modify all the OpenSSL digest calls to use EVP_DigestInit_ex(), 12874 EVP_DigestFinal_ex() and EVP_MD_CTX_copy_ex(). 12875 12876 *Steve Henson* 12877 12878 * Change ssl3_get_message (ssl/s3_both.c) and the functions using it 12879 so that complete 'Handshake' protocol structures are kept in memory 12880 instead of overwriting 'msg_type' and 'length' with 'body' data. 12881 12882 *Bodo Moeller* 12883 12884 * Add an implementation of SSL_add_dir_cert_subjects_to_stack for Win32. 12885 12886 *Massimo Santin via Richard Levitte* 12887 12888 * Major restructuring to the underlying ENGINE code. This includes 12889 reduction of linker bloat, separation of pure "ENGINE" manipulation 12890 (initialisation, etc) from functionality dealing with implementations 12891 of specific crypto interfaces. This change also introduces integrated 12892 support for symmetric ciphers and digest implementations - so ENGINEs 12893 can now accelerate these by providing EVP_CIPHER and EVP_MD 12894 implementations of their own. This is detailed in 12895 [crypto/engine/README.md](crypto/engine/README.md) 12896 as it couldn't be adequately described here. However, there are a few 12897 API changes worth noting - some RSA, DSA, DH, and RAND functions that 12898 were changed in the original introduction of ENGINE code have now 12899 reverted back - the hooking from this code to ENGINE is now a good 12900 deal more passive and at run-time, operations deal directly with 12901 RSA_METHODs, DSA_METHODs (etc) as they did before, rather than 12902 dereferencing through an ENGINE pointer any more. Also, the ENGINE 12903 functions dealing with `BN_MOD_EXP[_CRT]` handlers have been removed - 12904 they were not being used by the framework as there is no concept of a 12905 BIGNUM_METHOD and they could not be generalised to the new 12906 'ENGINE_TABLE' mechanism that underlies the new code. Similarly, 12907 ENGINE_cpy() has been removed as it cannot be consistently defined in 12908 the new code. 12909 12910 *Geoff Thorpe* 12911 12912 * Change ASN1_GENERALIZEDTIME_check() to allow fractional seconds. 12913 12914 *Steve Henson* 12915 12916 * Change mkdef.pl to sort symbols that get the same entry number, 12917 and make sure the automatically generated functions `ERR_load_*` 12918 become part of libeay.num as well. 12919 12920 *Richard Levitte* 12921 12922 * New function SSL_renegotiate_pending(). This returns true once 12923 renegotiation has been requested (either SSL_renegotiate() call 12924 or HelloRequest/ClientHello received from the peer) and becomes 12925 false once a handshake has been completed. 12926 (For servers, SSL_renegotiate() followed by SSL_do_handshake() 12927 sends a HelloRequest, but does not ensure that a handshake takes 12928 place. SSL_renegotiate_pending() is useful for checking if the 12929 client has followed the request.) 12930 12931 *Bodo Moeller* 12932 12933 * New SSL option SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION. 12934 By default, clients may request session resumption even during 12935 renegotiation (if session ID contexts permit); with this option, 12936 session resumption is possible only in the first handshake. 12937 12938 SSL_OP_ALL is now 0x00000FFFL instead of 0x000FFFFFL. This makes 12939 more bits available for options that should not be part of 12940 SSL_OP_ALL (such as SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION). 12941 12942 *Bodo Moeller* 12943 12944 * Add some demos for certificate and certificate request creation. 12945 12946 *Steve Henson* 12947 12948 * Make maximum certificate chain size accepted from the peer application 12949 settable (`SSL*_get/set_max_cert_list()`), as proposed by 12950 "Douglas E. Engert" <deengert@anl.gov>. 12951 12952 *Lutz Jaenicke* 12953 12954 * Add support for shared libraries for Unixware-7 12955 (Boyd Lynn Gerber <gerberb@zenez.com>). 12956 12957 *Lutz Jaenicke* 12958 12959 * Add a "destroy" handler to ENGINEs that allows structural cleanup to 12960 be done prior to destruction. Use this to unload error strings from 12961 ENGINEs that load their own error strings. NB: This adds two new API 12962 functions to "get" and "set" this destroy handler in an ENGINE. 12963 12964 *Geoff Thorpe* 12965 12966 * Alter all existing ENGINE implementations (except "openssl" and 12967 "openbsd") to dynamically instantiate their own error strings. This 12968 makes them more flexible to be built both as statically-linked ENGINEs 12969 and self-contained shared-libraries loadable via the "dynamic" ENGINE. 12970 Also, add stub code to each that makes building them as self-contained 12971 shared-libraries easier (see [README-Engine.md](README-Engine.md)). 12972 12973 *Geoff Thorpe* 12974 12975 * Add a "dynamic" ENGINE that provides a mechanism for binding ENGINE 12976 implementations into applications that are completely implemented in 12977 self-contained shared-libraries. The "dynamic" ENGINE exposes control 12978 commands that can be used to configure what shared-library to load and 12979 to control aspects of the way it is handled. Also, made an update to 12980 the [README-Engine.md](README-Engine.md) file 12981 that brings its information up-to-date and 12982 provides some information and instructions on the "dynamic" ENGINE 12983 (ie. how to use it, how to build "dynamic"-loadable ENGINEs, etc). 12984 12985 *Geoff Thorpe* 12986 12987 * Make it possible to unload ranges of ERR strings with a new 12988 "ERR_unload_strings" function. 12989 12990 *Geoff Thorpe* 12991 12992 * Add a copy() function to EVP_MD. 12993 12994 *Ben Laurie* 12995 12996 * Make EVP_MD routines take a context pointer instead of just the 12997 md_data void pointer. 12998 12999 *Ben Laurie* 13000 13001 * Add flags to EVP_MD and EVP_MD_CTX. EVP_MD_FLAG_ONESHOT indicates 13002 that the digest can only process a single chunk of data 13003 (typically because it is provided by a piece of 13004 hardware). EVP_MD_CTX_FLAG_ONESHOT indicates that the application 13005 is only going to provide a single chunk of data, and hence the 13006 framework needn't accumulate the data for oneshot drivers. 13007 13008 *Ben Laurie* 13009 13010 * As with "ERR", make it possible to replace the underlying "ex_data" 13011 functions. This change also alters the storage and management of global 13012 ex_data state - it's now all inside ex_data.c and all "class" code (eg. 13013 RSA, BIO, SSL_CTX, etc) no longer stores its own STACKS and per-class 13014 index counters. The API functions that use this state have been changed 13015 to take a "class_index" rather than pointers to the class's local STACK 13016 and counter, and there is now an API function to dynamically create new 13017 classes. This centralisation allows us to (a) plug a lot of the 13018 thread-safety problems that existed, and (b) makes it possible to clean 13019 up all allocated state using "CRYPTO_cleanup_all_ex_data()". W.r.t. (b) 13020 such data would previously have always leaked in application code and 13021 workarounds were in place to make the memory debugging turn a blind eye 13022 to it. Application code that doesn't use this new function will still 13023 leak as before, but their memory debugging output will announce it now 13024 rather than letting it slide. 13025 13026 Besides the addition of CRYPTO_cleanup_all_ex_data(), another API change 13027 induced by the "ex_data" overhaul is that X509_STORE_CTX_init() now 13028 has a return value to indicate success or failure. 13029 13030 *Geoff Thorpe* 13031 13032 * Make it possible to replace the underlying "ERR" functions such that the 13033 global state (2 LHASH tables and 2 locks) is only used by the "default" 13034 implementation. This change also adds two functions to "get" and "set" 13035 the implementation prior to it being automatically set the first time 13036 any other ERR function takes place. Ie. an application can call "get", 13037 pass the return value to a module it has just loaded, and that module 13038 can call its own "set" function using that value. This means the 13039 module's "ERR" operations will use (and modify) the error state in the 13040 application and not in its own statically linked copy of OpenSSL code. 13041 13042 *Geoff Thorpe* 13043 13044 * Give DH, DSA, and RSA types their own `*_up_ref()` function to increment 13045 reference counts. This performs normal REF_PRINT/REF_CHECK macros on 13046 the operation, and provides a more encapsulated way for external code 13047 (crypto/evp/ and ssl/) to do this. Also changed the evp and ssl code 13048 to use these functions rather than manually incrementing the counts. 13049 13050 Also rename "DSO_up()" function to more descriptive "DSO_up_ref()". 13051 13052 *Geoff Thorpe* 13053 13054 * Add EVP test program. 13055 13056 *Ben Laurie* 13057 13058 * Add symmetric cipher support to ENGINE. Expect the API to change! 13059 13060 *Ben Laurie* 13061 13062 * New CRL functions: X509_CRL_set_version(), X509_CRL_set_issuer_name() 13063 X509_CRL_set_lastUpdate(), X509_CRL_set_nextUpdate(), X509_CRL_sort(), 13064 X509_REVOKED_set_serialNumber(), and X509_REVOKED_set_revocationDate(). 13065 These allow a CRL to be built without having to access X509_CRL fields 13066 directly. Modify 'ca' application to use new functions. 13067 13068 *Steve Henson* 13069 13070 * Move SSL_OP_TLS_ROLLBACK_BUG out of the SSL_OP_ALL list of recommended 13071 bug workarounds. Rollback attack detection is a security feature. 13072 The problem will only arise on OpenSSL servers when TLSv1 is not 13073 available (sslv3_server_method() or SSL_OP_NO_TLSv1). 13074 Software authors not wanting to support TLSv1 will have special reasons 13075 for their choice and can explicitly enable this option. 13076 13077 *Bodo Moeller, Lutz Jaenicke* 13078 13079 * Rationalise EVP so it can be extended: don't include a union of 13080 cipher/digest structures, add init/cleanup functions for EVP_MD_CTX 13081 (similar to those existing for EVP_CIPHER_CTX). 13082 Usage example: 13083 13084 EVP_MD_CTX md; 13085 13086 EVP_MD_CTX_init(&md); /* new function call */ 13087 EVP_DigestInit(&md, EVP_sha1()); 13088 EVP_DigestUpdate(&md, in, len); 13089 EVP_DigestFinal(&md, out, NULL); 13090 EVP_MD_CTX_cleanup(&md); /* new function call */ 13091 13092 *Ben Laurie* 13093 13094 * Make DES key schedule conform to the usual scheme, as well as 13095 correcting its structure. This means that calls to DES functions 13096 now have to pass a pointer to a des_key_schedule instead of a 13097 plain des_key_schedule (which was actually always a pointer 13098 anyway): E.g., 13099 13100 des_key_schedule ks; 13101 13102 des_set_key_checked(..., &ks); 13103 des_ncbc_encrypt(..., &ks, ...); 13104 13105 (Note that a later change renames 'des_...' into 'DES_...'.) 13106 13107 *Ben Laurie* 13108 13109 * Initial reduction of linker bloat: the use of some functions, such as 13110 PEM causes large amounts of unused functions to be linked in due to 13111 poor organisation. For example pem_all.c contains every PEM function 13112 which has a knock on effect of linking in large amounts of (unused) 13113 ASN1 code. Grouping together similar functions and splitting unrelated 13114 functions prevents this. 13115 13116 *Steve Henson* 13117 13118 * Cleanup of EVP macros. 13119 13120 *Ben Laurie* 13121 13122 * Change historical references to `{NID,SN,LN}_des_ede` and ede3 to add the 13123 correct `_ecb suffix`. 13124 13125 *Ben Laurie* 13126 13127 * Add initial OCSP responder support to ocsp application. The 13128 revocation information is handled using the text based index 13129 use by the ca application. The responder can either handle 13130 requests generated internally, supplied in files (for example 13131 via a CGI script) or using an internal minimal server. 13132 13133 *Steve Henson* 13134 13135 * Add configuration choices to get zlib compression for TLS. 13136 13137 *Richard Levitte* 13138 13139 * Changes to Kerberos SSL for RFC 2712 compliance: 13140 1. Implemented real KerberosWrapper, instead of just using 13141 KRB5 AP_REQ message. [Thanks to Simon Wilkinson <sxw@sxw.org.uk>] 13142 2. Implemented optional authenticator field of KerberosWrapper. 13143 13144 Added openssl-style ASN.1 macros for Kerberos ticket, ap_req, 13145 and authenticator structs; see crypto/krb5/. 13146 13147 Generalized Kerberos calls to support multiple Kerberos libraries. 13148 *Vern Staats <staatsvr@asc.hpc.mil>, Jeffrey Altman <jaltman@columbia.edu> 13149 via Richard Levitte* 13150 13151 * Cause 'openssl speed' to use fully hard-coded DSA keys as it 13152 already does with RSA. testdsa.h now has 'priv_key/pub_key' 13153 values for each of the key sizes rather than having just 13154 parameters (and 'speed' generating keys each time). 13155 13156 *Geoff Thorpe* 13157 13158 * Speed up EVP routines. 13159 Before: 13160crypt 13161pe 8 bytes 64 bytes 256 bytes 1024 bytes 8192 bytes 13162s-cbc 4408.85k 5560.51k 5778.46k 5862.20k 5825.16k 13163s-cbc 4389.55k 5571.17k 5792.23k 5846.91k 5832.11k 13164s-cbc 4394.32k 5575.92k 5807.44k 5848.37k 5841.30k 13165crypt 13166s-cbc 3482.66k 5069.49k 5496.39k 5614.16k 5639.28k 13167s-cbc 3480.74k 5068.76k 5510.34k 5609.87k 5635.52k 13168s-cbc 3483.72k 5067.62k 5504.60k 5708.01k 5724.80k 13169 After: 13170crypt 13171s-cbc 4660.16k 5650.19k 5807.19k 5827.13k 5783.32k 13172crypt 13173s-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k 13174 13175 *Ben Laurie* 13176 13177 * Added the OS2-EMX target. 13178 13179 *"Brian Havard" <brianh@kheldar.apana.org.au> and Richard Levitte* 13180 13181 * Rewrite commands to use `NCONF` routines instead of the old `CONF`. 13182 New functions to support `NCONF` routines in extension code. 13183 New function `CONF_set_nconf()` 13184 to allow functions which take an `NCONF` to also handle the old `LHASH` 13185 structure: this means that the old `CONF` compatible routines can be 13186 retained (in particular w.rt. extensions) without having to duplicate the 13187 code. New function `X509V3_add_ext_nconf_sk()` to add extensions to a stack. 13188 13189 *Steve Henson* 13190 13191 * Enhance the general user interface with mechanisms for inner control 13192 and with possibilities to have yes/no kind of prompts. 13193 13194 *Richard Levitte* 13195 13196 * Change all calls to low-level digest routines in the library and 13197 applications to use EVP. Add missing calls to HMAC_cleanup() and 13198 don't assume HMAC_CTX can be copied using memcpy(). 13199 13200 *Verdon Walker <VWalker@novell.com>, Steve Henson* 13201 13202 * Add the possibility to control engines through control names but with 13203 arbitrary arguments instead of just a string. 13204 Change the key loaders to take a UI_METHOD instead of a callback 13205 function pointer. NOTE: this breaks binary compatibility with earlier 13206 versions of OpenSSL [engine]. 13207 Adapt the nCipher code for these new conditions and add a card insertion 13208 callback. 13209 13210 *Richard Levitte* 13211 13212 * Enhance the general user interface with mechanisms to better support 13213 dialog box interfaces, application-defined prompts, the possibility 13214 to use defaults (for example default passwords from somewhere else) 13215 and interrupts/cancellations. 13216 13217 *Richard Levitte* 13218 13219 * Tidy up PKCS#12 attribute handling. Add support for the CSP name 13220 attribute in PKCS#12 files, add new -CSP option to pkcs12 utility. 13221 13222 *Steve Henson* 13223 13224 * Fix a memory leak in 'sk_dup()' in the case reallocation fails. (Also 13225 tidy up some unnecessarily weird code in 'sk_new()'). 13226 13227 *Geoff, reported by Diego Tartara <dtartara@novamens.com>* 13228 13229 * Change the key loading routines for ENGINEs to use the same kind 13230 callback (pem_password_cb) as all other routines that need this 13231 kind of callback. 13232 13233 *Richard Levitte* 13234 13235 * Increase ENTROPY_NEEDED to 32 bytes, as Rijndael can operate with 13236 256 bit (=32 byte) keys. Of course seeding with more entropy bytes 13237 than this minimum value is recommended. 13238 13239 *Lutz Jaenicke* 13240 13241 * New random seeder for OpenVMS, using the system process statistics 13242 that are easily reachable. 13243 13244 *Richard Levitte* 13245 13246 * Windows apparently can't transparently handle global 13247 variables defined in DLLs. Initialisations such as: 13248 13249 const ASN1_ITEM *it = &ASN1_INTEGER_it; 13250 13251 won't compile. This is used by the any applications that need to 13252 declare their own ASN1 modules. This was fixed by adding the option 13253 EXPORT_VAR_AS_FN to all Win32 platforms, although this isn't strictly 13254 needed for static libraries under Win32. 13255 13256 *Steve Henson* 13257 13258 * New functions X509_PURPOSE_set() and X509_TRUST_set() to handle 13259 setting of purpose and trust fields. New X509_STORE trust and 13260 purpose functions and tidy up setting in other SSL functions. 13261 13262 *Steve Henson* 13263 13264 * Add copies of X509_STORE_CTX fields and callbacks to X509_STORE 13265 structure. These are inherited by X509_STORE_CTX when it is 13266 initialised. This allows various defaults to be set in the 13267 X509_STORE structure (such as flags for CRL checking and custom 13268 purpose or trust settings) for functions which only use X509_STORE_CTX 13269 internally such as S/MIME. 13270 13271 Modify X509_STORE_CTX_purpose_inherit() so it only sets purposes and 13272 trust settings if they are not set in X509_STORE. This allows X509_STORE 13273 purposes and trust (in S/MIME for example) to override any set by default. 13274 13275 Add command line options for CRL checking to smime, s_client and s_server 13276 applications. 13277 13278 *Steve Henson* 13279 13280 * Initial CRL based revocation checking. If the CRL checking flag(s) 13281 are set then the CRL is looked up in the X509_STORE structure and 13282 its validity and signature checked, then if the certificate is found 13283 in the CRL the verify fails with a revoked error. 13284 13285 Various new CRL related callbacks added to X509_STORE_CTX structure. 13286 13287 Command line options added to 'verify' application to support this. 13288 13289 This needs some additional work, such as being able to handle multiple 13290 CRLs with different times, extension based lookup (rather than just 13291 by subject name) and ultimately more complete V2 CRL extension 13292 handling. 13293 13294 *Steve Henson* 13295 13296 * Add a general user interface API (crypto/ui/). This is designed 13297 to replace things like des_read_password and friends (backward 13298 compatibility functions using this new API are provided). 13299 The purpose is to remove prompting functions from the DES code 13300 section as well as provide for prompting through dialog boxes in 13301 a window system and the like. 13302 13303 *Richard Levitte* 13304 13305 * Add "ex_data" support to ENGINE so implementations can add state at a 13306 per-structure level rather than having to store it globally. 13307 13308 *Geoff* 13309 13310 * Make it possible for ENGINE structures to be copied when retrieved by 13311 ENGINE_by_id() if the ENGINE specifies a new flag: ENGINE_FLAGS_BY_ID_COPY. 13312 This causes the "original" ENGINE structure to act like a template, 13313 analogous to the RSA vs. RSA_METHOD type of separation. Because of this 13314 operational state can be localised to each ENGINE structure, despite the 13315 fact they all share the same "methods". New ENGINE structures returned in 13316 this case have no functional references and the return value is the single 13317 structural reference. This matches the single structural reference returned 13318 by ENGINE_by_id() normally, when it is incremented on the pre-existing 13319 ENGINE structure. 13320 13321 *Geoff* 13322 13323 * Fix ASN1 decoder when decoding type ANY and V_ASN1_OTHER: since this 13324 needs to match any other type at all we need to manually clear the 13325 tag cache. 13326 13327 *Steve Henson* 13328 13329 * Changes to the "openssl engine" utility to include; 13330 - verbosity levels ('-v', '-vv', and '-vvv') that provide information 13331 about an ENGINE's available control commands. 13332 - executing control commands from command line arguments using the 13333 '-pre' and '-post' switches. '-post' is only used if '-t' is 13334 specified and the ENGINE is successfully initialised. The syntax for 13335 the individual commands are colon-separated, for example; 13336 openssl engine chil -pre FORK_CHECK:0 -pre SO_PATH:/lib/test.so 13337 13338 *Geoff* 13339 13340 * New dynamic control command support for ENGINEs. ENGINEs can now 13341 declare their own commands (numbers), names (strings), descriptions, 13342 and input types for run-time discovery by calling applications. A 13343 subset of these commands are implicitly classed as "executable" 13344 depending on their input type, and only these can be invoked through 13345 the new string-based API function ENGINE_ctrl_cmd_string(). (Eg. this 13346 can be based on user input, config files, etc). The distinction is 13347 that "executable" commands cannot return anything other than a boolean 13348 result and can only support numeric or string input, whereas some 13349 discoverable commands may only be for direct use through 13350 ENGINE_ctrl(), eg. supporting the exchange of binary data, function 13351 pointers, or other custom uses. The "executable" commands are to 13352 support parameterisations of ENGINE behaviour that can be 13353 unambiguously defined by ENGINEs and used consistently across any 13354 OpenSSL-based application. Commands have been added to all the 13355 existing hardware-supporting ENGINEs, noticeably "SO_PATH" to allow 13356 control over shared-library paths without source code alterations. 13357 13358 *Geoff* 13359 13360 * Changed all ENGINE implementations to dynamically allocate their 13361 ENGINEs rather than declaring them statically. Apart from this being 13362 necessary with the removal of the ENGINE_FLAGS_MALLOCED distinction, 13363 this also allows the implementations to compile without using the 13364 internal engine_int.h header. 13365 13366 *Geoff* 13367 13368 * Minor adjustment to "rand" code. RAND_get_rand_method() now returns a 13369 'const' value. Any code that should be able to modify a RAND_METHOD 13370 should already have non-const pointers to it (ie. they should only 13371 modify their own ones). 13372 13373 *Geoff* 13374 13375 * Made a variety of little tweaks to the ENGINE code. 13376 - "atalla" and "ubsec" string definitions were moved from header files 13377 to C code. "nuron" string definitions were placed in variables 13378 rather than hard-coded - allowing parameterisation of these values 13379 later on via ctrl() commands. 13380 - Removed unused "#if 0"'d code. 13381 - Fixed engine list iteration code so it uses ENGINE_free() to release 13382 structural references. 13383 - Constified the RAND_METHOD element of ENGINE structures. 13384 - Constified various get/set functions as appropriate and added 13385 missing functions (including a catch-all ENGINE_cpy that duplicates 13386 all ENGINE values onto a new ENGINE except reference counts/state). 13387 - Removed NULL parameter checks in get/set functions. Setting a method 13388 or function to NULL is a way of cancelling out a previously set 13389 value. Passing a NULL ENGINE parameter is just plain stupid anyway 13390 and doesn't justify the extra error symbols and code. 13391 - Deprecate the ENGINE_FLAGS_MALLOCED define and move the area for 13392 flags from engine_int.h to engine.h. 13393 - Changed prototypes for ENGINE handler functions (init(), finish(), 13394 ctrl(), key-load functions, etc) to take an (ENGINE*) parameter. 13395 13396 *Geoff* 13397 13398 * Implement binary inversion algorithm for BN_mod_inverse in addition 13399 to the algorithm using long division. The binary algorithm can be 13400 used only if the modulus is odd. On 32-bit systems, it is faster 13401 only for relatively small moduli (roughly 20-30% for 128-bit moduli, 13402 roughly 5-15% for 256-bit moduli), so we use it only for moduli 13403 up to 450 bits. In 64-bit environments, the binary algorithm 13404 appears to be advantageous for much longer moduli; here we use it 13405 for moduli up to 2048 bits. 13406 13407 *Bodo Moeller* 13408 13409 * Rewrite CHOICE field setting in ASN1_item_ex_d2i(). The old code 13410 could not support the combine flag in choice fields. 13411 13412 *Steve Henson* 13413 13414 * Add a 'copy_extensions' option to the 'ca' utility. This copies 13415 extensions from a certificate request to the certificate. 13416 13417 *Steve Henson* 13418 13419 * Allow multiple 'certopt' and 'nameopt' options to be separated 13420 by commas. Add 'namopt' and 'certopt' options to the 'ca' config 13421 file: this allows the display of the certificate about to be 13422 signed to be customised, to allow certain fields to be included 13423 or excluded and extension details. The old system didn't display 13424 multicharacter strings properly, omitted fields not in the policy 13425 and couldn't display additional details such as extensions. 13426 13427 *Steve Henson* 13428 13429 * Function EC_POINTs_mul for multiple scalar multiplication 13430 of an arbitrary number of elliptic curve points 13431 \sum scalars[i]*points[i], 13432 optionally including the generator defined for the EC_GROUP: 13433 scalar*generator + \sum scalars[i]*points[i]. 13434 13435 EC_POINT_mul is a simple wrapper function for the typical case 13436 that the point list has just one item (besides the optional 13437 generator). 13438 13439 *Bodo Moeller* 13440 13441 * First EC_METHODs for curves over GF(p): 13442 13443 EC_GFp_simple_method() uses the basic BN_mod_mul and BN_mod_sqr 13444 operations and provides various method functions that can also 13445 operate with faster implementations of modular arithmetic. 13446 13447 EC_GFp_mont_method() reuses most functions that are part of 13448 EC_GFp_simple_method, but uses Montgomery arithmetic. 13449 13450 *Bodo Moeller; point addition and point doubling 13451 implementation directly derived from source code provided by 13452 Lenka Fibikova <fibikova@exp-math.uni-essen.de>* 13453 13454 * Framework for elliptic curves (crypto/ec/ec.h, crypto/ec/ec_lcl.h, 13455 crypto/ec/ec_lib.c): 13456 13457 Curves are EC_GROUP objects (with an optional group generator) 13458 based on EC_METHODs that are built into the library. 13459 13460 Points are EC_POINT objects based on EC_GROUP objects. 13461 13462 Most of the framework would be able to handle curves over arbitrary 13463 finite fields, but as there are no obvious types for fields other 13464 than GF(p), some functions are limited to that for now. 13465 13466 *Bodo Moeller* 13467 13468 * Add the -HTTP option to s_server. It is similar to -WWW, but requires 13469 that the file contains a complete HTTP response. 13470 13471 *Richard Levitte* 13472 13473 * Add the ec directory to mkdef.pl and mkfiles.pl. In mkdef.pl 13474 change the def and num file printf format specifier from "%-40sXXX" 13475 to "%-39s XXX". The latter will always guarantee a space after the 13476 field while the former will cause them to run together if the field 13477 is 40 of more characters long. 13478 13479 *Steve Henson* 13480 13481 * Constify the cipher and digest 'method' functions and structures 13482 and modify related functions to take constant EVP_MD and EVP_CIPHER 13483 pointers. 13484 13485 *Steve Henson* 13486 13487 * Hide BN_CTX structure details in bn_lcl.h instead of publishing them 13488 in <openssl/bn.h>. Also further increase BN_CTX_NUM to 32. 13489 13490 *Bodo Moeller* 13491 13492 * Modify `EVP_Digest*()` routines so they now return values. Although the 13493 internal software routines can never fail additional hardware versions 13494 might. 13495 13496 *Steve Henson* 13497 13498 * Clean up crypto/err/err.h and change some error codes to avoid conflicts: 13499 13500 Previously ERR_R_FATAL was too small and coincided with ERR_LIB_PKCS7 13501 (= ERR_R_PKCS7_LIB); it is now 64 instead of 32. 13502 13503 ASN1 error codes 13504 ERR_R_NESTED_ASN1_ERROR 13505 ... 13506 ERR_R_MISSING_ASN1_EOS 13507 were 4 .. 9, conflicting with 13508 ERR_LIB_RSA (= ERR_R_RSA_LIB) 13509 ... 13510 ERR_LIB_PEM (= ERR_R_PEM_LIB). 13511 They are now 58 .. 63 (i.e., just below ERR_R_FATAL). 13512 13513 Add new error code 'ERR_R_INTERNAL_ERROR'. 13514 13515 *Bodo Moeller* 13516 13517 * Don't overuse locks in crypto/err/err.c: For data retrieval, CRYPTO_r_lock 13518 suffices. 13519 13520 *Bodo Moeller* 13521 13522 * New option '-subj arg' for 'openssl req' and 'openssl ca'. This 13523 sets the subject name for a new request or supersedes the 13524 subject name in a given request. Formats that can be parsed are 13525 'CN=Some Name, OU=myOU, C=IT' 13526 and 13527 'CN=Some Name/OU=myOU/C=IT'. 13528 13529 Add options '-batch' and '-verbose' to 'openssl req'. 13530 13531 *Massimiliano Pala <madwolf@hackmasters.net>* 13532 13533 * Introduce the possibility to access global variables through 13534 functions on platform were that's the best way to handle exporting 13535 global variables in shared libraries. To enable this functionality, 13536 one must configure with "EXPORT_VAR_AS_FN" or defined the C macro 13537 "OPENSSL_EXPORT_VAR_AS_FUNCTION" in crypto/opensslconf.h (the latter 13538 is normally done by Configure or something similar). 13539 13540 To implement a global variable, use the macro OPENSSL_IMPLEMENT_GLOBAL 13541 in the source file (foo.c) like this: 13542 13543 OPENSSL_IMPLEMENT_GLOBAL(int,foo)=1; 13544 OPENSSL_IMPLEMENT_GLOBAL(double,bar); 13545 13546 To declare a global variable, use the macros OPENSSL_DECLARE_GLOBAL 13547 and OPENSSL_GLOBAL_REF in the header file (foo.h) like this: 13548 13549 OPENSSL_DECLARE_GLOBAL(int,foo); 13550 #define foo OPENSSL_GLOBAL_REF(foo) 13551 OPENSSL_DECLARE_GLOBAL(double,bar); 13552 #define bar OPENSSL_GLOBAL_REF(bar) 13553 13554 The #defines are very important, and therefore so is including the 13555 header file everywhere where the defined globals are used. 13556 13557 The macro OPENSSL_EXPORT_VAR_AS_FUNCTION also affects the definition 13558 of ASN.1 items, but that structure is a bit different. 13559 13560 The largest change is in util/mkdef.pl which has been enhanced with 13561 better and easier to understand logic to choose which symbols should 13562 go into the Windows .def files as well as a number of fixes and code 13563 cleanup (among others, algorithm keywords are now sorted 13564 lexicographically to avoid constant rewrites). 13565 13566 *Richard Levitte* 13567 13568 * In BN_div() keep a copy of the sign of 'num' before writing the 13569 result to 'rm' because if rm==num the value will be overwritten 13570 and produce the wrong result if 'num' is negative: this caused 13571 problems with BN_mod() and BN_nnmod(). 13572 13573 *Steve Henson* 13574 13575 * Function OCSP_request_verify(). This checks the signature on an 13576 OCSP request and verifies the signer certificate. The signer 13577 certificate is just checked for a generic purpose and OCSP request 13578 trust settings. 13579 13580 *Steve Henson* 13581 13582 * Add OCSP_check_validity() function to check the validity of OCSP 13583 responses. OCSP responses are prepared in real time and may only 13584 be a few seconds old. Simply checking that the current time lies 13585 between thisUpdate and nextUpdate max reject otherwise valid responses 13586 caused by either OCSP responder or client clock inaccuracy. Instead 13587 we allow thisUpdate and nextUpdate to fall within a certain period of 13588 the current time. The age of the response can also optionally be 13589 checked. Two new options -validity_period and -status_age added to 13590 ocsp utility. 13591 13592 *Steve Henson* 13593 13594 * If signature or public key algorithm is unrecognized print out its 13595 OID rather that just UNKNOWN. 13596 13597 *Steve Henson* 13598 13599 * Change OCSP_cert_to_id() to tolerate a NULL subject certificate and 13600 OCSP_cert_id_new() a NULL serialNumber. This allows a partial certificate 13601 ID to be generated from the issuer certificate alone which can then be 13602 passed to OCSP_id_issuer_cmp(). 13603 13604 *Steve Henson* 13605 13606 * New compilation option ASN1_ITEM_FUNCTIONS. This causes the new 13607 ASN1 modules to export functions returning ASN1_ITEM pointers 13608 instead of the ASN1_ITEM structures themselves. This adds several 13609 new macros which allow the underlying ASN1 function/structure to 13610 be accessed transparently. As a result code should not use ASN1_ITEM 13611 references directly (such as &X509_it) but instead use the relevant 13612 macros (such as ASN1_ITEM_rptr(X509)). This option is to allow 13613 use of the new ASN1 code on platforms where exporting structures 13614 is problematical (for example in shared libraries) but exporting 13615 functions returning pointers to structures is not. 13616 13617 *Steve Henson* 13618 13619 * Add support for overriding the generation of SSL/TLS session IDs. 13620 These callbacks can be registered either in an SSL_CTX or per SSL. 13621 The purpose of this is to allow applications to control, if they wish, 13622 the arbitrary values chosen for use as session IDs, particularly as it 13623 can be useful for session caching in multiple-server environments. A 13624 command-line switch for testing this (and any client code that wishes 13625 to use such a feature) has been added to "s_server". 13626 13627 *Geoff Thorpe, Lutz Jaenicke* 13628 13629 * Modify mkdef.pl to recognise and parse preprocessor conditionals 13630 of the form `#if defined(...) || defined(...) || ...` and 13631 `#if !defined(...) && !defined(...) && ...`. This also avoids 13632 the growing number of special cases it was previously handling. 13633 13634 *Richard Levitte* 13635 13636 * Make all configuration macros available for application by making 13637 sure they are available in opensslconf.h, by giving them names starting 13638 with `OPENSSL_` to avoid conflicts with other packages and by making 13639 sure e_os2.h will cover all platform-specific cases together with 13640 opensslconf.h. 13641 Additionally, it is now possible to define configuration/platform- 13642 specific names (called "system identities"). In the C code, these 13643 are prefixed with `OPENSSL_SYSNAME_`. e_os2.h will create another 13644 macro with the name beginning with `OPENSSL_SYS_`, which is determined 13645 from `OPENSSL_SYSNAME_*` or compiler-specific macros depending on 13646 what is available. 13647 13648 *Richard Levitte* 13649 13650 * New option -set_serial to 'req' and 'x509' this allows the serial 13651 number to use to be specified on the command line. Previously self 13652 signed certificates were hard coded with serial number 0 and the 13653 CA options of 'x509' had to use a serial number in a file which was 13654 auto incremented. 13655 13656 *Steve Henson* 13657 13658 * New options to 'ca' utility to support V2 CRL entry extensions. 13659 Currently CRL reason, invalidity date and hold instruction are 13660 supported. Add new CRL extensions to V3 code and some new objects. 13661 13662 *Steve Henson* 13663 13664 * New function EVP_CIPHER_CTX_set_padding() this is used to 13665 disable standard block padding (aka PKCS#5 padding) in the EVP 13666 API, which was previously mandatory. This means that the data is 13667 not padded in any way and so the total length much be a multiple 13668 of the block size, otherwise an error occurs. 13669 13670 *Steve Henson* 13671 13672 * Initial (incomplete) OCSP SSL support. 13673 13674 *Steve Henson* 13675 13676 * New function OCSP_parse_url(). This splits up a URL into its host, 13677 port and path components: primarily to parse OCSP URLs. New -url 13678 option to ocsp utility. 13679 13680 *Steve Henson* 13681 13682 * New nonce behavior. The return value of OCSP_check_nonce() now 13683 reflects the various checks performed. Applications can decide 13684 whether to tolerate certain situations such as an absent nonce 13685 in a response when one was present in a request: the ocsp application 13686 just prints out a warning. New function OCSP_add1_basic_nonce() 13687 this is to allow responders to include a nonce in a response even if 13688 the request is nonce-less. 13689 13690 *Steve Henson* 13691 13692 * Disable stdin buffering in `load_cert()` (`apps/apps.c`) so that no certs are 13693 skipped when using openssl x509 multiple times on a single input file, 13694 e.g. `(openssl x509 -out cert1; openssl x509 -out cert2) <certs`. 13695 13696 *Bodo Moeller* 13697 13698 * Make ASN1_UTCTIME_set_string() and ASN1_GENERALIZEDTIME_set_string() 13699 set string type: to handle setting ASN1_TIME structures. Fix ca 13700 utility to correctly initialize revocation date of CRLs. 13701 13702 *Steve Henson* 13703 13704 * New option SSL_OP_CIPHER_SERVER_PREFERENCE allows the server to override 13705 the clients preferred ciphersuites and rather use its own preferences. 13706 Should help to work around M$ SGC (Server Gated Cryptography) bug in 13707 Internet Explorer by ensuring unchanged hash method during stepup. 13708 (Also replaces the broken/deactivated SSL_OP_NON_EXPORT_FIRST option.) 13709 13710 *Lutz Jaenicke* 13711 13712 * Make mkdef.pl recognise all DECLARE_ASN1 macros, change rijndael 13713 to aes and add a new 'exist' option to print out symbols that don't 13714 appear to exist. 13715 13716 *Steve Henson* 13717 13718 * Additional options to ocsp utility to allow flags to be set and 13719 additional certificates supplied. 13720 13721 *Steve Henson* 13722 13723 * Add the option -VAfile to 'openssl ocsp', so the user can give the 13724 OCSP client a number of certificate to only verify the response 13725 signature against. 13726 13727 *Richard Levitte* 13728 13729 * Update Rijndael code to version 3.0 and change EVP AES ciphers to 13730 handle the new API. Currently only ECB, CBC modes supported. Add new 13731 AES OIDs. 13732 13733 Add TLS AES ciphersuites as described in RFC3268, "Advanced 13734 Encryption Standard (AES) Ciphersuites for Transport Layer 13735 Security (TLS)". (In beta versions of OpenSSL 0.9.7, these were 13736 not enabled by default and were not part of the "ALL" ciphersuite 13737 alias because they were not yet official; they could be 13738 explicitly requested by specifying the "AESdraft" ciphersuite 13739 group alias. In the final release of OpenSSL 0.9.7, the group 13740 alias is called "AES" and is part of "ALL".) 13741 13742 *Ben Laurie, Steve Henson, Bodo Moeller* 13743 13744 * New function OCSP_copy_nonce() to copy nonce value (if present) from 13745 request to response. 13746 13747 *Steve Henson* 13748 13749 * Functions for OCSP responders. OCSP_request_onereq_count(), 13750 OCSP_request_onereq_get0(), OCSP_onereq_get0_id() and OCSP_id_get0_info() 13751 extract information from a certificate request. OCSP_response_create() 13752 creates a response and optionally adds a basic response structure. 13753 OCSP_basic_add1_status() adds a complete single response to a basic 13754 response and returns the OCSP_SINGLERESP structure just added (to allow 13755 extensions to be included for example). OCSP_basic_add1_cert() adds a 13756 certificate to a basic response and OCSP_basic_sign() signs a basic 13757 response with various flags. New helper functions ASN1_TIME_check() 13758 (checks validity of ASN1_TIME structure) and ASN1_TIME_to_generalizedtime() 13759 (converts ASN1_TIME to GeneralizedTime). 13760 13761 *Steve Henson* 13762 13763 * Various new functions. EVP_Digest() combines EVP_Digest{Init,Update,Final}() 13764 in a single operation. X509_get0_pubkey_bitstr() extracts the public_key 13765 structure from a certificate. X509_pubkey_digest() digests the public_key 13766 contents: this is used in various key identifiers. 13767 13768 *Steve Henson* 13769 13770 * Make sk_sort() tolerate a NULL argument. 13771 13772 *Steve Henson reported by Massimiliano Pala <madwolf@comune.modena.it>* 13773 13774 * New OCSP verify flag OCSP_TRUSTOTHER. When set the "other" certificates 13775 passed by the function are trusted implicitly. If any of them signed the 13776 response then it is assumed to be valid and is not verified. 13777 13778 *Steve Henson* 13779 13780 * In PKCS7_set_type() initialise content_type in PKCS7_ENC_CONTENT 13781 to data. This was previously part of the PKCS7 ASN1 code. This 13782 was causing problems with OpenSSL created PKCS#12 and PKCS#7 structures. 13783 *Steve Henson, reported by Kenneth R. Robinette 13784 <support@securenetterm.com>* 13785 13786 * Add CRYPTO_push_info() and CRYPTO_pop_info() calls to new ASN1 13787 routines: without these tracing memory leaks is very painful. 13788 Fix leaks in PKCS12 and PKCS7 routines. 13789 13790 *Steve Henson* 13791 13792 * Make X509_time_adj() cope with the new behaviour of ASN1_TIME_new(). 13793 Previously it initialised the 'type' argument to V_ASN1_UTCTIME which 13794 effectively meant GeneralizedTime would never be used. Now it 13795 is initialised to -1 but X509_time_adj() now has to check the value 13796 and use ASN1_TIME_set() if the value is not V_ASN1_UTCTIME or 13797 V_ASN1_GENERALIZEDTIME, without this it always uses GeneralizedTime. 13798 *Steve Henson, reported by Kenneth R. Robinette 13799 <support@securenetterm.com>* 13800 13801 * Fixes to BN_to_ASN1_INTEGER when bn is zero. This would previously 13802 result in a zero length in the ASN1_INTEGER structure which was 13803 not consistent with the structure when d2i_ASN1_INTEGER() was used 13804 and would cause ASN1_INTEGER_cmp() to fail. Enhance s2i_ASN1_INTEGER() 13805 to cope with hex and negative integers. Fix bug in i2a_ASN1_INTEGER() 13806 where it did not print out a minus for negative ASN1_INTEGER. 13807 13808 *Steve Henson* 13809 13810 * Add summary printout to ocsp utility. The various functions which 13811 convert status values to strings have been renamed to: 13812 OCSP_response_status_str(), OCSP_cert_status_str() and 13813 OCSP_crl_reason_str() and are no longer static. New options 13814 to verify nonce values and to disable verification. OCSP response 13815 printout format cleaned up. 13816 13817 *Steve Henson* 13818 13819 * Add additional OCSP certificate checks. These are those specified 13820 in RFC2560. This consists of two separate checks: the CA of the 13821 certificate being checked must either be the OCSP signer certificate 13822 or the issuer of the OCSP signer certificate. In the latter case the 13823 OCSP signer certificate must contain the OCSP signing extended key 13824 usage. This check is performed by attempting to match the OCSP 13825 signer or the OCSP signer CA to the issuerNameHash and issuerKeyHash 13826 in the OCSP_CERTID structures of the response. 13827 13828 *Steve Henson* 13829 13830 * Initial OCSP certificate verification added to OCSP_basic_verify() 13831 and related routines. This uses the standard OpenSSL certificate 13832 verify routines to perform initial checks (just CA validity) and 13833 to obtain the certificate chain. Then additional checks will be 13834 performed on the chain. Currently the root CA is checked to see 13835 if it is explicitly trusted for OCSP signing. This is used to set 13836 a root CA as a global signing root: that is any certificate that 13837 chains to that CA is an acceptable OCSP signing certificate. 13838 13839 *Steve Henson* 13840 13841 * New '-extfile ...' option to 'openssl ca' for reading X.509v3 13842 extensions from a separate configuration file. 13843 As when reading extensions from the main configuration file, 13844 the '-extensions ...' option may be used for specifying the 13845 section to use. 13846 13847 *Massimiliano Pala <madwolf@comune.modena.it>* 13848 13849 * New OCSP utility. Allows OCSP requests to be generated or 13850 read. The request can be sent to a responder and the output 13851 parsed, outputted or printed in text form. Not complete yet: 13852 still needs to check the OCSP response validity. 13853 13854 *Steve Henson* 13855 13856 * New subcommands for 'openssl ca': 13857 `openssl ca -status <serial>` prints the status of the cert with 13858 the given serial number (according to the index file). 13859 `openssl ca -updatedb` updates the expiry status of certificates 13860 in the index file. 13861 13862 *Massimiliano Pala <madwolf@comune.modena.it>* 13863 13864 * New '-newreq-nodes' command option to CA.pl. This is like 13865 '-newreq', but calls 'openssl req' with the '-nodes' option 13866 so that the resulting key is not encrypted. 13867 13868 *Damien Miller <djm@mindrot.org>* 13869 13870 * New configuration for the GNU Hurd. 13871 13872 *Jonathan Bartlett <johnnyb@wolfram.com> via Richard Levitte* 13873 13874 * Initial code to implement OCSP basic response verify. This 13875 is currently incomplete. Currently just finds the signer's 13876 certificate and verifies the signature on the response. 13877 13878 *Steve Henson* 13879 13880 * New SSLeay_version code SSLEAY_DIR to determine the compiled-in 13881 value of OPENSSLDIR. This is available via the new '-d' option 13882 to 'openssl version', and is also included in 'openssl version -a'. 13883 13884 *Bodo Moeller* 13885 13886 * Allowing defining memory allocation callbacks that will be given 13887 file name and line number information in additional arguments 13888 (a `const char*` and an int). The basic functionality remains, as 13889 well as the original possibility to just replace malloc(), 13890 realloc() and free() by functions that do not know about these 13891 additional arguments. To register and find out the current 13892 settings for extended allocation functions, the following 13893 functions are provided: 13894 13895 CRYPTO_set_mem_ex_functions 13896 CRYPTO_set_locked_mem_ex_functions 13897 CRYPTO_get_mem_ex_functions 13898 CRYPTO_get_locked_mem_ex_functions 13899 13900 These work the same way as CRYPTO_set_mem_functions and friends. 13901 `CRYPTO_get_[locked_]mem_functions` now writes 0 where such an 13902 extended allocation function is enabled. 13903 Similarly, `CRYPTO_get_[locked_]mem_ex_functions` writes 0 where 13904 a conventional allocation function is enabled. 13905 13906 *Richard Levitte, Bodo Moeller* 13907 13908 * Finish off removing the remaining LHASH function pointer casts. 13909 There should no longer be any prototype-casting required when using 13910 the LHASH abstraction, and any casts that remain are "bugs". See 13911 the callback types and macros at the head of lhash.h for details 13912 (and "OBJ_cleanup" in crypto/objects/obj_dat.c as an example). 13913 13914 *Geoff Thorpe* 13915 13916 * Add automatic query of EGD sockets in RAND_poll() for the unix variant. 13917 If /dev/[u]random devices are not available or do not return enough 13918 entropy, EGD style sockets (served by EGD or PRNGD) will automatically 13919 be queried. 13920 The locations /var/run/egd-pool, /dev/egd-pool, /etc/egd-pool, and 13921 /etc/entropy will be queried once each in this sequence, querying stops 13922 when enough entropy was collected without querying more sockets. 13923 13924 *Lutz Jaenicke* 13925 13926 * Change the Unix RAND_poll() variant to be able to poll several 13927 random devices, as specified by DEVRANDOM, until a sufficient amount 13928 of data has been collected. We spend at most 10 ms on each file 13929 (select timeout) and read in non-blocking mode. DEVRANDOM now 13930 defaults to the list "/dev/urandom", "/dev/random", "/dev/srandom" 13931 (previously it was just the string "/dev/urandom"), so on typical 13932 platforms the 10 ms delay will never occur. 13933 Also separate out the Unix variant to its own file, rand_unix.c. 13934 For VMS, there's a currently-empty rand_vms.c. 13935 13936 *Richard Levitte* 13937 13938 * Move OCSP client related routines to ocsp_cl.c. These 13939 provide utility functions which an application needing 13940 to issue a request to an OCSP responder and analyse the 13941 response will typically need: as opposed to those which an 13942 OCSP responder itself would need which will be added later. 13943 13944 OCSP_request_sign() signs an OCSP request with an API similar 13945 to PKCS7_sign(). OCSP_response_status() returns status of OCSP 13946 response. OCSP_response_get1_basic() extracts basic response 13947 from response. OCSP_resp_find_status(): finds and extracts status 13948 information from an OCSP_CERTID structure (which will be created 13949 when the request structure is built). These are built from lower 13950 level functions which work on OCSP_SINGLERESP structures but 13951 won't normally be used unless the application wishes to examine 13952 extensions in the OCSP response for example. 13953 13954 Replace nonce routines with a pair of functions. 13955 OCSP_request_add1_nonce() adds a nonce value and optionally 13956 generates a random value. OCSP_check_nonce() checks the 13957 validity of the nonce in an OCSP response. 13958 13959 *Steve Henson* 13960 13961 * Change function OCSP_request_add() to OCSP_request_add0_id(). 13962 This doesn't copy the supplied OCSP_CERTID and avoids the 13963 need to free up the newly created id. Change return type 13964 to OCSP_ONEREQ to return the internal OCSP_ONEREQ structure. 13965 This can then be used to add extensions to the request. 13966 Deleted OCSP_request_new(), since most of its functionality 13967 is now in OCSP_REQUEST_new() (and the case insensitive name 13968 clash) apart from the ability to set the request name which 13969 will be added elsewhere. 13970 13971 *Steve Henson* 13972 13973 * Update OCSP API. Remove obsolete extensions argument from 13974 various functions. Extensions are now handled using the new 13975 OCSP extension code. New simple OCSP HTTP function which 13976 can be used to send requests and parse the response. 13977 13978 *Steve Henson* 13979 13980 * Fix the PKCS#7 (S/MIME) code to work with new ASN1. Two new 13981 ASN1_ITEM structures help with sign and verify. PKCS7_ATTR_SIGN 13982 uses the special reorder version of SET OF to sort the attributes 13983 and reorder them to match the encoded order. This resolves a long 13984 standing problem: a verify on a PKCS7 structure just after signing 13985 it used to fail because the attribute order did not match the 13986 encoded order. PKCS7_ATTR_VERIFY does not reorder the attributes: 13987 it uses the received order. This is necessary to tolerate some broken 13988 software that does not order SET OF. This is handled by encoding 13989 as a SEQUENCE OF but using implicit tagging (with UNIVERSAL class) 13990 to produce the required SET OF. 13991 13992 *Steve Henson* 13993 13994 * Have mk1mf.pl generate the macros OPENSSL_BUILD_SHLIBCRYPTO and 13995 OPENSSL_BUILD_SHLIBSSL and use them appropriately in the header 13996 files to get correct declarations of the ASN.1 item variables. 13997 13998 *Richard Levitte* 13999 14000 * Rewrite of PKCS#12 code to use new ASN1 functionality. Replace many 14001 PKCS#12 macros with real functions. Fix two unrelated ASN1 bugs: 14002 asn1_check_tlen() would sometimes attempt to use 'ctx' when it was 14003 NULL and ASN1_TYPE was not dereferenced properly in asn1_ex_c2i(). 14004 New ASN1 macro: DECLARE_ASN1_ITEM() which just declares the relevant 14005 ASN1_ITEM and no wrapper functions. 14006 14007 *Steve Henson* 14008 14009 * New functions or ASN1_item_d2i_fp() and ASN1_item_d2i_bio(). These 14010 replace the old function pointer based I/O routines. Change most of 14011 the `*_d2i_bio()` and `*_d2i_fp()` functions to use these. 14012 14013 *Steve Henson* 14014 14015 * Enhance mkdef.pl to be more accepting about spacing in C preprocessor 14016 lines, recognize more "algorithms" that can be deselected, and make 14017 it complain about algorithm deselection that isn't recognised. 14018 14019 *Richard Levitte* 14020 14021 * New ASN1 functions to handle dup, sign, verify, digest, pack and 14022 unpack operations in terms of ASN1_ITEM. Modify existing wrappers 14023 to use new functions. Add NO_ASN1_OLD which can be set to remove 14024 some old style ASN1 functions: this can be used to determine if old 14025 code will still work when these eventually go away. 14026 14027 *Steve Henson* 14028 14029 * New extension functions for OCSP structures, these follow the 14030 same conventions as certificates and CRLs. 14031 14032 *Steve Henson* 14033 14034 * New function X509V3_add1_i2d(). This automatically encodes and 14035 adds an extension. Its behaviour can be customised with various 14036 flags to append, replace or delete. Various wrappers added for 14037 certificates and CRLs. 14038 14039 *Steve Henson* 14040 14041 * Fix to avoid calling the underlying ASN1 print routine when 14042 an extension cannot be parsed. Correct a typo in the 14043 OCSP_SERVICELOC extension. Tidy up print OCSP format. 14044 14045 *Steve Henson* 14046 14047 * Make mkdef.pl parse some of the ASN1 macros and add appropriate 14048 entries for variables. 14049 14050 *Steve Henson* 14051 14052 * Add functionality to `apps/openssl.c` for detecting locking 14053 problems: As the program is single-threaded, all we have 14054 to do is register a locking callback using an array for 14055 storing which locks are currently held by the program. 14056 14057 *Bodo Moeller* 14058 14059 * Use a lock around the call to CRYPTO_get_ex_new_index() in 14060 SSL_get_ex_data_X509_STORE_idx(), which is used in 14061 ssl_verify_cert_chain() and thus can be called at any time 14062 during TLS/SSL handshakes so that thread-safety is essential. 14063 Unfortunately, the ex_data design is not at all suited 14064 for multi-threaded use, so it probably should be abolished. 14065 14066 *Bodo Moeller* 14067 14068 * Added Broadcom "ubsec" ENGINE to OpenSSL. 14069 14070 *Broadcom, tweaked and integrated by Geoff Thorpe* 14071 14072 * Move common extension printing code to new function 14073 X509V3_print_extensions(). Reorganise OCSP print routines and 14074 implement some needed OCSP ASN1 functions. Add OCSP extensions. 14075 14076 *Steve Henson* 14077 14078 * New function X509_signature_print() to remove duplication in some 14079 print routines. 14080 14081 *Steve Henson* 14082 14083 * Add a special meaning when SET OF and SEQUENCE OF flags are both 14084 set (this was treated exactly the same as SET OF previously). This 14085 is used to reorder the STACK representing the structure to match the 14086 encoding. This will be used to get round a problem where a PKCS7 14087 structure which was signed could not be verified because the STACK 14088 order did not reflect the encoded order. 14089 14090 *Steve Henson* 14091 14092 * Reimplement the OCSP ASN1 module using the new code. 14093 14094 *Steve Henson* 14095 14096 * Update the X509V3 code to permit the use of an ASN1_ITEM structure 14097 for its ASN1 operations. The old style function pointers still exist 14098 for now but they will eventually go away. 14099 14100 *Steve Henson* 14101 14102 * Merge in replacement ASN1 code from the ASN1 branch. This almost 14103 completely replaces the old ASN1 functionality with a table driven 14104 encoder and decoder which interprets an ASN1_ITEM structure describing 14105 the ASN1 module. Compatibility with the existing ASN1 API (i2d,d2i) is 14106 largely maintained. Almost all of the old asn1_mac.h macro based ASN1 14107 has also been converted to the new form. 14108 14109 *Steve Henson* 14110 14111 * Change BN_mod_exp_recp so that negative moduli are tolerated 14112 (the sign is ignored). Similarly, ignore the sign in BN_MONT_CTX_set 14113 so that BN_mod_exp_mont and BN_mod_exp_mont_word work 14114 for negative moduli. 14115 14116 *Bodo Moeller* 14117 14118 * Fix BN_uadd and BN_usub: Always return non-negative results instead 14119 of not touching the result's sign bit. 14120 14121 *Bodo Moeller* 14122 14123 * BN_div bugfix: If the result is 0, the sign (res->neg) must not be 14124 set. 14125 14126 *Bodo Moeller* 14127 14128 * Changed the LHASH code to use prototypes for callbacks, and created 14129 macros to declare and implement thin (optionally static) functions 14130 that provide type-safety and avoid function pointer casting for the 14131 type-specific callbacks. 14132 14133 *Geoff Thorpe* 14134 14135 * Added Kerberos Cipher Suites to be used with TLS, as written in 14136 RFC 2712. 14137 *Veers Staats <staatsvr@asc.hpc.mil>, 14138 Jeffrey Altman <jaltman@columbia.edu>, via Richard Levitte* 14139 14140 * Reformat the FAQ so the different questions and answers can be divided 14141 in sections depending on the subject. 14142 14143 *Richard Levitte* 14144 14145 * Have the zlib compression code load ZLIB.DLL dynamically under 14146 Windows. 14147 14148 *Richard Levitte* 14149 14150 * New function BN_mod_sqrt for computing square roots modulo a prime 14151 (using the probabilistic Tonelli-Shanks algorithm unless 14152 p == 3 (mod 4) or p == 5 (mod 8), which are cases that can 14153 be handled deterministically). 14154 14155 *Lenka Fibikova <fibikova@exp-math.uni-essen.de>, Bodo Moeller* 14156 14157 * Make BN_mod_inverse faster by explicitly handling small quotients 14158 in the Euclid loop. (Speed gain about 20% for small moduli [256 or 14159 512 bits], about 30% for larger ones [1024 or 2048 bits].) 14160 14161 *Bodo Moeller* 14162 14163 * New function BN_kronecker. 14164 14165 *Bodo Moeller* 14166 14167 * Fix BN_gcd so that it works on negative inputs; the result is 14168 positive unless both parameters are zero. 14169 Previously something reasonably close to an infinite loop was 14170 possible because numbers could be growing instead of shrinking 14171 in the implementation of Euclid's algorithm. 14172 14173 *Bodo Moeller* 14174 14175 * Fix BN_is_word() and BN_is_one() macros to take into account the 14176 sign of the number in question. 14177 14178 Fix BN_is_word(a,w) to work correctly for w == 0. 14179 14180 The old BN_is_word(a,w) macro is now called BN_abs_is_word(a,w) 14181 because its test if the absolute value of 'a' equals 'w'. 14182 Note that BN_abs_is_word does *not* handle w == 0 reliably; 14183 it exists mostly for use in the implementations of BN_is_zero(), 14184 BN_is_one(), and BN_is_word(). 14185 14186 *Bodo Moeller* 14187 14188 * New function BN_swap. 14189 14190 *Bodo Moeller* 14191 14192 * Use BN_nnmod instead of BN_mod in crypto/bn/bn_exp.c so that 14193 the exponentiation functions are more likely to produce reasonable 14194 results on negative inputs. 14195 14196 *Bodo Moeller* 14197 14198 * Change BN_mod_mul so that the result is always non-negative. 14199 Previously, it could be negative if one of the factors was negative; 14200 I don't think anyone really wanted that behaviour. 14201 14202 *Bodo Moeller* 14203 14204 * Move `BN_mod_...` functions into new file `crypto/bn/bn_mod.c` 14205 (except for exponentiation, which stays in `crypto/bn/bn_exp.c`, 14206 and `BN_mod_mul_reciprocal`, which stays in `crypto/bn/bn_recp.c`) 14207 and add new functions: 14208 14209 BN_nnmod 14210 BN_mod_sqr 14211 BN_mod_add 14212 BN_mod_add_quick 14213 BN_mod_sub 14214 BN_mod_sub_quick 14215 BN_mod_lshift1 14216 BN_mod_lshift1_quick 14217 BN_mod_lshift 14218 BN_mod_lshift_quick 14219 14220 These functions always generate non-negative results. 14221 14222 `BN_nnmod` otherwise is `like BN_mod` (if `BN_mod` computes a remainder `r` 14223 such that `|m| < r < 0`, `BN_nnmod` will output `rem + |m|` instead). 14224 14225 `BN_mod_XXX_quick(r, a, [b,] m)` generates the same result as 14226 `BN_mod_XXX(r, a, [b,] m, ctx)`, but requires that `a` [and `b`] 14227 be reduced modulo `m`. 14228 14229 *Lenka Fibikova <fibikova@exp-math.uni-essen.de>, Bodo Moeller* 14230 14231<!-- 14232 The following entry accidentally appeared in the CHANGES file 14233 distributed with OpenSSL 0.9.7. The modifications described in 14234 it do *not* apply to OpenSSL 0.9.7. 14235 14236 * Remove a few calls to bn_wexpand() in BN_sqr() (the one in there 14237 was actually never needed) and in BN_mul(). The removal in BN_mul() 14238 required a small change in bn_mul_part_recursive() and the addition 14239 of the functions bn_cmp_part_words(), bn_sub_part_words() and 14240 bn_add_part_words(), which do the same thing as bn_cmp_words(), 14241 bn_sub_words() and bn_add_words() except they take arrays with 14242 differing sizes. 14243 14244 *Richard Levitte* 14245--> 14246 14247 * In 'openssl passwd', verify passwords read from the terminal 14248 unless the '-salt' option is used (which usually means that 14249 verification would just waste user's time since the resulting 14250 hash is going to be compared with some given password hash) 14251 or the new '-noverify' option is used. 14252 14253 This is an incompatible change, but it does not affect 14254 non-interactive use of 'openssl passwd' (passwords on the command 14255 line, '-stdin' option, '-in ...' option) and thus should not 14256 cause any problems. 14257 14258 *Bodo Moeller* 14259 14260 * Remove all references to RSAref, since there's no more need for it. 14261 14262 *Richard Levitte* 14263 14264 * Make DSO load along a path given through an environment variable 14265 (SHLIB_PATH) with shl_load(). 14266 14267 *Richard Levitte* 14268 14269 * Constify the ENGINE code as a result of BIGNUM constification. 14270 Also constify the RSA code and most things related to it. In a 14271 few places, most notable in the depth of the ASN.1 code, ugly 14272 casts back to non-const were required (to be solved at a later 14273 time) 14274 14275 *Richard Levitte* 14276 14277 * Make it so the openssl application has all engines loaded by default. 14278 14279 *Richard Levitte* 14280 14281 * Constify the BIGNUM routines a little more. 14282 14283 *Richard Levitte* 14284 14285 * Add the following functions: 14286 14287 ENGINE_load_cswift() 14288 ENGINE_load_chil() 14289 ENGINE_load_atalla() 14290 ENGINE_load_nuron() 14291 ENGINE_load_builtin_engines() 14292 14293 That way, an application can itself choose if external engines that 14294 are built-in in OpenSSL shall ever be used or not. The benefit is 14295 that applications won't have to be linked with libdl or other dso 14296 libraries unless it's really needed. 14297 14298 Changed 'openssl engine' to load all engines on demand. 14299 Changed the engine header files to avoid the duplication of some 14300 declarations (they differed!). 14301 14302 *Richard Levitte* 14303 14304 * 'openssl engine' can now list capabilities. 14305 14306 *Richard Levitte* 14307 14308 * Better error reporting in 'openssl engine'. 14309 14310 *Richard Levitte* 14311 14312 * Never call load_dh_param(NULL) in s_server. 14313 14314 *Bodo Moeller* 14315 14316 * Add engine application. It can currently list engines by name and 14317 identity, and test if they are actually available. 14318 14319 *Richard Levitte* 14320 14321 * Improve RPM specification file by forcing symbolic linking and making 14322 sure the installed documentation is also owned by root.root. 14323 14324 *Damien Miller <djm@mindrot.org>* 14325 14326 * Give the OpenSSL applications more possibilities to make use of 14327 keys (public as well as private) handled by engines. 14328 14329 *Richard Levitte* 14330 14331 * Add OCSP code that comes from CertCo. 14332 14333 *Richard Levitte* 14334 14335 * Add VMS support for the Rijndael code. 14336 14337 *Richard Levitte* 14338 14339 * Added untested support for Nuron crypto accelerator. 14340 14341 *Ben Laurie* 14342 14343 * Add support for external cryptographic devices. This code was 14344 previously distributed separately as the "engine" branch. 14345 14346 *Geoff Thorpe, Richard Levitte* 14347 14348 * Rework the filename-translation in the DSO code. It is now possible to 14349 have far greater control over how a "name" is turned into a filename 14350 depending on the operating environment and any oddities about the 14351 different shared library filenames on each system. 14352 14353 *Geoff Thorpe* 14354 14355 * Support threads on FreeBSD-elf in Configure. 14356 14357 *Richard Levitte* 14358 14359 * Fix for SHA1 assembly problem with MASM: it produces 14360 warnings about corrupt line number information when assembling 14361 with debugging information. This is caused by the overlapping 14362 of two sections. 14363 14364 *Bernd Matthes <mainbug@celocom.de>, Steve Henson* 14365 14366 * NCONF changes. 14367 NCONF_get_number() has no error checking at all. As a replacement, 14368 NCONF_get_number_e() is defined (`_e` for "error checking") and is 14369 promoted strongly. The old NCONF_get_number is kept around for 14370 binary backward compatibility. 14371 Make it possible for methods to load from something other than a BIO, 14372 by providing a function pointer that is given a name instead of a BIO. 14373 For example, this could be used to load configuration data from an 14374 LDAP server. 14375 14376 *Richard Levitte* 14377 14378 * Fix for non blocking accept BIOs. Added new I/O special reason 14379 BIO_RR_ACCEPT to cover this case. Previously use of accept BIOs 14380 with non blocking I/O was not possible because no retry code was 14381 implemented. Also added new SSL code SSL_WANT_ACCEPT to cover 14382 this case. 14383 14384 *Steve Henson* 14385 14386 * Added the beginnings of Rijndael support. 14387 14388 *Ben Laurie* 14389 14390 * Fix for bug in DirectoryString mask setting. Add support for 14391 X509_NAME_print_ex() in 'req' and X509_print_ex() function 14392 to allow certificate printing to more controllable, additional 14393 'certopt' option to 'x509' to allow new printing options to be 14394 set. 14395 14396 *Steve Henson* 14397 14398 * Clean old EAY MD5 hack from e_os.h. 14399 14400 *Richard Levitte* 14401 14402### Changes between 0.9.6l and 0.9.6m [17 Mar 2004] 14403 14404 * Fix null-pointer assignment in do_change_cipher_spec() revealed 14405 by using the Codenomicon TLS Test Tool ([CVE-2004-0079]) 14406 14407 *Joe Orton, Steve Henson* 14408 14409### Changes between 0.9.6k and 0.9.6l [04 Nov 2003] 14410 14411 * Fix additional bug revealed by the NISCC test suite: 14412 14413 Stop bug triggering large recursion when presented with 14414 certain ASN.1 tags ([CVE-2003-0851]) 14415 14416 *Steve Henson* 14417 14418### Changes between 0.9.6j and 0.9.6k [30 Sep 2003] 14419 14420 * Fix various bugs revealed by running the NISCC test suite: 14421 14422 Stop out of bounds reads in the ASN1 code when presented with 14423 invalid tags (CVE-2003-0543 and CVE-2003-0544). 14424 14425 If verify callback ignores invalid public key errors don't try to check 14426 certificate signature with the NULL public key. 14427 14428 *Steve Henson* 14429 14430 * In ssl3_accept() (ssl/s3_srvr.c) only accept a client certificate 14431 if the server requested one: as stated in TLS 1.0 and SSL 3.0 14432 specifications. 14433 14434 *Steve Henson* 14435 14436 * In ssl3_get_client_hello() (ssl/s3_srvr.c), tolerate additional 14437 extra data after the compression methods not only for TLS 1.0 14438 but also for SSL 3.0 (as required by the specification). 14439 14440 *Bodo Moeller; problem pointed out by Matthias Loepfe* 14441 14442 * Change X509_certificate_type() to mark the key as exported/exportable 14443 when it's 512 *bits* long, not 512 bytes. 14444 14445 *Richard Levitte* 14446 14447### Changes between 0.9.6i and 0.9.6j [10 Apr 2003] 14448 14449 * Countermeasure against the Klima-Pokorny-Rosa extension of 14450 Bleichbacher's attack on PKCS #1 v1.5 padding: treat 14451 a protocol version number mismatch like a decryption error 14452 in ssl3_get_client_key_exchange (ssl/s3_srvr.c). 14453 14454 *Bodo Moeller* 14455 14456 * Turn on RSA blinding by default in the default implementation 14457 to avoid a timing attack. Applications that don't want it can call 14458 RSA_blinding_off() or use the new flag RSA_FLAG_NO_BLINDING. 14459 They would be ill-advised to do so in most cases. 14460 14461 *Ben Laurie, Steve Henson, Geoff Thorpe, Bodo Moeller* 14462 14463 * Change RSA blinding code so that it works when the PRNG is not 14464 seeded (in this case, the secret RSA exponent is abused as 14465 an unpredictable seed -- if it is not unpredictable, there 14466 is no point in blinding anyway). Make RSA blinding thread-safe 14467 by remembering the creator's thread ID in rsa->blinding and 14468 having all other threads use local one-time blinding factors 14469 (this requires more computation than sharing rsa->blinding, but 14470 avoids excessive locking; and if an RSA object is not shared 14471 between threads, blinding will still be very fast). 14472 14473 *Bodo Moeller* 14474 14475### Changes between 0.9.6h and 0.9.6i [19 Feb 2003] 14476 14477 * In ssl3_get_record (ssl/s3_pkt.c), minimize information leaked 14478 via timing by performing a MAC computation even if incorrect 14479 block cipher padding has been found. This is a countermeasure 14480 against active attacks where the attacker has to distinguish 14481 between bad padding and a MAC verification error. ([CVE-2003-0078]) 14482 14483 *Bodo Moeller; problem pointed out by Brice Canvel (EPFL), 14484 Alain Hiltgen (UBS), Serge Vaudenay (EPFL), and 14485 Martin Vuagnoux (EPFL, Ilion)* 14486 14487### Changes between 0.9.6g and 0.9.6h [5 Dec 2002] 14488 14489 * New function OPENSSL_cleanse(), which is used to cleanse a section of 14490 memory from its contents. This is done with a counter that will 14491 place alternating values in each byte. This can be used to solve 14492 two issues: 1) the removal of calls to memset() by highly optimizing 14493 compilers, and 2) cleansing with other values than 0, since those can 14494 be read through on certain media, for example a swap space on disk. 14495 14496 *Geoff Thorpe* 14497 14498 * Bugfix: client side session caching did not work with external caching, 14499 because the session->cipher setting was not restored when reloading 14500 from the external cache. This problem was masked, when 14501 SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG (part of SSL_OP_ALL) was set. 14502 (Found by Steve Haslam <steve@araqnid.ddts.net>.) 14503 14504 *Lutz Jaenicke* 14505 14506 * Fix client_certificate (ssl/s2_clnt.c): The permissible total 14507 length of the REQUEST-CERTIFICATE message is 18 .. 34, not 17 .. 33. 14508 14509 *Zeev Lieber <zeev-l@yahoo.com>* 14510 14511 * Undo an undocumented change introduced in 0.9.6e which caused 14512 repeated calls to OpenSSL_add_all_ciphers() and 14513 OpenSSL_add_all_digests() to be ignored, even after calling 14514 EVP_cleanup(). 14515 14516 *Richard Levitte* 14517 14518 * Change the default configuration reader to deal with last line not 14519 being properly terminated. 14520 14521 *Richard Levitte* 14522 14523 * Change X509_NAME_cmp() so it applies the special rules on handling 14524 DN values that are of type PrintableString, as well as RDNs of type 14525 emailAddress where the value has the type ia5String. 14526 14527 *stefank@valicert.com via Richard Levitte* 14528 14529 * Add a SSL_SESS_CACHE_NO_INTERNAL_STORE flag to take over half 14530 the job SSL_SESS_CACHE_NO_INTERNAL_LOOKUP was inconsistently 14531 doing, define a new flag (SSL_SESS_CACHE_NO_INTERNAL) to be 14532 the bitwise-OR of the two for use by the majority of applications 14533 wanting this behaviour, and update the docs. The documented 14534 behaviour and actual behaviour were inconsistent and had been 14535 changing anyway, so this is more a bug-fix than a behavioural 14536 change. 14537 14538 *Geoff Thorpe, diagnosed by Nadav Har'El* 14539 14540 * Don't impose a 16-byte length minimum on session IDs in ssl/s3_clnt.c 14541 (the SSL 3.0 and TLS 1.0 specifications allow any length up to 32 bytes). 14542 14543 *Bodo Moeller* 14544 14545 * Fix initialization code race conditions in 14546 SSLv23_method(), SSLv23_client_method(), SSLv23_server_method(), 14547 SSLv2_method(), SSLv2_client_method(), SSLv2_server_method(), 14548 SSLv3_method(), SSLv3_client_method(), SSLv3_server_method(), 14549 TLSv1_method(), TLSv1_client_method(), TLSv1_server_method(), 14550 ssl2_get_cipher_by_char(), 14551 ssl3_get_cipher_by_char(). 14552 14553 *Patrick McCormick <patrick@tellme.com>, Bodo Moeller* 14554 14555 * Reorder cleanup sequence in SSL_CTX_free(): only remove the ex_data after 14556 the cached sessions are flushed, as the remove_cb() might use ex_data 14557 contents. Bug found by Sam Varshavchik <mrsam@courier-mta.com> 14558 (see [openssl.org #212]). 14559 14560 *Geoff Thorpe, Lutz Jaenicke* 14561 14562 * Fix typo in OBJ_txt2obj which incorrectly passed the content 14563 length, instead of the encoding length to d2i_ASN1_OBJECT. 14564 14565 *Steve Henson* 14566 14567### Changes between 0.9.6f and 0.9.6g [9 Aug 2002] 14568 14569 * [In 0.9.6g-engine release:] 14570 Fix crypto/engine/vendor_defns/cswift.h for WIN32 (use `_stdcall`). 14571 14572 *Lynn Gazis <lgazis@rainbow.com>* 14573 14574### Changes between 0.9.6e and 0.9.6f [8 Aug 2002] 14575 14576 * Fix ASN1 checks. Check for overflow by comparing with LONG_MAX 14577 and get fix the header length calculation. 14578 *Florian Weimer <Weimer@CERT.Uni-Stuttgart.DE>, 14579 Alon Kantor <alonk@checkpoint.com> (and others), Steve Henson* 14580 14581 * Use proper error handling instead of 'assertions' in buffer 14582 overflow checks added in 0.9.6e. This prevents DoS (the 14583 assertions could call abort()). 14584 14585 *Arne Ansper <arne@ats.cyber.ee>, Bodo Moeller* 14586 14587### Changes between 0.9.6d and 0.9.6e [30 Jul 2002] 14588 14589 * Add various sanity checks to asn1_get_length() to reject 14590 the ASN1 length bytes if they exceed sizeof(long), will appear 14591 negative or the content length exceeds the length of the 14592 supplied buffer. 14593 14594 *Steve Henson, Adi Stav <stav@mercury.co.il>, James Yonan <jim@ntlp.com>* 14595 14596 * Fix cipher selection routines: ciphers without encryption had no flags 14597 for the cipher strength set and where therefore not handled correctly 14598 by the selection routines (PR #130). 14599 14600 *Lutz Jaenicke* 14601 14602 * Fix EVP_dsa_sha macro. 14603 14604 *Nils Larsch* 14605 14606 * New option 14607 SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS 14608 for disabling the SSL 3.0/TLS 1.0 CBC vulnerability countermeasure 14609 that was added in OpenSSL 0.9.6d. 14610 14611 As the countermeasure turned out to be incompatible with some 14612 broken SSL implementations, the new option is part of SSL_OP_ALL. 14613 SSL_OP_ALL is usually employed when compatibility with weird SSL 14614 implementations is desired (e.g. '-bugs' option to 's_client' and 14615 's_server'), so the new option is automatically set in many 14616 applications. 14617 14618 *Bodo Moeller* 14619 14620 * Changes in security patch: 14621 14622 Changes marked "(CHATS)" were sponsored by the Defense Advanced 14623 Research Projects Agency (DARPA) and Air Force Research Laboratory, 14624 Air Force Materiel Command, USAF, under agreement number 14625 F30602-01-2-0537. 14626 14627 * Add various sanity checks to asn1_get_length() to reject 14628 the ASN1 length bytes if they exceed sizeof(long), will appear 14629 negative or the content length exceeds the length of the 14630 supplied buffer. ([CVE-2002-0659]) 14631 14632 *Steve Henson, Adi Stav <stav@mercury.co.il>, James Yonan <jim@ntlp.com>* 14633 14634 * Assertions for various potential buffer overflows, not known to 14635 happen in practice. 14636 14637 *Ben Laurie (CHATS)* 14638 14639 * Various temporary buffers to hold ASCII versions of integers were 14640 too small for 64 bit platforms. ([CVE-2002-0655]) 14641 *Matthew Byng-Maddick <mbm@aldigital.co.uk> and Ben Laurie (CHATS)>* 14642 14643 * Remote buffer overflow in SSL3 protocol - an attacker could 14644 supply an oversized session ID to a client. ([CVE-2002-0656]) 14645 14646 *Ben Laurie (CHATS)* 14647 14648 * Remote buffer overflow in SSL2 protocol - an attacker could 14649 supply an oversized client master key. ([CVE-2002-0656]) 14650 14651 *Ben Laurie (CHATS)* 14652 14653### Changes between 0.9.6c and 0.9.6d [9 May 2002] 14654 14655 * Fix crypto/asn1/a_sign.c so that 'parameters' is omitted (not 14656 encoded as NULL) with id-dsa-with-sha1. 14657 14658 *Nils Larsch <nla@trustcenter.de>; problem pointed out by Bodo Moeller* 14659 14660 * Check various `X509_...()` return values in `apps/req.c`. 14661 14662 *Nils Larsch <nla@trustcenter.de>* 14663 14664 * Fix BASE64 decode (EVP_DecodeUpdate) for data with CR/LF ended lines: 14665 an end-of-file condition would erroneously be flagged, when the CRLF 14666 was just at the end of a processed block. The bug was discovered when 14667 processing data through a buffering memory BIO handing the data to a 14668 BASE64-decoding BIO. Bug fund and patch submitted by Pavel Tsekov 14669 <ptsekov@syntrex.com> and Nedelcho Stanev. 14670 14671 *Lutz Jaenicke* 14672 14673 * Implement a countermeasure against a vulnerability recently found 14674 in CBC ciphersuites in SSL 3.0/TLS 1.0: Send an empty fragment 14675 before application data chunks to avoid the use of known IVs 14676 with data potentially chosen by the attacker. 14677 14678 *Bodo Moeller* 14679 14680 * Fix length checks in ssl3_get_client_hello(). 14681 14682 *Bodo Moeller* 14683 14684 * TLS/SSL library bugfix: use s->s3->in_read_app_data differently 14685 to prevent ssl3_read_internal() from incorrectly assuming that 14686 ssl3_read_bytes() found application data while handshake 14687 processing was enabled when in fact s->s3->in_read_app_data was 14688 merely automatically cleared during the initial handshake. 14689 14690 *Bodo Moeller; problem pointed out by Arne Ansper <arne@ats.cyber.ee>* 14691 14692 * Fix object definitions for Private and Enterprise: they were not 14693 recognized in their shortname (=lowercase) representation. Extend 14694 obj_dat.pl to issue an error when using undefined keywords instead 14695 of silently ignoring the problem (Svenning Sorensen 14696 <sss@sss.dnsalias.net>). 14697 14698 *Lutz Jaenicke* 14699 14700 * Fix DH_generate_parameters() so that it works for 'non-standard' 14701 generators, i.e. generators other than 2 and 5. (Previously, the 14702 code did not properly initialise the 'add' and 'rem' values to 14703 BN_generate_prime().) 14704 14705 In the new general case, we do not insist that 'generator' is 14706 actually a primitive root: This requirement is rather pointless; 14707 a generator of the order-q subgroup is just as good, if not 14708 better. 14709 14710 *Bodo Moeller* 14711 14712 * Map new X509 verification errors to alerts. Discovered and submitted by 14713 Tom Wu <tom@arcot.com>. 14714 14715 *Lutz Jaenicke* 14716 14717 * Fix ssl3_pending() (ssl/s3_lib.c) to prevent SSL_pending() from 14718 returning non-zero before the data has been completely received 14719 when using non-blocking I/O. 14720 14721 *Bodo Moeller; problem pointed out by John Hughes* 14722 14723 * Some of the ciphers missed the strength entry (SSL_LOW etc). 14724 14725 *Ben Laurie, Lutz Jaenicke* 14726 14727 * Fix bug in SSL_clear(): bad sessions were not removed (found by 14728 Yoram Zahavi <YoramZ@gilian.com>). 14729 14730 *Lutz Jaenicke* 14731 14732 * Add information about CygWin 1.3 and on, and preserve proper 14733 configuration for the versions before that. 14734 14735 *Corinna Vinschen <vinschen@redhat.com> and Richard Levitte* 14736 14737 * Make removal from session cache (SSL_CTX_remove_session()) more robust: 14738 check whether we deal with a copy of a session and do not delete from 14739 the cache in this case. Problem reported by "Izhar Shoshani Levi" 14740 <izhar@checkpoint.com>. 14741 14742 *Lutz Jaenicke* 14743 14744 * Do not store session data into the internal session cache, if it 14745 is never intended to be looked up (SSL_SESS_CACHE_NO_INTERNAL_LOOKUP 14746 flag is set). Proposed by Aslam <aslam@funk.com>. 14747 14748 *Lutz Jaenicke* 14749 14750 * Have ASN1_BIT_STRING_set_bit() really clear a bit when the requested 14751 value is 0. 14752 14753 *Richard Levitte* 14754 14755 * [In 0.9.6d-engine release:] 14756 Fix a crashbug and a logic bug in hwcrhk_load_pubkey(). 14757 14758 *Toomas Kiisk <vix@cyber.ee> via Richard Levitte* 14759 14760 * Add the configuration target linux-s390x. 14761 14762 *Neale Ferguson <Neale.Ferguson@SoftwareAG-USA.com> via Richard Levitte* 14763 14764 * The earlier bugfix for the SSL3_ST_SW_HELLO_REQ_C case of 14765 ssl3_accept (ssl/s3_srvr.c) incorrectly used a local flag 14766 variable as an indication that a ClientHello message has been 14767 received. As the flag value will be lost between multiple 14768 invocations of ssl3_accept when using non-blocking I/O, the 14769 function may not be aware that a handshake has actually taken 14770 place, thus preventing a new session from being added to the 14771 session cache. 14772 14773 To avoid this problem, we now set s->new_session to 2 instead of 14774 using a local variable. 14775 14776 *Lutz Jaenicke, Bodo Moeller* 14777 14778 * Bugfix: Return -1 from ssl3_get_server_done (ssl3/s3_clnt.c) 14779 if the SSL_R_LENGTH_MISMATCH error is detected. 14780 14781 *Geoff Thorpe, Bodo Moeller* 14782 14783 * New 'shared_ldflag' column in Configure platform table. 14784 14785 *Richard Levitte* 14786 14787 * Fix EVP_CIPHER_mode macro. 14788 14789 *"Dan S. Camper" <dan@bti.net>* 14790 14791 * Fix ssl3_read_bytes (ssl/s3_pkt.c): To ignore messages of unknown 14792 type, we must throw them away by setting rr->length to 0. 14793 14794 *D P Chang <dpc@qualys.com>* 14795 14796### Changes between 0.9.6b and 0.9.6c [21 dec 2001] 14797 14798 * Fix BN_rand_range bug pointed out by Dominikus Scherkl 14799 <Dominikus.Scherkl@biodata.com>. (The previous implementation 14800 worked incorrectly for those cases where range = `10..._2` and 14801 `3*range` is two bits longer than range.) 14802 14803 *Bodo Moeller* 14804 14805 * Only add signing time to PKCS7 structures if it is not already 14806 present. 14807 14808 *Steve Henson* 14809 14810 * Fix crypto/objects/objects.h: "ld-ce" should be "id-ce", 14811 OBJ_ld_ce should be OBJ_id_ce. 14812 Also some ip-pda OIDs in crypto/objects/objects.txt were 14813 incorrect (cf. RFC 3039). 14814 14815 *Matt Cooper, Frederic Giudicelli, Bodo Moeller* 14816 14817 * Release CRYPTO_LOCK_DYNLOCK when CRYPTO_destroy_dynlockid() 14818 returns early because it has nothing to do. 14819 14820 *Andy Schneider <andy.schneider@bjss.co.uk>* 14821 14822 * [In 0.9.6c-engine release:] 14823 Fix mutex callback return values in crypto/engine/hw_ncipher.c. 14824 14825 *Andy Schneider <andy.schneider@bjss.co.uk>* 14826 14827 * [In 0.9.6c-engine release:] 14828 Add support for Cryptographic Appliance's keyserver technology. 14829 (Use engine 'keyclient') 14830 14831 *Cryptographic Appliances and Geoff Thorpe* 14832 14833 * Add a configuration entry for OS/390 Unix. The C compiler 'c89' 14834 is called via tools/c89.sh because arguments have to be 14835 rearranged (all '-L' options must appear before the first object 14836 modules). 14837 14838 *Richard Shapiro <rshapiro@abinitio.com>* 14839 14840 * [In 0.9.6c-engine release:] 14841 Add support for Broadcom crypto accelerator cards, backported 14842 from 0.9.7. 14843 14844 *Broadcom, Nalin Dahyabhai <nalin@redhat.com>, Mark Cox* 14845 14846 * [In 0.9.6c-engine release:] 14847 Add support for SureWare crypto accelerator cards from 14848 Baltimore Technologies. (Use engine 'sureware') 14849 14850 *Baltimore Technologies and Mark Cox* 14851 14852 * [In 0.9.6c-engine release:] 14853 Add support for crypto accelerator cards from Accelerated 14854 Encryption Processing, www.aep.ie. (Use engine 'aep') 14855 14856 *AEP Inc. and Mark Cox* 14857 14858 * Add a configuration entry for gcc on UnixWare. 14859 14860 *Gary Benson <gbenson@redhat.com>* 14861 14862 * Change ssl/s2_clnt.c and ssl/s2_srvr.c so that received handshake 14863 messages are stored in a single piece (fixed-length part and 14864 variable-length part combined) and fix various bugs found on the way. 14865 14866 *Bodo Moeller* 14867 14868 * Disable caching in BIO_gethostbyname(), directly use gethostbyname() 14869 instead. BIO_gethostbyname() does not know what timeouts are 14870 appropriate, so entries would stay in cache even when they have 14871 become invalid. 14872 *Bodo Moeller; problem pointed out by Rich Salz <rsalz@zolera.com>* 14873 14874 * Change ssl23_get_client_hello (ssl/s23_srvr.c) behaviour when 14875 faced with a pathologically small ClientHello fragment that does 14876 not contain client_version: Instead of aborting with an error, 14877 simply choose the highest available protocol version (i.e., 14878 TLS 1.0 unless it is disabled). In practice, ClientHello 14879 messages are never sent like this, but this change gives us 14880 strictly correct behaviour at least for TLS. 14881 14882 *Bodo Moeller* 14883 14884 * Fix SSL handshake functions and SSL_clear() such that SSL_clear() 14885 never resets s->method to s->ctx->method when called from within 14886 one of the SSL handshake functions. 14887 14888 *Bodo Moeller; problem pointed out by Niko Baric* 14889 14890 * In ssl3_get_client_hello (ssl/s3_srvr.c), generate a fatal alert 14891 (sent using the client's version number) if client_version is 14892 smaller than the protocol version in use. Also change 14893 ssl23_get_client_hello (ssl/s23_srvr.c) to select TLS 1.0 if 14894 the client demanded SSL 3.0 but only TLS 1.0 is enabled; then 14895 the client will at least see that alert. 14896 14897 *Bodo Moeller* 14898 14899 * Fix ssl3_get_message (ssl/s3_both.c) to handle message fragmentation 14900 correctly. 14901 14902 *Bodo Moeller* 14903 14904 * Avoid infinite loop in ssl3_get_message (ssl/s3_both.c) if a 14905 client receives HelloRequest while in a handshake. 14906 14907 *Bodo Moeller; bug noticed by Andy Schneider <andy.schneider@bjss.co.uk>* 14908 14909 * Bugfix in ssl3_accept (ssl/s3_srvr.c): Case SSL3_ST_SW_HELLO_REQ_C 14910 should end in 'break', not 'goto end' which circumvents various 14911 cleanups done in state SSL_ST_OK. But session related stuff 14912 must be disabled for SSL_ST_OK in the case that we just sent a 14913 HelloRequest. 14914 14915 Also avoid some overhead by not calling ssl_init_wbio_buffer() 14916 before just sending a HelloRequest. 14917 14918 *Bodo Moeller, Eric Rescorla <ekr@rtfm.com>* 14919 14920 * Fix ssl/s3_enc.c, ssl/t1_enc.c and ssl/s3_pkt.c so that we don't 14921 reveal whether illegal block cipher padding was found or a MAC 14922 verification error occurred. (Neither SSLerr() codes nor alerts 14923 are directly visible to potential attackers, but the information 14924 may leak via logfiles.) 14925 14926 Similar changes are not required for the SSL 2.0 implementation 14927 because the number of padding bytes is sent in clear for SSL 2.0, 14928 and the extra bytes are just ignored. However ssl/s2_pkt.c 14929 failed to verify that the purported number of padding bytes is in 14930 the legal range. 14931 14932 *Bodo Moeller* 14933 14934 * Add OpenUNIX-8 support including shared libraries 14935 (Boyd Lynn Gerber <gerberb@zenez.com>). 14936 14937 *Lutz Jaenicke* 14938 14939 * Improve RSA_padding_check_PKCS1_OAEP() check again to avoid 14940 'wristwatch attack' using huge encoding parameters (cf. 14941 James H. Manger's CRYPTO 2001 paper). Note that the 14942 RSA_PKCS1_OAEP_PADDING case of RSA_private_decrypt() does not use 14943 encoding parameters and hence was not vulnerable. 14944 14945 *Bodo Moeller* 14946 14947 * BN_sqr() bug fix. 14948 14949 *Ulf Möller, reported by Jim Ellis <jim.ellis@cavium.com>* 14950 14951 * Rabin-Miller test analyses assume uniformly distributed witnesses, 14952 so use BN_pseudo_rand_range() instead of using BN_pseudo_rand() 14953 followed by modular reduction. 14954 14955 *Bodo Moeller; pointed out by Adam Young <AYoung1@NCSUS.JNJ.COM>* 14956 14957 * Add BN_pseudo_rand_range() with obvious functionality: BN_rand_range() 14958 equivalent based on BN_pseudo_rand() instead of BN_rand(). 14959 14960 *Bodo Moeller* 14961 14962 * s3_srvr.c: allow sending of large client certificate lists (> 16 kB). 14963 This function was broken, as the check for a new client hello message 14964 to handle SGC did not allow these large messages. 14965 (Tracked down by "Douglas E. Engert" <deengert@anl.gov>.) 14966 14967 *Lutz Jaenicke* 14968 14969 * Add alert descriptions for TLSv1 to `SSL_alert_desc_string[_long]()`. 14970 14971 *Lutz Jaenicke* 14972 14973 * Fix buggy behaviour of BIO_get_num_renegotiates() and BIO_ctrl() 14974 for BIO_C_GET_WRITE_BUF_SIZE ("Stephen Hinton" <shinton@netopia.com>). 14975 14976 *Lutz Jaenicke* 14977 14978 * Rework the configuration and shared library support for Tru64 Unix. 14979 The configuration part makes use of modern compiler features and 14980 still retains old compiler behavior for those that run older versions 14981 of the OS. The shared library support part includes a variant that 14982 uses the RPATH feature, and is available through the special 14983 configuration target "alpha-cc-rpath", which will never be selected 14984 automatically. 14985 14986 *Tim Mooney <mooney@dogbert.cc.ndsu.NoDak.edu> via Richard Levitte* 14987 14988 * In ssl3_get_key_exchange (ssl/s3_clnt.c), call ssl3_get_message() 14989 with the same message size as in ssl3_get_certificate_request(). 14990 Otherwise, if no ServerKeyExchange message occurs, CertificateRequest 14991 messages might inadvertently be reject as too long. 14992 14993 *Petr Lampa <lampa@fee.vutbr.cz>* 14994 14995 * Enhanced support for IA-64 Unix platforms (well, Linux and HP-UX). 14996 14997 *Andy Polyakov* 14998 14999 * Modified SSL library such that the verify_callback that has been set 15000 specifically for an SSL object with SSL_set_verify() is actually being 15001 used. Before the change, a verify_callback set with this function was 15002 ignored and the verify_callback() set in the SSL_CTX at the time of 15003 the call was used. New function X509_STORE_CTX_set_verify_cb() introduced 15004 to allow the necessary settings. 15005 15006 *Lutz Jaenicke* 15007 15008 * Initialize static variable in crypto/dsa/dsa_lib.c and crypto/dh/dh_lib.c 15009 explicitly to NULL, as at least on Solaris 8 this seems not always to be 15010 done automatically (in contradiction to the requirements of the C 15011 standard). This made problems when used from OpenSSH. 15012 15013 *Lutz Jaenicke* 15014 15015 * In OpenSSL 0.9.6a and 0.9.6b, crypto/dh/dh_key.c ignored 15016 dh->length and always used 15017 15018 BN_rand_range(priv_key, dh->p). 15019 15020 BN_rand_range() is not necessary for Diffie-Hellman, and this 15021 specific range makes Diffie-Hellman unnecessarily inefficient if 15022 dh->length (recommended exponent length) is much smaller than the 15023 length of dh->p. We could use BN_rand_range() if the order of 15024 the subgroup was stored in the DH structure, but we only have 15025 dh->length. 15026 15027 So switch back to 15028 15029 BN_rand(priv_key, l, ...) 15030 15031 where 'l' is dh->length if this is defined, or BN_num_bits(dh->p)-1 15032 otherwise. 15033 15034 *Bodo Moeller* 15035 15036 * In 15037 15038 RSA_eay_public_encrypt 15039 RSA_eay_private_decrypt 15040 RSA_eay_private_encrypt (signing) 15041 RSA_eay_public_decrypt (signature verification) 15042 15043 (default implementations for RSA_public_encrypt, 15044 RSA_private_decrypt, RSA_private_encrypt, RSA_public_decrypt), 15045 always reject numbers >= n. 15046 15047 *Bodo Moeller* 15048 15049 * In crypto/rand/md_rand.c, use a new short-time lock CRYPTO_LOCK_RAND2 15050 to synchronize access to 'locking_thread'. This is necessary on 15051 systems where access to 'locking_thread' (an 'unsigned long' 15052 variable) is not atomic. 15053 15054 *Bodo Moeller* 15055 15056 * In crypto/rand/md_rand.c, set 'locking_thread' to current thread's ID 15057 *before* setting the 'crypto_lock_rand' flag. The previous code had 15058 a race condition if 0 is a valid thread ID. 15059 15060 *Travis Vitek <vitek@roguewave.com>* 15061 15062 * Add support for shared libraries under Irix. 15063 15064 *Albert Chin-A-Young <china@thewrittenword.com>* 15065 15066 * Add configuration option to build on Linux on both big-endian and 15067 little-endian MIPS. 15068 15069 *Ralf Baechle <ralf@uni-koblenz.de>* 15070 15071 * Add the possibility to create shared libraries on HP-UX. 15072 15073 *Richard Levitte* 15074 15075### Changes between 0.9.6a and 0.9.6b [9 Jul 2001] 15076 15077 * Change ssleay_rand_bytes (crypto/rand/md_rand.c) 15078 to avoid a SSLeay/OpenSSL PRNG weakness pointed out by 15079 Markku-Juhani O. Saarinen <markku-juhani.saarinen@nokia.com>: 15080 PRNG state recovery was possible based on the output of 15081 one PRNG request appropriately sized to gain knowledge on 15082 'md' followed by enough consecutive 1-byte PRNG requests 15083 to traverse all of 'state'. 15084 15085 1. When updating 'md_local' (the current thread's copy of 'md') 15086 during PRNG output generation, hash all of the previous 15087 'md_local' value, not just the half used for PRNG output. 15088 15089 2. Make the number of bytes from 'state' included into the hash 15090 independent from the number of PRNG bytes requested. 15091 15092 The first measure alone would be sufficient to avoid 15093 Markku-Juhani's attack. (Actually it had never occurred 15094 to me that the half of 'md_local' used for chaining was the 15095 half from which PRNG output bytes were taken -- I had always 15096 assumed that the secret half would be used.) The second 15097 measure makes sure that additional data from 'state' is never 15098 mixed into 'md_local' in small portions; this heuristically 15099 further strengthens the PRNG. 15100 15101 *Bodo Moeller* 15102 15103 * Fix crypto/bn/asm/mips3.s. 15104 15105 *Andy Polyakov* 15106 15107 * When only the key is given to "enc", the IV is undefined. Print out 15108 an error message in this case. 15109 15110 *Lutz Jaenicke* 15111 15112 * Handle special case when X509_NAME is empty in X509 printing routines. 15113 15114 *Steve Henson* 15115 15116 * In dsa_do_verify (crypto/dsa/dsa_ossl.c), verify that r and s are 15117 positive and less than q. 15118 15119 *Bodo Moeller* 15120 15121 * Don't change `*pointer` in CRYPTO_add_lock() is add_lock_callback is 15122 used: it isn't thread safe and the add_lock_callback should handle 15123 that itself. 15124 15125 *Paul Rose <Paul.Rose@bridge.com>* 15126 15127 * Verify that incoming data obeys the block size in 15128 ssl3_enc (ssl/s3_enc.c) and tls1_enc (ssl/t1_enc.c). 15129 15130 *Bodo Moeller* 15131 15132 * Fix OAEP check. 15133 15134 *Ulf Möller, Bodo Möller* 15135 15136 * The countermeasure against Bleichbacher's attack on PKCS #1 v1.5 15137 RSA encryption was accidentally removed in s3_srvr.c in OpenSSL 0.9.5 15138 when fixing the server behaviour for backwards-compatible 'client 15139 hello' messages. (Note that the attack is impractical against 15140 SSL 3.0 and TLS 1.0 anyway because length and version checking 15141 means that the probability of guessing a valid ciphertext is 15142 around 2^-40; see section 5 in Bleichenbacher's CRYPTO '98 15143 paper.) 15144 15145 Before 0.9.5, the countermeasure (hide the error by generating a 15146 random 'decryption result') did not work properly because 15147 ERR_clear_error() was missing, meaning that SSL_get_error() would 15148 detect the supposedly ignored error. 15149 15150 Both problems are now fixed. 15151 15152 *Bodo Moeller* 15153 15154 * In crypto/bio/bf_buff.c, increase DEFAULT_BUFFER_SIZE to 4096 15155 (previously it was 1024). 15156 15157 *Bodo Moeller* 15158 15159 * Fix for compatibility mode trust settings: ignore trust settings 15160 unless some valid trust or reject settings are present. 15161 15162 *Steve Henson* 15163 15164 * Fix for blowfish EVP: its a variable length cipher. 15165 15166 *Steve Henson* 15167 15168 * Fix various bugs related to DSA S/MIME verification. Handle missing 15169 parameters in DSA public key structures and return an error in the 15170 DSA routines if parameters are absent. 15171 15172 *Steve Henson* 15173 15174 * In versions up to 0.9.6, RAND_file_name() resorted to file ".rnd" 15175 in the current directory if neither $RANDFILE nor $HOME was set. 15176 RAND_file_name() in 0.9.6a returned NULL in this case. This has 15177 caused some confusion to Windows users who haven't defined $HOME. 15178 Thus RAND_file_name() is changed again: e_os.h can define a 15179 DEFAULT_HOME, which will be used if $HOME is not set. 15180 For Windows, we use "C:"; on other platforms, we still require 15181 environment variables. 15182 15183 * Move 'if (!initialized) RAND_poll()' into regions protected by 15184 CRYPTO_LOCK_RAND. This is not strictly necessary, but avoids 15185 having multiple threads call RAND_poll() concurrently. 15186 15187 *Bodo Moeller* 15188 15189 * In crypto/rand/md_rand.c, replace 'add_do_not_lock' flag by a 15190 combination of a flag and a thread ID variable. 15191 Otherwise while one thread is in ssleay_rand_bytes (which sets the 15192 flag), *other* threads can enter ssleay_add_bytes without obeying 15193 the CRYPTO_LOCK_RAND lock (and may even illegally release the lock 15194 that they do not hold after the first thread unsets add_do_not_lock). 15195 15196 *Bodo Moeller* 15197 15198 * Change bctest again: '-x' expressions are not available in all 15199 versions of 'test'. 15200 15201 *Bodo Moeller* 15202 15203### Changes between 0.9.6 and 0.9.6a [5 Apr 2001] 15204 15205 * Fix a couple of memory leaks in PKCS7_dataDecode() 15206 15207 *Steve Henson, reported by Heyun Zheng <hzheng@atdsprint.com>* 15208 15209 * Change Configure and Makefiles to provide EXE_EXT, which will contain 15210 the default extension for executables, if any. Also, make the perl 15211 scripts that use symlink() to test if it really exists and use "cp" 15212 if it doesn't. All this made OpenSSL compilable and installable in 15213 CygWin. 15214 15215 *Richard Levitte* 15216 15217 * Fix for asn1_GetSequence() for indefinite length constructed data. 15218 If SEQUENCE is length is indefinite just set c->slen to the total 15219 amount of data available. 15220 15221 *Steve Henson, reported by shige@FreeBSD.org* 15222 15223 *This change does not apply to 0.9.7.* 15224 15225 * Change bctest to avoid here-documents inside command substitution 15226 (workaround for FreeBSD /bin/sh bug). 15227 For compatibility with Ultrix, avoid shell functions (introduced 15228 in the bctest version that searches along $PATH). 15229 15230 *Bodo Moeller* 15231 15232 * Rename 'des_encrypt' to 'des_encrypt1'. This avoids the clashes 15233 with des_encrypt() defined on some operating systems, like Solaris 15234 and UnixWare. 15235 15236 *Richard Levitte* 15237 15238 * Check the result of RSA-CRT (see D. Boneh, R. DeMillo, R. Lipton: 15239 On the Importance of Eliminating Errors in Cryptographic 15240 Computations, J. Cryptology 14 (2001) 2, 101-119, 15241 <http://theory.stanford.edu/~dabo/papers/faults.ps.gz>). 15242 15243 *Ulf Moeller* 15244 15245 * MIPS assembler BIGNUM division bug fix. 15246 15247 *Andy Polyakov* 15248 15249 * Disabled incorrect Alpha assembler code. 15250 15251 *Richard Levitte* 15252 15253 * Fix PKCS#7 decode routines so they correctly update the length 15254 after reading an EOC for the EXPLICIT tag. 15255 15256 *Steve Henson* 15257 15258 *This change does not apply to 0.9.7.* 15259 15260 * Fix bug in PKCS#12 key generation routines. This was triggered 15261 if a 3DES key was generated with a 0 initial byte. Include 15262 PKCS12_BROKEN_KEYGEN compilation option to retain the old 15263 (but broken) behaviour. 15264 15265 *Steve Henson* 15266 15267 * Enhance bctest to search for a working bc along $PATH and print 15268 it when found. 15269 15270 *Tim Rice <tim@multitalents.net> via Richard Levitte* 15271 15272 * Fix memory leaks in err.c: free err_data string if necessary; 15273 don't write to the wrong index in ERR_set_error_data. 15274 15275 *Bodo Moeller* 15276 15277 * Implement ssl23_peek (analogous to ssl23_read), which previously 15278 did not exist. 15279 15280 *Bodo Moeller* 15281 15282 * Replace rdtsc with `_emit` statements for VC++ version 5. 15283 15284 *Jeremy Cooper <jeremy@baymoo.org>* 15285 15286 * Make it possible to reuse SSLv2 sessions. 15287 15288 *Richard Levitte* 15289 15290 * In copy_email() check for >= 0 as a return value for 15291 X509_NAME_get_index_by_NID() since 0 is a valid index. 15292 15293 *Steve Henson reported by Massimiliano Pala <madwolf@opensca.org>* 15294 15295 * Avoid coredump with unsupported or invalid public keys by checking if 15296 X509_get_pubkey() fails in PKCS7_verify(). Fix memory leak when 15297 PKCS7_verify() fails with non detached data. 15298 15299 *Steve Henson* 15300 15301 * Don't use getenv in library functions when run as setuid/setgid. 15302 New function OPENSSL_issetugid(). 15303 15304 *Ulf Moeller* 15305 15306 * Avoid false positives in memory leak detection code (crypto/mem_dbg.c) 15307 due to incorrect handling of multi-threading: 15308 15309 1. Fix timing glitch in the MemCheck_off() portion of CRYPTO_mem_ctrl(). 15310 15311 2. Fix logical glitch in is_MemCheck_on() aka CRYPTO_is_mem_check_on(). 15312 15313 3. Count how many times MemCheck_off() has been called so that 15314 nested use can be treated correctly. This also avoids 15315 inband-signalling in the previous code (which relied on the 15316 assumption that thread ID 0 is impossible). 15317 15318 *Bodo Moeller* 15319 15320 * Add "-rand" option also to s_client and s_server. 15321 15322 *Lutz Jaenicke* 15323 15324 * Fix CPU detection on Irix 6.x. 15325 *Kurt Hockenbury <khockenb@stevens-tech.edu> and 15326 "Bruce W. Forsberg" <bruce.forsberg@baesystems.com>* 15327 15328 * Fix X509_NAME bug which produced incorrect encoding if X509_NAME 15329 was empty. 15330 15331 *Steve Henson* 15332 15333 *This change does not apply to 0.9.7.* 15334 15335 * Use the cached encoding of an X509_NAME structure rather than 15336 copying it. This is apparently the reason for the libsafe "errors" 15337 but the code is actually correct. 15338 15339 *Steve Henson* 15340 15341 * Add new function BN_rand_range(), and fix DSA_sign_setup() to prevent 15342 Bleichenbacher's DSA attack. 15343 Extend BN_[pseudo_]rand: As before, top=1 forces the highest two bits 15344 to be set and top=0 forces the highest bit to be set; top=-1 is new 15345 and leaves the highest bit random. 15346 15347 *Ulf Moeller, Bodo Moeller* 15348 15349 * In the `NCONF_...`-based implementations for `CONF_...` queries 15350 (crypto/conf/conf_lib.c), if the input LHASH is NULL, avoid using 15351 a temporary CONF structure with the data component set to NULL 15352 (which gives segmentation faults in lh_retrieve). 15353 Instead, use NULL for the CONF pointer in CONF_get_string and 15354 CONF_get_number (which may use environment variables) and directly 15355 return NULL from CONF_get_section. 15356 15357 *Bodo Moeller* 15358 15359 * Fix potential buffer overrun for EBCDIC. 15360 15361 *Ulf Moeller* 15362 15363 * Tolerate nonRepudiation as being valid for S/MIME signing and certSign 15364 keyUsage if basicConstraints absent for a CA. 15365 15366 *Steve Henson* 15367 15368 * Make SMIME_write_PKCS7() write mail header values with a format that 15369 is more generally accepted (no spaces before the semicolon), since 15370 some programs can't parse those values properly otherwise. Also make 15371 sure BIO's that break lines after each write do not create invalid 15372 headers. 15373 15374 *Richard Levitte* 15375 15376 * Make the CRL encoding routines work with empty SEQUENCE OF. The 15377 macros previously used would not encode an empty SEQUENCE OF 15378 and break the signature. 15379 15380 *Steve Henson* 15381 15382 *This change does not apply to 0.9.7.* 15383 15384 * Zero the premaster secret after deriving the master secret in 15385 DH ciphersuites. 15386 15387 *Steve Henson* 15388 15389 * Add some EVP_add_digest_alias registrations (as found in 15390 OpenSSL_add_all_digests()) to SSL_library_init() 15391 aka OpenSSL_add_ssl_algorithms(). This provides improved 15392 compatibility with peers using X.509 certificates 15393 with unconventional AlgorithmIdentifier OIDs. 15394 15395 *Bodo Moeller* 15396 15397 * Fix for Irix with NO_ASM. 15398 15399 *"Bruce W. Forsberg" <bruce.forsberg@baesystems.com>* 15400 15401 * ./config script fixes. 15402 15403 *Ulf Moeller, Richard Levitte* 15404 15405 * Fix 'openssl passwd -1'. 15406 15407 *Bodo Moeller* 15408 15409 * Change PKCS12_key_gen_asc() so it can cope with non null 15410 terminated strings whose length is passed in the passlen 15411 parameter, for example from PEM callbacks. This was done 15412 by adding an extra length parameter to asc2uni(). 15413 15414 *Steve Henson, reported by <oddissey@samsung.co.kr>* 15415 15416 * Fix C code generated by 'openssl dsaparam -C': If a BN_bin2bn 15417 call failed, free the DSA structure. 15418 15419 *Bodo Moeller* 15420 15421 * Fix to uni2asc() to cope with zero length Unicode strings. 15422 These are present in some PKCS#12 files. 15423 15424 *Steve Henson* 15425 15426 * Increase s2->wbuf allocation by one byte in ssl2_new (ssl/s2_lib.c). 15427 Otherwise do_ssl_write (ssl/s2_pkt.c) will write beyond buffer limits 15428 when writing a 32767 byte record. 15429 15430 *Bodo Moeller; problem reported by Eric Day <eday@concentric.net>* 15431 15432 * In `RSA_eay_public_{en,ed}crypt` and RSA_eay_mod_exp (rsa_eay.c), 15433 obtain lock CRYPTO_LOCK_RSA before setting `rsa->_method_mod_{n,p,q}`. 15434 15435 (RSA objects have a reference count access to which is protected 15436 by CRYPTO_LOCK_RSA [see rsa_lib.c, s3_srvr.c, ssl_cert.c, ssl_rsa.c], 15437 so they are meant to be shared between threads.) 15438 *Bodo Moeller, Geoff Thorpe; original patch submitted by 15439 "Reddie, Steven" <Steven.Reddie@ca.com>* 15440 15441 * Fix a deadlock in CRYPTO_mem_leaks(). 15442 15443 *Bodo Moeller* 15444 15445 * Use better test patterns in bntest. 15446 15447 *Ulf Möller* 15448 15449 * rand_win.c fix for Borland C. 15450 15451 *Ulf Möller* 15452 15453 * BN_rshift bugfix for n == 0. 15454 15455 *Bodo Moeller* 15456 15457 * Add a 'bctest' script that checks for some known 'bc' bugs 15458 so that 'make test' does not abort just because 'bc' is broken. 15459 15460 *Bodo Moeller* 15461 15462 * Store verify_result within SSL_SESSION also for client side to 15463 avoid potential security hole. (Re-used sessions on the client side 15464 always resulted in verify_result==X509_V_OK, not using the original 15465 result of the server certificate verification.) 15466 15467 *Lutz Jaenicke* 15468 15469 * Fix ssl3_pending: If the record in s->s3->rrec is not of type 15470 SSL3_RT_APPLICATION_DATA, return 0. 15471 Similarly, change ssl2_pending to return 0 if SSL_in_init(s) is true. 15472 15473 *Bodo Moeller* 15474 15475 * Fix SSL_peek: 15476 Both ssl2_peek and ssl3_peek, which were totally broken in earlier 15477 releases, have been re-implemented by renaming the previous 15478 implementations of ssl2_read and ssl3_read to ssl2_read_internal 15479 and ssl3_read_internal, respectively, and adding 'peek' parameters 15480 to them. The new ssl[23]_{read,peek} functions are calls to 15481 ssl[23]_read_internal with the 'peek' flag set appropriately. 15482 A 'peek' parameter has also been added to ssl3_read_bytes, which 15483 does the actual work for ssl3_read_internal. 15484 15485 *Bodo Moeller* 15486 15487 * Initialise "ex_data" member of RSA/DSA/DH structures prior to calling 15488 the method-specific "init()" handler. Also clean up ex_data after 15489 calling the method-specific "finish()" handler. Previously, this was 15490 happening the other way round. 15491 15492 *Geoff Thorpe* 15493 15494 * Increase BN_CTX_NUM (the number of BIGNUMs in a BN_CTX) to 16. 15495 The previous value, 12, was not always sufficient for BN_mod_exp(). 15496 15497 *Bodo Moeller* 15498 15499 * Make sure that shared libraries get the internal name engine with 15500 the full version number and not just 0. This should mark the 15501 shared libraries as not backward compatible. Of course, this should 15502 be changed again when we can guarantee backward binary compatibility. 15503 15504 *Richard Levitte* 15505 15506 * Fix typo in get_cert_by_subject() in by_dir.c 15507 15508 *Jean-Marc Desperrier <jean-marc.desperrier@certplus.com>* 15509 15510 * Rework the system to generate shared libraries: 15511 15512 - Make note of the expected extension for the shared libraries and 15513 if there is a need for symbolic links from for example libcrypto.so.0 15514 to libcrypto.so.0.9.7. There is extended info in Configure for 15515 that. 15516 15517 - Make as few rebuilds of the shared libraries as possible. 15518 15519 - Still avoid linking the OpenSSL programs with the shared libraries. 15520 15521 - When installing, install the shared libraries separately from the 15522 static ones. 15523 15524 *Richard Levitte* 15525 15526 * Fix SSL_CTX_set_read_ahead macro to actually use its argument. 15527 15528 Copy SSL_CTX's read_ahead flag to SSL object directly in SSL_new 15529 and not in SSL_clear because the latter is also used by the 15530 accept/connect functions; previously, the settings made by 15531 SSL_set_read_ahead would be lost during the handshake. 15532 15533 *Bodo Moeller; problems reported by Anders Gertz <gertz@epact.se>* 15534 15535 * Correct util/mkdef.pl to be selective about disabled algorithms. 15536 Previously, it would create entries for disabled algorithms no 15537 matter what. 15538 15539 *Richard Levitte* 15540 15541 * Added several new manual pages for SSL_* function. 15542 15543 *Lutz Jaenicke* 15544 15545### Changes between 0.9.5a and 0.9.6 [24 Sep 2000] 15546 15547 * In ssl23_get_client_hello, generate an error message when faced 15548 with an initial SSL 3.0/TLS record that is too small to contain the 15549 first two bytes of the ClientHello message, i.e. client_version. 15550 (Note that this is a pathologic case that probably has never happened 15551 in real life.) The previous approach was to use the version number 15552 from the record header as a substitute; but our protocol choice 15553 should not depend on that one because it is not authenticated 15554 by the Finished messages. 15555 15556 *Bodo Moeller* 15557 15558 * More robust randomness gathering functions for Windows. 15559 15560 *Jeffrey Altman <jaltman@columbia.edu>* 15561 15562 * For compatibility reasons if the flag X509_V_FLAG_ISSUER_CHECK is 15563 not set then we don't setup the error code for issuer check errors 15564 to avoid possibly overwriting other errors which the callback does 15565 handle. If an application does set the flag then we assume it knows 15566 what it is doing and can handle the new informational codes 15567 appropriately. 15568 15569 *Steve Henson* 15570 15571 * Fix for a nasty bug in ASN1_TYPE handling. ASN1_TYPE is used for 15572 a general "ANY" type, as such it should be able to decode anything 15573 including tagged types. However it didn't check the class so it would 15574 wrongly interpret tagged types in the same way as their universal 15575 counterpart and unknown types were just rejected. Changed so that the 15576 tagged and unknown types are handled in the same way as a SEQUENCE: 15577 that is the encoding is stored intact. There is also a new type 15578 "V_ASN1_OTHER" which is used when the class is not universal, in this 15579 case we have no idea what the actual type is so we just lump them all 15580 together. 15581 15582 *Steve Henson* 15583 15584 * On VMS, stdout may very well lead to a file that is written to 15585 in a record-oriented fashion. That means that every write() will 15586 write a separate record, which will be read separately by the 15587 programs trying to read from it. This can be very confusing. 15588 15589 The solution is to put a BIO filter in the way that will buffer 15590 text until a linefeed is reached, and then write everything a 15591 line at a time, so every record written will be an actual line, 15592 not chunks of lines and not (usually doesn't happen, but I've 15593 seen it once) several lines in one record. BIO_f_linebuffer() is 15594 the answer. 15595 15596 Currently, it's a VMS-only method, because that's where it has 15597 been tested well enough. 15598 15599 *Richard Levitte* 15600 15601 * Remove 'optimized' squaring variant in BN_mod_mul_montgomery, 15602 it can return incorrect results. 15603 (Note: The buggy variant was not enabled in OpenSSL 0.9.5a, 15604 but it was in 0.9.6-beta[12].) 15605 15606 *Bodo Moeller* 15607 15608 * Disable the check for content being present when verifying detached 15609 signatures in pk7_smime.c. Some versions of Netscape (wrongly) 15610 include zero length content when signing messages. 15611 15612 *Steve Henson* 15613 15614 * New BIO_shutdown_wr macro, which invokes the BIO_C_SHUTDOWN_WR 15615 BIO_ctrl (for BIO pairs). 15616 15617 *Bodo Möller* 15618 15619 * Add DSO method for VMS. 15620 15621 *Richard Levitte* 15622 15623 * Bug fix: Montgomery multiplication could produce results with the 15624 wrong sign. 15625 15626 *Ulf Möller* 15627 15628 * Add RPM specification openssl.spec and modify it to build three 15629 packages. The default package contains applications, application 15630 documentation and run-time libraries. The devel package contains 15631 include files, static libraries and function documentation. The 15632 doc package contains the contents of the doc directory. The original 15633 openssl.spec was provided by Damien Miller <djm@mindrot.org>. 15634 15635 *Richard Levitte* 15636 15637 * Add a large number of documentation files for many SSL routines. 15638 15639 *Lutz Jaenicke <Lutz.Jaenicke@aet.TU-Cottbus.DE>* 15640 15641 * Add a configuration entry for Sony News 4. 15642 15643 *NAKAJI Hiroyuki <nakaji@tutrp.tut.ac.jp>* 15644 15645 * Don't set the two most significant bits to one when generating a 15646 random number < q in the DSA library. 15647 15648 *Ulf Möller* 15649 15650 * New SSL API mode 'SSL_MODE_AUTO_RETRY'. This disables the default 15651 behaviour that SSL_read may result in SSL_ERROR_WANT_READ (even if 15652 the underlying transport is blocking) if a handshake took place. 15653 (The default behaviour is needed by applications such as s_client 15654 and s_server that use select() to determine when to use SSL_read; 15655 but for applications that know in advance when to expect data, it 15656 just makes things more complicated.) 15657 15658 *Bodo Moeller* 15659 15660 * Add RAND_egd_bytes(), which gives control over the number of bytes read 15661 from EGD. 15662 15663 *Ben Laurie* 15664 15665 * Add a few more EBCDIC conditionals that make `req` and `x509` 15666 work better on such systems. 15667 15668 *Martin Kraemer <Martin.Kraemer@MchP.Siemens.De>* 15669 15670 * Add two demo programs for PKCS12_parse() and PKCS12_create(). 15671 Update PKCS12_parse() so it copies the friendlyName and the 15672 keyid to the certificates aux info. 15673 15674 *Steve Henson* 15675 15676 * Fix bug in PKCS7_verify() which caused an infinite loop 15677 if there was more than one signature. 15678 15679 *Sven Uszpelkat <su@celocom.de>* 15680 15681 * Major change in util/mkdef.pl to include extra information 15682 about each symbol, as well as presenting variables as well 15683 as functions. This change means that there's n more need 15684 to rebuild the .num files when some algorithms are excluded. 15685 15686 *Richard Levitte* 15687 15688 * Allow the verify time to be set by an application, 15689 rather than always using the current time. 15690 15691 *Steve Henson* 15692 15693 * Phase 2 verify code reorganisation. The certificate 15694 verify code now looks up an issuer certificate by a 15695 number of criteria: subject name, authority key id 15696 and key usage. It also verifies self signed certificates 15697 by the same criteria. The main comparison function is 15698 X509_check_issued() which performs these checks. 15699 15700 Lot of changes were necessary in order to support this 15701 without completely rewriting the lookup code. 15702 15703 Authority and subject key identifier are now cached. 15704 15705 The LHASH 'certs' is X509_STORE has now been replaced 15706 by a STACK_OF(X509_OBJECT). This is mainly because an 15707 LHASH can't store or retrieve multiple objects with 15708 the same hash value. 15709 15710 As a result various functions (which were all internal 15711 use only) have changed to handle the new X509_STORE 15712 structure. This will break anything that messed round 15713 with X509_STORE internally. 15714 15715 The functions X509_STORE_add_cert() now checks for an 15716 exact match, rather than just subject name. 15717 15718 The X509_STORE API doesn't directly support the retrieval 15719 of multiple certificates matching a given criteria, however 15720 this can be worked round by performing a lookup first 15721 (which will fill the cache with candidate certificates) 15722 and then examining the cache for matches. This is probably 15723 the best we can do without throwing out X509_LOOKUP 15724 entirely (maybe later...). 15725 15726 The X509_VERIFY_CTX structure has been enhanced considerably. 15727 15728 All certificate lookup operations now go via a get_issuer() 15729 callback. Although this currently uses an X509_STORE it 15730 can be replaced by custom lookups. This is a simple way 15731 to bypass the X509_STORE hackery necessary to make this 15732 work and makes it possible to use more efficient techniques 15733 in future. A very simple version which uses a simple 15734 STACK for its trusted certificate store is also provided 15735 using X509_STORE_CTX_trusted_stack(). 15736 15737 The verify_cb() and verify() callbacks now have equivalents 15738 in the X509_STORE_CTX structure. 15739 15740 X509_STORE_CTX also has a 'flags' field which can be used 15741 to customise the verify behaviour. 15742 15743 *Steve Henson* 15744 15745 * Add new PKCS#7 signing option PKCS7_NOSMIMECAP which 15746 excludes S/MIME capabilities. 15747 15748 *Steve Henson* 15749 15750 * When a certificate request is read in keep a copy of the 15751 original encoding of the signed data and use it when outputting 15752 again. Signatures then use the original encoding rather than 15753 a decoded, encoded version which may cause problems if the 15754 request is improperly encoded. 15755 15756 *Steve Henson* 15757 15758 * For consistency with other BIO_puts implementations, call 15759 buffer_write(b, ...) directly in buffer_puts instead of calling 15760 BIO_write(b, ...). 15761 15762 In BIO_puts, increment b->num_write as in BIO_write. 15763 15764 *Peter.Sylvester@EdelWeb.fr* 15765 15766 * Fix BN_mul_word for the case where the word is 0. (We have to use 15767 BN_zero, we may not return a BIGNUM with an array consisting of 15768 words set to zero.) 15769 15770 *Bodo Moeller* 15771 15772 * Avoid calling abort() from within the library when problems are 15773 detected, except if preprocessor symbols have been defined 15774 (such as REF_CHECK, BN_DEBUG etc.). 15775 15776 *Bodo Moeller* 15777 15778 * New openssl application 'rsautl'. This utility can be 15779 used for low-level RSA operations. DER public key 15780 BIO/fp routines also added. 15781 15782 *Steve Henson* 15783 15784 * New Configure entry and patches for compiling on QNX 4. 15785 15786 *Andreas Schneider <andreas@ds3.etech.fh-hamburg.de>* 15787 15788 * A demo state-machine implementation was sponsored by 15789 Nuron (<http://www.nuron.com/>) and is now available in 15790 demos/state_machine. 15791 15792 *Ben Laurie* 15793 15794 * New options added to the 'dgst' utility for signature 15795 generation and verification. 15796 15797 *Steve Henson* 15798 15799 * Unrecognized PKCS#7 content types are now handled via a 15800 catch all ASN1_TYPE structure. This allows unsupported 15801 types to be stored as a "blob" and an application can 15802 encode and decode it manually. 15803 15804 *Steve Henson* 15805 15806 * Fix various signed/unsigned issues to make a_strex.c 15807 compile under VC++. 15808 15809 *Oscar Jacobsson <oscar.jacobsson@celocom.com>* 15810 15811 * ASN1 fixes. i2d_ASN1_OBJECT was not returning the correct 15812 length if passed a buffer. ASN1_INTEGER_to_BN failed 15813 if passed a NULL BN and its argument was negative. 15814 15815 *Steve Henson, pointed out by Sven Heiberg <sven@tartu.cyber.ee>* 15816 15817 * Modification to PKCS#7 encoding routines to output definite 15818 length encoding. Since currently the whole structures are in 15819 memory there's not real point in using indefinite length 15820 constructed encoding. However if OpenSSL is compiled with 15821 the flag PKCS7_INDEFINITE_ENCODING the old form is used. 15822 15823 *Steve Henson* 15824 15825 * Added BIO_vprintf() and BIO_vsnprintf(). 15826 15827 *Richard Levitte* 15828 15829 * Added more prefixes to parse for in the strings written 15830 through a logging bio, to cover all the levels that are available 15831 through syslog. The prefixes are now: 15832 15833 PANIC, EMERG, EMR => LOG_EMERG 15834 ALERT, ALR => LOG_ALERT 15835 CRIT, CRI => LOG_CRIT 15836 ERROR, ERR => LOG_ERR 15837 WARNING, WARN, WAR => LOG_WARNING 15838 NOTICE, NOTE, NOT => LOG_NOTICE 15839 INFO, INF => LOG_INFO 15840 DEBUG, DBG => LOG_DEBUG 15841 15842 and as before, if none of those prefixes are present at the 15843 beginning of the string, LOG_ERR is chosen. 15844 15845 On Win32, the `LOG_*` levels are mapped according to this: 15846 15847 LOG_EMERG, LOG_ALERT, LOG_CRIT, LOG_ERR => EVENTLOG_ERROR_TYPE 15848 LOG_WARNING => EVENTLOG_WARNING_TYPE 15849 LOG_NOTICE, LOG_INFO, LOG_DEBUG => EVENTLOG_INFORMATION_TYPE 15850 15851 *Richard Levitte* 15852 15853 * Made it possible to reconfigure with just the configuration 15854 argument "reconf" or "reconfigure". The command line arguments 15855 are stored in Makefile.ssl in the variable CONFIGURE_ARGS, 15856 and are retrieved from there when reconfiguring. 15857 15858 *Richard Levitte* 15859 15860 * MD4 implemented. 15861 15862 *Assar Westerlund <assar@sics.se>, Richard Levitte* 15863 15864 * Add the arguments -CAfile and -CApath to the pkcs12 utility. 15865 15866 *Richard Levitte* 15867 15868 * The obj_dat.pl script was messing up the sorting of object 15869 names. The reason was that it compared the quoted version 15870 of strings as a result "OCSP" > "OCSP Signing" because 15871 " > SPACE. Changed script to store unquoted versions of 15872 names and add quotes on output. It was also omitting some 15873 names from the lookup table if they were given a default 15874 value (that is if SN is missing it is given the same 15875 value as LN and vice versa), these are now added on the 15876 grounds that if an object has a name we should be able to 15877 look it up. Finally added warning output when duplicate 15878 short or long names are found. 15879 15880 *Steve Henson* 15881 15882 * Changes needed for Tandem NSK. 15883 15884 *Scott Uroff <scott@xypro.com>* 15885 15886 * Fix SSL 2.0 rollback checking: Due to an off-by-one error in 15887 RSA_padding_check_SSLv23(), special padding was never detected 15888 and thus the SSL 3.0/TLS 1.0 countermeasure against protocol 15889 version rollback attacks was not effective. 15890 15891 In s23_clnt.c, don't use special rollback-attack detection padding 15892 (RSA_SSLV23_PADDING) if SSL 2.0 is the only protocol enabled in the 15893 client; similarly, in s23_srvr.c, don't do the rollback check if 15894 SSL 2.0 is the only protocol enabled in the server. 15895 15896 *Bodo Moeller* 15897 15898 * Make it possible to get hexdumps of unprintable data with 'openssl 15899 asn1parse'. By implication, the functions ASN1_parse_dump() and 15900 BIO_dump_indent() are added. 15901 15902 *Richard Levitte* 15903 15904 * New functions ASN1_STRING_print_ex() and X509_NAME_print_ex() 15905 these print out strings and name structures based on various 15906 flags including RFC2253 support and proper handling of 15907 multibyte characters. Added options to the 'x509' utility 15908 to allow the various flags to be set. 15909 15910 *Steve Henson* 15911 15912 * Various fixes to use ASN1_TIME instead of ASN1_UTCTIME. 15913 Also change the functions X509_cmp_current_time() and 15914 X509_gmtime_adj() work with an ASN1_TIME structure, 15915 this will enable certificates using GeneralizedTime in validity 15916 dates to be checked. 15917 15918 *Steve Henson* 15919 15920 * Make the NEG_PUBKEY_BUG code (which tolerates invalid 15921 negative public key encodings) on by default, 15922 NO_NEG_PUBKEY_BUG can be set to disable it. 15923 15924 *Steve Henson* 15925 15926 * New function c2i_ASN1_OBJECT() which acts on ASN1_OBJECT 15927 content octets. An i2c_ASN1_OBJECT is unnecessary because 15928 the encoding can be trivially obtained from the structure. 15929 15930 *Steve Henson* 15931 15932 * crypto/err.c locking bugfix: Use write locks (`CRYPTO_w_[un]lock`), 15933 not read locks (`CRYPTO_r_[un]lock`). 15934 15935 *Bodo Moeller* 15936 15937 * A first attempt at creating official support for shared 15938 libraries through configuration. I've kept it so the 15939 default is static libraries only, and the OpenSSL programs 15940 are always statically linked for now, but there are 15941 preparations for dynamic linking in place. 15942 This has been tested on Linux and Tru64. 15943 15944 *Richard Levitte* 15945 15946 * Randomness polling function for Win9x, as described in: 15947 Peter Gutmann, Software Generation of Practically Strong 15948 Random Numbers. 15949 15950 *Ulf Möller* 15951 15952 * Fix so PRNG is seeded in req if using an already existing 15953 DSA key. 15954 15955 *Steve Henson* 15956 15957 * New options to smime application. -inform and -outform 15958 allow alternative formats for the S/MIME message including 15959 PEM and DER. The -content option allows the content to be 15960 specified separately. This should allow things like Netscape 15961 form signing output easier to verify. 15962 15963 *Steve Henson* 15964 15965 * Fix the ASN1 encoding of tags using the 'long form'. 15966 15967 *Steve Henson* 15968 15969 * New ASN1 functions, `i2c_*` and `c2i_*` for INTEGER and BIT 15970 STRING types. These convert content octets to and from the 15971 underlying type. The actual tag and length octets are 15972 already assumed to have been read in and checked. These 15973 are needed because all other string types have virtually 15974 identical handling apart from the tag. By having versions 15975 of the ASN1 functions that just operate on content octets 15976 IMPLICIT tagging can be handled properly. It also allows 15977 the ASN1_ENUMERATED code to be cut down because ASN1_ENUMERATED 15978 and ASN1_INTEGER are identical apart from the tag. 15979 15980 *Steve Henson* 15981 15982 * Change the handling of OID objects as follows: 15983 15984 - New object identifiers are inserted in objects.txt, following 15985 the syntax given in [crypto/objects/README.md](crypto/objects/README.md). 15986 - objects.pl is used to process obj_mac.num and create a new 15987 obj_mac.h. 15988 - obj_dat.pl is used to create a new obj_dat.h, using the data in 15989 obj_mac.h. 15990 15991 This is currently kind of a hack, and the perl code in objects.pl 15992 isn't very elegant, but it works as I intended. The simplest way 15993 to check that it worked correctly is to look in obj_dat.h and 15994 check the array nid_objs and make sure the objects haven't moved 15995 around (this is important!). Additions are OK, as well as 15996 consistent name changes. 15997 15998 *Richard Levitte* 15999 16000 * Add BSD-style MD5-based passwords to 'openssl passwd' (option '-1'). 16001 16002 *Bodo Moeller* 16003 16004 * Addition of the command line parameter '-rand file' to 'openssl req'. 16005 The given file adds to whatever has already been seeded into the 16006 random pool through the RANDFILE configuration file option or 16007 environment variable, or the default random state file. 16008 16009 *Richard Levitte* 16010 16011 * mkstack.pl now sorts each macro group into lexical order. 16012 Previously the output order depended on the order the files 16013 appeared in the directory, resulting in needless rewriting 16014 of safestack.h . 16015 16016 *Steve Henson* 16017 16018 * Patches to make OpenSSL compile under Win32 again. Mostly 16019 work arounds for the VC++ problem that it treats func() as 16020 func(void). Also stripped out the parts of mkdef.pl that 16021 added extra typesafe functions: these no longer exist. 16022 16023 *Steve Henson* 16024 16025 * Reorganisation of the stack code. The macros are now all 16026 collected in safestack.h . Each macro is defined in terms of 16027 a "stack macro" of the form `SKM_<name>(type, a, b)`. The 16028 DEBUG_SAFESTACK is now handled in terms of function casts, 16029 this has the advantage of retaining type safety without the 16030 use of additional functions. If DEBUG_SAFESTACK is not defined 16031 then the non typesafe macros are used instead. Also modified the 16032 mkstack.pl script to handle the new form. Needs testing to see 16033 if which (if any) compilers it chokes and maybe make DEBUG_SAFESTACK 16034 the default if no major problems. Similar behaviour for ASN1_SET_OF 16035 and PKCS12_STACK_OF. 16036 16037 *Steve Henson* 16038 16039 * When some versions of IIS use the 'NET' form of private key the 16040 key derivation algorithm is different. Normally MD5(password) is 16041 used as a 128 bit RC4 key. In the modified case 16042 MD5(MD5(password) + "SGCKEYSALT") is used instead. Added some 16043 new functions i2d_RSA_NET(), d2i_RSA_NET() etc which are the same 16044 as the old Netscape_RSA functions except they have an additional 16045 'sgckey' parameter which uses the modified algorithm. Also added 16046 an -sgckey command line option to the rsa utility. Thanks to 16047 Adrian Peck <bertie@ncipher.com> for posting details of the modified 16048 algorithm to openssl-dev. 16049 16050 *Steve Henson* 16051 16052 * The evp_local.h macros were using 'c.##kname' which resulted in 16053 invalid expansion on some systems (SCO 5.0.5 for example). 16054 Corrected to 'c.kname'. 16055 16056 *Phillip Porch <root@theporch.com>* 16057 16058 * New X509_get1_email() and X509_REQ_get1_email() functions that return 16059 a STACK of email addresses from a certificate or request, these look 16060 in the subject name and the subject alternative name extensions and 16061 omit any duplicate addresses. 16062 16063 *Steve Henson* 16064 16065 * Re-implement BN_mod_exp2_mont using independent (and larger) windows. 16066 This makes DSA verification about 2 % faster. 16067 16068 *Bodo Moeller* 16069 16070 * Increase maximum window size in `BN_mod_exp_...` to 6 bits instead of 5 16071 (meaning that now 2^5 values will be precomputed, which is only 4 KB 16072 plus overhead for 1024 bit moduli). 16073 This makes exponentiations about 0.5 % faster for 1024 bit 16074 exponents (as measured by "openssl speed rsa2048"). 16075 16076 *Bodo Moeller* 16077 16078 * Rename memory handling macros to avoid conflicts with other 16079 software: 16080 Malloc => OPENSSL_malloc 16081 Malloc_locked => OPENSSL_malloc_locked 16082 Realloc => OPENSSL_realloc 16083 Free => OPENSSL_free 16084 16085 *Richard Levitte* 16086 16087 * New function BN_mod_exp_mont_word for small bases (roughly 15% 16088 faster than BN_mod_exp_mont, i.e. 7% for a full DH exchange). 16089 16090 *Bodo Moeller* 16091 16092 * CygWin32 support. 16093 16094 *John Jarvie <jjarvie@newsguy.com>* 16095 16096 * The type-safe stack code has been rejigged. It is now only compiled 16097 in when OpenSSL is configured with the DEBUG_SAFESTACK option and 16098 by default all type-specific stack functions are "#define"d back to 16099 standard stack functions. This results in more streamlined output 16100 but retains the type-safety checking possibilities of the original 16101 approach. 16102 16103 *Geoff Thorpe* 16104 16105 * The STACK code has been cleaned up, and certain type declarations 16106 that didn't make a lot of sense have been brought in line. This has 16107 also involved a cleanup of sorts in safestack.h to more correctly 16108 map type-safe stack functions onto their plain stack counterparts. 16109 This work has also resulted in a variety of "const"ifications of 16110 lots of the code, especially `_cmp` operations which should normally 16111 be prototyped with "const" parameters anyway. 16112 16113 *Geoff Thorpe* 16114 16115 * When generating bytes for the first time in md_rand.c, 'stir the pool' 16116 by seeding with STATE_SIZE dummy bytes (with zero entropy count). 16117 (The PRNG state consists of two parts, the large pool 'state' and 'md', 16118 where all of 'md' is used each time the PRNG is used, but 'state' 16119 is used only indexed by a cyclic counter. As entropy may not be 16120 well distributed from the beginning, 'md' is important as a 16121 chaining variable. However, the output function chains only half 16122 of 'md', i.e. 80 bits. ssleay_rand_add, on the other hand, chains 16123 all of 'md', and seeding with STATE_SIZE dummy bytes will result 16124 in all of 'state' being rewritten, with the new values depending 16125 on virtually all of 'md'. This overcomes the 80 bit limitation.) 16126 16127 *Bodo Moeller* 16128 16129 * In ssl/s2_clnt.c and ssl/s3_clnt.c, call ERR_clear_error() when 16130 the handshake is continued after ssl_verify_cert_chain(); 16131 otherwise, if SSL_VERIFY_NONE is set, remaining error codes 16132 can lead to 'unexplainable' connection aborts later. 16133 16134 *Bodo Moeller; problem tracked down by Lutz Jaenicke* 16135 16136 * Major EVP API cipher revision. 16137 Add hooks for extra EVP features. This allows various cipher 16138 parameters to be set in the EVP interface. Support added for variable 16139 key length ciphers via the EVP_CIPHER_CTX_set_key_length() function and 16140 setting of RC2 and RC5 parameters. 16141 16142 Modify EVP_OpenInit() and EVP_SealInit() to cope with variable key length 16143 ciphers. 16144 16145 Remove lots of duplicated code from the EVP library. For example *every* 16146 cipher init() function handles the 'iv' in the same way according to the 16147 cipher mode. They also all do nothing if the 'key' parameter is NULL and 16148 for CFB and OFB modes they zero ctx->num. 16149 16150 New functionality allows removal of S/MIME code RC2 hack. 16151 16152 Most of the routines have the same form and so can be declared in terms 16153 of macros. 16154 16155 By shifting this to the top level EVP_CipherInit() it can be removed from 16156 all individual ciphers. If the cipher wants to handle IVs or keys 16157 differently it can set the EVP_CIPH_CUSTOM_IV or EVP_CIPH_ALWAYS_CALL_INIT 16158 flags. 16159 16160 Change lots of functions like EVP_EncryptUpdate() to now return a 16161 value: although software versions of the algorithms cannot fail 16162 any installed hardware versions can. 16163 16164 *Steve Henson* 16165 16166 * Implement SSL_OP_TLS_ROLLBACK_BUG: In ssl3_get_client_key_exchange, if 16167 this option is set, tolerate broken clients that send the negotiated 16168 protocol version number instead of the requested protocol version 16169 number. 16170 16171 *Bodo Moeller* 16172 16173 * Call dh_tmp_cb (set by `..._TMP_DH_CB`) with correct 'is_export' flag; 16174 i.e. non-zero for export ciphersuites, zero otherwise. 16175 Previous versions had this flag inverted, inconsistent with 16176 rsa_tmp_cb (..._TMP_RSA_CB). 16177 16178 *Bodo Moeller; problem reported by Amit Chopra* 16179 16180 * Add missing DSA library text string. Work around for some IIS 16181 key files with invalid SEQUENCE encoding. 16182 16183 *Steve Henson* 16184 16185 * Add a document (doc/standards.txt) that list all kinds of standards 16186 and so on that are implemented in OpenSSL. 16187 16188 *Richard Levitte* 16189 16190 * Enhance c_rehash script. Old version would mishandle certificates 16191 with the same subject name hash and wouldn't handle CRLs at all. 16192 Added -fingerprint option to crl utility, to support new c_rehash 16193 features. 16194 16195 *Steve Henson* 16196 16197 * Eliminate non-ANSI declarations in crypto.h and stack.h. 16198 16199 *Ulf Möller* 16200 16201 * Fix for SSL server purpose checking. Server checking was 16202 rejecting certificates which had extended key usage present 16203 but no ssl client purpose. 16204 16205 *Steve Henson, reported by Rene Grosser <grosser@hisolutions.com>* 16206 16207 * Make PKCS#12 code work with no password. The PKCS#12 spec 16208 is a little unclear about how a blank password is handled. 16209 Since the password in encoded as a BMPString with terminating 16210 double NULL a zero length password would end up as just the 16211 double NULL. However no password at all is different and is 16212 handled differently in the PKCS#12 key generation code. NS 16213 treats a blank password as zero length. MSIE treats it as no 16214 password on export: but it will try both on import. We now do 16215 the same: PKCS12_parse() tries zero length and no password if 16216 the password is set to "" or NULL (NULL is now a valid password: 16217 it wasn't before) as does the pkcs12 application. 16218 16219 *Steve Henson* 16220 16221 * Bugfixes in `apps/x509.c`: Avoid a memory leak; and don't use 16222 perror when PEM_read_bio_X509_REQ fails, the error message must 16223 be obtained from the error queue. 16224 16225 *Bodo Moeller* 16226 16227 * Avoid 'thread_hash' memory leak in crypto/err/err.c by freeing 16228 it in ERR_remove_state if appropriate, and change ERR_get_state 16229 accordingly to avoid race conditions (this is necessary because 16230 thread_hash is no longer constant once set). 16231 16232 *Bodo Moeller* 16233 16234 * Bugfix for linux-elf makefile.one. 16235 16236 *Ulf Möller* 16237 16238 * RSA_get_default_method() will now cause a default 16239 RSA_METHOD to be chosen if one doesn't exist already. 16240 Previously this was only set during a call to RSA_new() 16241 or RSA_new_method(NULL) meaning it was possible for 16242 RSA_get_default_method() to return NULL. 16243 16244 *Geoff Thorpe* 16245 16246 * Added native name translation to the existing DSO code 16247 that will convert (if the flag to do so is set) filenames 16248 that are sufficiently small and have no path information 16249 into a canonical native form. Eg. "blah" converted to 16250 "libblah.so" or "blah.dll" etc. 16251 16252 *Geoff Thorpe* 16253 16254 * New function ERR_error_string_n(e, buf, len) which is like 16255 ERR_error_string(e, buf), but writes at most 'len' bytes 16256 including the 0 terminator. For ERR_error_string_n, 'buf' 16257 may not be NULL. 16258 16259 *Damien Miller <djm@mindrot.org>, Bodo Moeller* 16260 16261 * CONF library reworked to become more general. A new CONF 16262 configuration file reader "class" is implemented as well as a 16263 new functions (`NCONF_*`, for "New CONF") to handle it. The now 16264 old `CONF_*` functions are still there, but are reimplemented to 16265 work in terms of the new functions. Also, a set of functions 16266 to handle the internal storage of the configuration data is 16267 provided to make it easier to write new configuration file 16268 reader "classes" (I can definitely see something reading a 16269 configuration file in XML format, for example), called `_CONF_*`, 16270 or "the configuration storage API"... 16271 16272 The new configuration file reading functions are: 16273 16274 NCONF_new, NCONF_free, NCONF_load, NCONF_load_fp, NCONF_load_bio, 16275 NCONF_get_section, NCONF_get_string, NCONF_get_numbre 16276 16277 NCONF_default, NCONF_WIN32 16278 16279 NCONF_dump_fp, NCONF_dump_bio 16280 16281 NCONF_default and NCONF_WIN32 are method (or "class") choosers, 16282 NCONF_new creates a new CONF object. This works in the same way 16283 as other interfaces in OpenSSL, like the BIO interface. 16284 `NCONF_dump_*` dump the internal storage of the configuration file, 16285 which is useful for debugging. All other functions take the same 16286 arguments as the old `CONF_*` functions with the exception of the 16287 first that must be a `CONF *` instead of a `LHASH *`. 16288 16289 To make it easier to use the new classes with the old `CONF_*` functions, 16290 the function CONF_set_default_method is provided. 16291 16292 *Richard Levitte* 16293 16294 * Add '-tls1' option to 'openssl ciphers', which was already 16295 mentioned in the documentation but had not been implemented. 16296 (This option is not yet really useful because even the additional 16297 experimental TLS 1.0 ciphers are currently treated as SSL 3.0 ciphers.) 16298 16299 *Bodo Moeller* 16300 16301 * Initial DSO code added into libcrypto for letting OpenSSL (and 16302 OpenSSL-based applications) load shared libraries and bind to 16303 them in a portable way. 16304 16305 *Geoff Thorpe, with contributions from Richard Levitte* 16306 16307### Changes between 0.9.5 and 0.9.5a [1 Apr 2000] 16308 16309 * Make sure _lrotl and _lrotr are only used with MSVC. 16310 16311 * Use lock CRYPTO_LOCK_RAND correctly in ssleay_rand_status 16312 (the default implementation of RAND_status). 16313 16314 * Rename openssl x509 option '-crlext', which was added in 0.9.5, 16315 to '-clrext' (= clear extensions), as intended and documented. 16316 *Bodo Moeller; inconsistency pointed out by Michael Attili 16317 <attili@amaxo.com>* 16318 16319 * Fix for HMAC. It wasn't zeroing the rest of the block if the key length 16320 was larger than the MD block size. 16321 16322 *Steve Henson, pointed out by Yost William <YostW@tce.com>* 16323 16324 * Modernise PKCS12_parse() so it uses STACK_OF(X509) for its ca argument 16325 fix a leak when the ca argument was passed as NULL. Stop X509_PUBKEY_set() 16326 using the passed key: if the passed key was a private key the result 16327 of X509_print(), for example, would be to print out all the private key 16328 components. 16329 16330 *Steve Henson* 16331 16332 * des_quad_cksum() byte order bug fix. 16333 *Ulf Möller, using the problem description in krb4-0.9.7, where 16334 the solution is attributed to Derrick J Brashear <shadow@DEMENTIA.ORG>* 16335 16336 * Fix so V_ASN1_APP_CHOOSE works again: however its use is strongly 16337 discouraged. 16338 16339 *Steve Henson, pointed out by Brian Korver <briank@cs.stanford.edu>* 16340 16341 * For easily testing in shell scripts whether some command 16342 'openssl XXX' exists, the new pseudo-command 'openssl no-XXX' 16343 returns with exit code 0 iff no command of the given name is available. 16344 'no-XXX' is printed in this case, 'XXX' otherwise. In both cases, 16345 the output goes to stdout and nothing is printed to stderr. 16346 Additional arguments are always ignored. 16347 16348 Since for each cipher there is a command of the same name, 16349 the 'no-cipher' compilation switches can be tested this way. 16350 16351 ('openssl no-XXX' is not able to detect pseudo-commands such 16352 as 'quit', 'list-XXX-commands', or 'no-XXX' itself.) 16353 16354 *Bodo Moeller* 16355 16356 * Update test suite so that 'make test' succeeds in 'no-rsa' configuration. 16357 16358 *Bodo Moeller* 16359 16360 * For SSL_[CTX_]set_tmp_dh, don't create a DH key if SSL_OP_SINGLE_DH_USE 16361 is set; it will be thrown away anyway because each handshake creates 16362 its own key. 16363 ssl_cert_dup, which is used by SSL_new, now copies DH keys in addition 16364 to parameters -- in previous versions (since OpenSSL 0.9.3) the 16365 'default key' from SSL_CTX_set_tmp_dh would always be lost, meaning 16366 you effectively got SSL_OP_SINGLE_DH_USE when using this macro. 16367 16368 *Bodo Moeller* 16369 16370 * New s_client option -ign_eof: EOF at stdin is ignored, and 16371 'Q' and 'R' lose their special meanings (quit/renegotiate). 16372 This is part of what -quiet does; unlike -quiet, -ign_eof 16373 does not suppress any output. 16374 16375 *Richard Levitte* 16376 16377 * Add compatibility options to the purpose and trust code. The 16378 purpose X509_PURPOSE_ANY is "any purpose" which automatically 16379 accepts a certificate or CA, this was the previous behaviour, 16380 with all the associated security issues. 16381 16382 X509_TRUST_COMPAT is the old trust behaviour: only and 16383 automatically trust self signed roots in certificate store. A 16384 new trust setting X509_TRUST_DEFAULT is used to specify that 16385 a purpose has no associated trust setting and it should instead 16386 use the value in the default purpose. 16387 16388 *Steve Henson* 16389 16390 * Fix the PKCS#8 DSA private key code so it decodes keys again 16391 and fix a memory leak. 16392 16393 *Steve Henson* 16394 16395 * In util/mkerr.pl (which implements 'make errors'), preserve 16396 reason strings from the previous version of the .c file, as 16397 the default to have only downcase letters (and digits) in 16398 automatically generated reasons codes is not always appropriate. 16399 16400 *Bodo Moeller* 16401 16402 * In ERR_load_ERR_strings(), build an ERR_LIB_SYS error reason table 16403 using strerror. Previously, ERR_reason_error_string() returned 16404 library names as reason strings for SYSerr; but SYSerr is a special 16405 case where small numbers are errno values, not library numbers. 16406 16407 *Bodo Moeller* 16408 16409 * Add '-dsaparam' option to 'openssl dhparam' application. This 16410 converts DSA parameters into DH parameters. (When creating parameters, 16411 DSA_generate_parameters is used.) 16412 16413 *Bodo Moeller* 16414 16415 * Include 'length' (recommended exponent length) in C code generated 16416 by 'openssl dhparam -C'. 16417 16418 *Bodo Moeller* 16419 16420 * The second argument to set_label in perlasm was already being used 16421 so couldn't be used as a "file scope" flag. Moved to third argument 16422 which was free. 16423 16424 *Steve Henson* 16425 16426 * In PEM_ASN1_write_bio and some other functions, use RAND_pseudo_bytes 16427 instead of RAND_bytes for encryption IVs and salts. 16428 16429 *Bodo Moeller* 16430 16431 * Include RAND_status() into RAND_METHOD instead of implementing 16432 it only for md_rand.c Otherwise replacing the PRNG by calling 16433 RAND_set_rand_method would be impossible. 16434 16435 *Bodo Moeller* 16436 16437 * Don't let DSA_generate_key() enter an infinite loop if the random 16438 number generation fails. 16439 16440 *Bodo Moeller* 16441 16442 * New 'rand' application for creating pseudo-random output. 16443 16444 *Bodo Moeller* 16445 16446 * Added configuration support for Linux/IA64 16447 16448 *Rolf Haberrecker <rolf@suse.de>* 16449 16450 * Assembler module support for Mingw32. 16451 16452 *Ulf Möller* 16453 16454 * Shared library support for HPUX (in shlib/). 16455 16456 *Lutz Jaenicke <Lutz.Jaenicke@aet.TU-Cottbus.DE> and Anonymous* 16457 16458 * Shared library support for Solaris gcc. 16459 16460 *Lutz Behnke <behnke@trustcenter.de>* 16461 16462### Changes between 0.9.4 and 0.9.5 [28 Feb 2000] 16463 16464 * PKCS7_encrypt() was adding text MIME headers twice because they 16465 were added manually and by SMIME_crlf_copy(). 16466 16467 *Steve Henson* 16468 16469 * In bntest.c don't call BN_rand with zero bits argument. 16470 16471 *Steve Henson, pointed out by Andrew W. Gray <agray@iconsinc.com>* 16472 16473 * BN_mul bugfix: In bn_mul_part_recursion() only the a>a[n] && b>b[n] 16474 case was implemented. This caused BN_div_recp() to fail occasionally. 16475 16476 *Ulf Möller* 16477 16478 * Add an optional second argument to the set_label() in the perl 16479 assembly language builder. If this argument exists and is set 16480 to 1 it signals that the assembler should use a symbol whose 16481 scope is the entire file, not just the current function. This 16482 is needed with MASM which uses the format label:: for this scope. 16483 16484 *Steve Henson, pointed out by Peter Runestig <peter@runestig.com>* 16485 16486 * Change the ASN1 types so they are typedefs by default. Before 16487 almost all types were #define'd to ASN1_STRING which was causing 16488 STACK_OF() problems: you couldn't declare STACK_OF(ASN1_UTF8STRING) 16489 for example. 16490 16491 *Steve Henson* 16492 16493 * Change names of new functions to the new get1/get0 naming 16494 convention: After 'get1', the caller owns a reference count 16495 and has to call `..._free`; 'get0' returns a pointer to some 16496 data structure without incrementing reference counters. 16497 (Some of the existing 'get' functions increment a reference 16498 counter, some don't.) 16499 Similarly, 'set1' and 'add1' functions increase reference 16500 counters or duplicate objects. 16501 16502 *Steve Henson* 16503 16504 * Allow for the possibility of temp RSA key generation failure: 16505 the code used to assume it always worked and crashed on failure. 16506 16507 *Steve Henson* 16508 16509 * Fix potential buffer overrun problem in BIO_printf(). 16510 *Ulf Möller, using public domain code by Patrick Powell; problem 16511 pointed out by David Sacerdote <das33@cornell.edu>* 16512 16513 * Support EGD <http://www.lothar.com/tech/crypto/>. New functions 16514 RAND_egd() and RAND_status(). In the command line application, 16515 the EGD socket can be specified like a seed file using RANDFILE 16516 or -rand. 16517 16518 *Ulf Möller* 16519 16520 * Allow the string CERTIFICATE to be tolerated in PKCS#7 structures. 16521 Some CAs (e.g. Verisign) distribute certificates in this form. 16522 16523 *Steve Henson* 16524 16525 * Remove the SSL_ALLOW_ADH compile option and set the default cipher 16526 list to exclude them. This means that no special compilation option 16527 is needed to use anonymous DH: it just needs to be included in the 16528 cipher list. 16529 16530 *Steve Henson* 16531 16532 * Change the EVP_MD_CTX_type macro so its meaning consistent with 16533 EVP_MD_type. The old functionality is available in a new macro called 16534 EVP_MD_md(). Change code that uses it and update docs. 16535 16536 *Steve Henson* 16537 16538 * `..._ctrl` functions now have corresponding `..._callback_ctrl` functions 16539 where the `void *` argument is replaced by a function pointer argument. 16540 Previously `void *` was abused to point to functions, which works on 16541 many platforms, but is not correct. As these functions are usually 16542 called by macros defined in OpenSSL header files, most source code 16543 should work without changes. 16544 16545 *Richard Levitte* 16546 16547 * `<openssl/opensslconf.h>` (which is created by Configure) now contains 16548 sections with information on -D... compiler switches used for 16549 compiling the library so that applications can see them. To enable 16550 one of these sections, a pre-processor symbol `OPENSSL_..._DEFINES` 16551 must be defined. E.g., 16552 #define OPENSSL_ALGORITHM_DEFINES 16553 #include <openssl/opensslconf.h> 16554 defines all pertinent `NO_<algo>` symbols, such as NO_IDEA, NO_RSA, etc. 16555 16556 *Richard Levitte, Ulf and Bodo Möller* 16557 16558 * Bugfix: Tolerate fragmentation and interleaving in the SSL 3/TLS 16559 record layer. 16560 16561 *Bodo Moeller* 16562 16563 * Change the 'other' type in certificate aux info to a STACK_OF 16564 X509_ALGOR. Although not an AlgorithmIdentifier as such it has 16565 the required ASN1 format: arbitrary types determined by an OID. 16566 16567 *Steve Henson* 16568 16569 * Add some PEM_write_X509_REQ_NEW() functions and a command line 16570 argument to 'req'. This is not because the function is newer or 16571 better than others it just uses the work 'NEW' in the certificate 16572 request header lines. Some software needs this. 16573 16574 *Steve Henson* 16575 16576 * Reorganise password command line arguments: now passwords can be 16577 obtained from various sources. Delete the PEM_cb function and make 16578 it the default behaviour: i.e. if the callback is NULL and the 16579 usrdata argument is not NULL interpret it as a null terminated pass 16580 phrase. If usrdata and the callback are NULL then the pass phrase 16581 is prompted for as usual. 16582 16583 *Steve Henson* 16584 16585 * Add support for the Compaq Atalla crypto accelerator. If it is installed, 16586 the support is automatically enabled. The resulting binaries will 16587 autodetect the card and use it if present. 16588 16589 *Ben Laurie and Compaq Inc.* 16590 16591 * Work around for Netscape hang bug. This sends certificate request 16592 and server done in one record. Since this is perfectly legal in the 16593 SSL/TLS protocol it isn't a "bug" option and is on by default. See 16594 the bugs/SSLv3 entry for more info. 16595 16596 *Steve Henson* 16597 16598 * HP-UX tune-up: new unified configs, HP C compiler bug workaround. 16599 16600 *Andy Polyakov* 16601 16602 * Add -rand argument to smime and pkcs12 applications and read/write 16603 of seed file. 16604 16605 *Steve Henson* 16606 16607 * New 'passwd' tool for crypt(3) and apr1 password hashes. 16608 16609 *Bodo Moeller* 16610 16611 * Add command line password options to the remaining applications. 16612 16613 *Steve Henson* 16614 16615 * Bug fix for BN_div_recp() for numerators with an even number of 16616 bits. 16617 16618 *Ulf Möller* 16619 16620 * More tests in bntest.c, and changed test_bn output. 16621 16622 *Ulf Möller* 16623 16624 * ./config recognizes MacOS X now. 16625 16626 *Andy Polyakov* 16627 16628 * Bug fix for BN_div() when the first words of num and divisor are 16629 equal (it gave wrong results if `(rem=(n1-q*d0)&BN_MASK2) < d0)`. 16630 16631 *Ulf Möller* 16632 16633 * Add support for various broken PKCS#8 formats, and command line 16634 options to produce them. 16635 16636 *Steve Henson* 16637 16638 * New functions BN_CTX_start(), BN_CTX_get() and BT_CTX_end() to 16639 get temporary BIGNUMs from a BN_CTX. 16640 16641 *Ulf Möller* 16642 16643 * Correct return values in BN_mod_exp_mont() and BN_mod_exp2_mont() 16644 for p == 0. 16645 16646 *Ulf Möller* 16647 16648 * Change the `SSLeay_add_all_*()` functions to `OpenSSL_add_all_*()` and 16649 include a #define from the old name to the new. The original intent 16650 was that statically linked binaries could for example just call 16651 SSLeay_add_all_ciphers() to just add ciphers to the table and not 16652 link with digests. This never worked because SSLeay_add_all_digests() 16653 and SSLeay_add_all_ciphers() were in the same source file so calling 16654 one would link with the other. They are now in separate source files. 16655 16656 *Steve Henson* 16657 16658 * Add a new -notext option to 'ca' and a -pubkey option to 'spkac'. 16659 16660 *Steve Henson* 16661 16662 * Use a less unusual form of the Miller-Rabin primality test (it used 16663 a binary algorithm for exponentiation integrated into the Miller-Rabin 16664 loop, our standard modexp algorithms are faster). 16665 16666 *Bodo Moeller* 16667 16668 * Support for the EBCDIC character set completed. 16669 16670 *Martin Kraemer <Martin.Kraemer@Mch.SNI.De>* 16671 16672 * Source code cleanups: use const where appropriate, eliminate casts, 16673 use `void *` instead of `char *` in lhash. 16674 16675 *Ulf Möller* 16676 16677 * Bugfix: ssl3_send_server_key_exchange was not restartable 16678 (the state was not changed to SSL3_ST_SW_KEY_EXCH_B, and because of 16679 this the server could overwrite ephemeral keys that the client 16680 has already seen). 16681 16682 *Bodo Moeller* 16683 16684 * Turn DSA_is_prime into a macro that calls BN_is_prime, 16685 using 50 iterations of the Rabin-Miller test. 16686 16687 DSA_generate_parameters now uses BN_is_prime_fasttest (with 50 16688 iterations of the Rabin-Miller test as required by the appendix 16689 to FIPS PUB 186[-1]) instead of DSA_is_prime. 16690 As BN_is_prime_fasttest includes trial division, DSA parameter 16691 generation becomes much faster. 16692 16693 This implies a change for the callback functions in DSA_is_prime 16694 and DSA_generate_parameters: The callback function is called once 16695 for each positive witness in the Rabin-Miller test, not just 16696 occasionally in the inner loop; and the parameters to the 16697 callback function now provide an iteration count for the outer 16698 loop rather than for the current invocation of the inner loop. 16699 DSA_generate_parameters additionally can call the callback 16700 function with an 'iteration count' of -1, meaning that a 16701 candidate has passed the trial division test (when q is generated 16702 from an application-provided seed, trial division is skipped). 16703 16704 *Bodo Moeller* 16705 16706 * New function BN_is_prime_fasttest that optionally does trial 16707 division before starting the Rabin-Miller test and has 16708 an additional BN_CTX * argument (whereas BN_is_prime always 16709 has to allocate at least one BN_CTX). 16710 'callback(1, -1, cb_arg)' is called when a number has passed the 16711 trial division stage. 16712 16713 *Bodo Moeller* 16714 16715 * Fix for bug in CRL encoding. The validity dates weren't being handled 16716 as ASN1_TIME. 16717 16718 *Steve Henson* 16719 16720 * New -pkcs12 option to CA.pl script to write out a PKCS#12 file. 16721 16722 *Steve Henson* 16723 16724 * New function BN_pseudo_rand(). 16725 16726 *Ulf Möller* 16727 16728 * Clean up BN_mod_mul_montgomery(): replace the broken (and unreadable) 16729 bignum version of BN_from_montgomery() with the working code from 16730 SSLeay 0.9.0 (the word based version is faster anyway), and clean up 16731 the comments. 16732 16733 *Ulf Möller* 16734 16735 * Avoid a race condition in s2_clnt.c (function get_server_hello) that 16736 made it impossible to use the same SSL_SESSION data structure in 16737 SSL2 clients in multiple threads. 16738 16739 *Bodo Moeller* 16740 16741 * The return value of RAND_load_file() no longer counts bytes obtained 16742 by stat(). RAND_load_file(..., -1) is new and uses the complete file 16743 to seed the PRNG (previously an explicit byte count was required). 16744 16745 *Ulf Möller, Bodo Möller* 16746 16747 * Clean up CRYPTO_EX_DATA functions, some of these didn't have prototypes 16748 used `char *` instead of `void *` and had casts all over the place. 16749 16750 *Steve Henson* 16751 16752 * Make BN_generate_prime() return NULL on error if ret!=NULL. 16753 16754 *Ulf Möller* 16755 16756 * Retain source code compatibility for BN_prime_checks macro: 16757 BN_is_prime(..., BN_prime_checks, ...) now uses 16758 BN_prime_checks_for_size to determine the appropriate number of 16759 Rabin-Miller iterations. 16760 16761 *Ulf Möller* 16762 16763 * Diffie-Hellman uses "safe" primes: DH_check() return code renamed to 16764 DH_CHECK_P_NOT_SAFE_PRIME. 16765 (Check if this is true? OpenPGP calls them "strong".) 16766 16767 *Ulf Möller* 16768 16769 * Merge the functionality of "dh" and "gendh" programs into a new program 16770 "dhparam". The old programs are retained for now but will handle DH keys 16771 (instead of parameters) in future. 16772 16773 *Steve Henson* 16774 16775 * Make the ciphers, s_server and s_client programs check the return values 16776 when a new cipher list is set. 16777 16778 *Steve Henson* 16779 16780 * Enhance the SSL/TLS cipher mechanism to correctly handle the TLS 56bit 16781 ciphers. Before when the 56bit ciphers were enabled the sorting was 16782 wrong. 16783 16784 The syntax for the cipher sorting has been extended to support sorting by 16785 cipher-strength (using the strength_bits hard coded in the tables). 16786 The new command is `@STRENGTH` (see also `doc/apps/ciphers.pod`). 16787 16788 Fix a bug in the cipher-command parser: when supplying a cipher command 16789 string with an "undefined" symbol (neither command nor alphanumeric 16790 *A-Za-z0-9*, ssl_set_cipher_list used to hang in an endless loop. Now 16791 an error is flagged. 16792 16793 Due to the strength-sorting extension, the code of the 16794 ssl_create_cipher_list() function was completely rearranged. I hope that 16795 the readability was also increased :-) 16796 16797 *Lutz Jaenicke <Lutz.Jaenicke@aet.TU-Cottbus.DE>* 16798 16799 * Minor change to 'x509' utility. The -CAcreateserial option now uses 1 16800 for the first serial number and places 2 in the serial number file. This 16801 avoids problems when the root CA is created with serial number zero and 16802 the first user certificate has the same issuer name and serial number 16803 as the root CA. 16804 16805 *Steve Henson* 16806 16807 * Fixes to X509_ATTRIBUTE utilities, change the 'req' program so it uses 16808 the new code. Add documentation for this stuff. 16809 16810 *Steve Henson* 16811 16812 * Changes to X509_ATTRIBUTE utilities. These have been renamed from 16813 `X509_*()` to `X509at_*()` on the grounds that they don't handle X509 16814 structures and behave in an analogous way to the X509v3 functions: 16815 they shouldn't be called directly but wrapper functions should be used 16816 instead. 16817 16818 So we also now have some wrapper functions that call the X509at functions 16819 when passed certificate requests. (TO DO: similar things can be done with 16820 PKCS#7 signed and unsigned attributes, PKCS#12 attributes and a few other 16821 things. Some of these need some d2i or i2d and print functionality 16822 because they handle more complex structures.) 16823 16824 *Steve Henson* 16825 16826 * Add missing #ifndefs that caused missing symbols when building libssl 16827 as a shared library without RSA. Use #ifndef NO_SSL2 instead of 16828 NO_RSA in `ssl/s2*.c`. 16829 16830 *Kris Kennaway <kris@hub.freebsd.org>, modified by Ulf Möller* 16831 16832 * Precautions against using the PRNG uninitialized: RAND_bytes() now 16833 has a return value which indicates the quality of the random data 16834 (1 = ok, 0 = not seeded). Also an error is recorded on the thread's 16835 error queue. New function RAND_pseudo_bytes() generates output that is 16836 guaranteed to be unique but not unpredictable. RAND_add is like 16837 RAND_seed, but takes an extra argument for an entropy estimate 16838 (RAND_seed always assumes full entropy). 16839 16840 *Ulf Möller* 16841 16842 * Do more iterations of Rabin-Miller probable prime test (specifically, 16843 3 for 1024-bit primes, 6 for 512-bit primes, 12 for 256-bit primes 16844 instead of only 2 for all lengths; see BN_prime_checks_for_size definition 16845 in crypto/bn/bn_prime.c for the complete table). This guarantees a 16846 false-positive rate of at most 2^-80 for random input. 16847 16848 *Bodo Moeller* 16849 16850 * Rewrite ssl3_read_n (ssl/s3_pkt.c) avoiding a couple of bugs. 16851 16852 *Bodo Moeller* 16853 16854 * New function X509_CTX_rget_chain() (renamed to X509_CTX_get1_chain 16855 in the 0.9.5 release), this returns the chain 16856 from an X509_CTX structure with a dup of the stack and all 16857 the X509 reference counts upped: so the stack will exist 16858 after X509_CTX_cleanup() has been called. Modify pkcs12.c 16859 to use this. 16860 16861 Also make SSL_SESSION_print() print out the verify return 16862 code. 16863 16864 *Steve Henson* 16865 16866 * Add manpage for the pkcs12 command. Also change the default 16867 behaviour so MAC iteration counts are used unless the new 16868 -nomaciter option is used. This improves file security and 16869 only older versions of MSIE (4.0 for example) need it. 16870 16871 *Steve Henson* 16872 16873 * Honor the no-xxx Configure options when creating .DEF files. 16874 16875 *Ulf Möller* 16876 16877 * Add PKCS#10 attributes to field table: challengePassword, 16878 unstructuredName and unstructuredAddress. These are taken from 16879 draft PKCS#9 v2.0 but are compatible with v1.2 provided no 16880 international characters are used. 16881 16882 More changes to X509_ATTRIBUTE code: allow the setting of types 16883 based on strings. Remove the 'loc' parameter when adding 16884 attributes because these will be a SET OF encoding which is sorted 16885 in ASN1 order. 16886 16887 *Steve Henson* 16888 16889 * Initial changes to the 'req' utility to allow request generation 16890 automation. This will allow an application to just generate a template 16891 file containing all the field values and have req construct the 16892 request. 16893 16894 Initial support for X509_ATTRIBUTE handling. Stacks of these are 16895 used all over the place including certificate requests and PKCS#7 16896 structures. They are currently handled manually where necessary with 16897 some primitive wrappers for PKCS#7. The new functions behave in a 16898 manner analogous to the X509 extension functions: they allow 16899 attributes to be looked up by NID and added. 16900 16901 Later something similar to the X509V3 code would be desirable to 16902 automatically handle the encoding, decoding and printing of the 16903 more complex types. The string types like challengePassword can 16904 be handled by the string table functions. 16905 16906 Also modified the multi byte string table handling. Now there is 16907 a 'global mask' which masks out certain types. The table itself 16908 can use the flag STABLE_NO_MASK to ignore the mask setting: this 16909 is useful when for example there is only one permissible type 16910 (as in countryName) and using the mask might result in no valid 16911 types at all. 16912 16913 *Steve Henson* 16914 16915 * Clean up 'Finished' handling, and add functions SSL_get_finished and 16916 SSL_get_peer_finished to allow applications to obtain the latest 16917 Finished messages sent to the peer or expected from the peer, 16918 respectively. (SSL_get_peer_finished is usually the Finished message 16919 actually received from the peer, otherwise the protocol will be aborted.) 16920 16921 As the Finished message are message digests of the complete handshake 16922 (with a total of 192 bits for TLS 1.0 and more for SSL 3.0), they can 16923 be used for external authentication procedures when the authentication 16924 provided by SSL/TLS is not desired or is not enough. 16925 16926 *Bodo Moeller* 16927 16928 * Enhanced support for Alpha Linux is added. Now ./config checks if 16929 the host supports BWX extension and if Compaq C is present on the 16930 $PATH. Just exploiting of the BWX extension results in 20-30% 16931 performance kick for some algorithms, e.g. DES and RC4 to mention 16932 a couple. Compaq C in turn generates ~20% faster code for MD5 and 16933 SHA1. 16934 16935 *Andy Polyakov* 16936 16937 * Add support for MS "fast SGC". This is arguably a violation of the 16938 SSL3/TLS protocol. Netscape SGC does two handshakes: the first with 16939 weak crypto and after checking the certificate is SGC a second one 16940 with strong crypto. MS SGC stops the first handshake after receiving 16941 the server certificate message and sends a second client hello. Since 16942 a server will typically do all the time consuming operations before 16943 expecting any further messages from the client (server key exchange 16944 is the most expensive) there is little difference between the two. 16945 16946 To get OpenSSL to support MS SGC we have to permit a second client 16947 hello message after we have sent server done. In addition we have to 16948 reset the MAC if we do get this second client hello. 16949 16950 *Steve Henson* 16951 16952 * Add a function 'd2i_AutoPrivateKey()' this will automatically decide 16953 if a DER encoded private key is RSA or DSA traditional format. Changed 16954 d2i_PrivateKey_bio() to use it. This is only needed for the "traditional" 16955 format DER encoded private key. Newer code should use PKCS#8 format which 16956 has the key type encoded in the ASN1 structure. Added DER private key 16957 support to pkcs8 application. 16958 16959 *Steve Henson* 16960 16961 * SSL 3/TLS 1 servers now don't request certificates when an anonymous 16962 ciphersuites has been selected (as required by the SSL 3/TLS 1 16963 specifications). Exception: When SSL_VERIFY_FAIL_IF_NO_PEER_CERT 16964 is set, we interpret this as a request to violate the specification 16965 (the worst that can happen is a handshake failure, and 'correct' 16966 behaviour would result in a handshake failure anyway). 16967 16968 *Bodo Moeller* 16969 16970 * In SSL_CTX_add_session, take into account that there might be multiple 16971 SSL_SESSION structures with the same session ID (e.g. when two threads 16972 concurrently obtain them from an external cache). 16973 The internal cache can handle only one SSL_SESSION with a given ID, 16974 so if there's a conflict, we now throw out the old one to achieve 16975 consistency. 16976 16977 *Bodo Moeller* 16978 16979 * Add OIDs for idea and blowfish in CBC mode. This will allow both 16980 to be used in PKCS#5 v2.0 and S/MIME. Also add checking to 16981 some routines that use cipher OIDs: some ciphers do not have OIDs 16982 defined and so they cannot be used for S/MIME and PKCS#5 v2.0 for 16983 example. 16984 16985 *Steve Henson* 16986 16987 * Simplify the trust setting structure and code. Now we just have 16988 two sequences of OIDs for trusted and rejected settings. These will 16989 typically have values the same as the extended key usage extension 16990 and any application specific purposes. 16991 16992 The trust checking code now has a default behaviour: it will just 16993 check for an object with the same NID as the passed id. Functions can 16994 be provided to override either the default behaviour or the behaviour 16995 for a given id. SSL client, server and email already have functions 16996 in place for compatibility: they check the NID and also return "trusted" 16997 if the certificate is self signed. 16998 16999 *Steve Henson* 17000 17001 * Add d2i,i2d bio/fp functions for PrivateKey: these convert the 17002 traditional format into an EVP_PKEY structure. 17003 17004 *Steve Henson* 17005 17006 * Add a password callback function PEM_cb() which either prompts for 17007 a password if usr_data is NULL or otherwise assumes it is a null 17008 terminated password. Allow passwords to be passed on command line 17009 environment or config files in a few more utilities. 17010 17011 *Steve Henson* 17012 17013 * Add a bunch of DER and PEM functions to handle PKCS#8 format private 17014 keys. Add some short names for PKCS#8 PBE algorithms and allow them 17015 to be specified on the command line for the pkcs8 and pkcs12 utilities. 17016 Update documentation. 17017 17018 *Steve Henson* 17019 17020 * Support for ASN1 "NULL" type. This could be handled before by using 17021 ASN1_TYPE but there wasn't any function that would try to read a NULL 17022 and produce an error if it couldn't. For compatibility we also have 17023 ASN1_NULL_new() and ASN1_NULL_free() functions but these are faked and 17024 don't allocate anything because they don't need to. 17025 17026 *Steve Henson* 17027 17028 * Initial support for MacOS is now provided. Examine INSTALL.MacOS 17029 for details. 17030 17031 *Andy Polyakov, Roy Woods <roy@centicsystems.ca>* 17032 17033 * Rebuild of the memory allocation routines used by OpenSSL code and 17034 possibly others as well. The purpose is to make an interface that 17035 provide hooks so anyone can build a separate set of allocation and 17036 deallocation routines to be used by OpenSSL, for example memory 17037 pool implementations, or something else, which was previously hard 17038 since Malloc(), Realloc() and Free() were defined as macros having 17039 the values malloc, realloc and free, respectively (except for Win32 17040 compilations). The same is provided for memory debugging code. 17041 OpenSSL already comes with functionality to find memory leaks, but 17042 this gives people a chance to debug other memory problems. 17043 17044 With these changes, a new set of functions and macros have appeared: 17045 17046 CRYPTO_set_mem_debug_functions() [F] 17047 CRYPTO_get_mem_debug_functions() [F] 17048 CRYPTO_dbg_set_options() [F] 17049 CRYPTO_dbg_get_options() [F] 17050 CRYPTO_malloc_debug_init() [M] 17051 17052 The memory debug functions are NULL by default, unless the library 17053 is compiled with CRYPTO_MDEBUG or friends is defined. If someone 17054 wants to debug memory anyway, CRYPTO_malloc_debug_init() (which 17055 gives the standard debugging functions that come with OpenSSL) or 17056 CRYPTO_set_mem_debug_functions() (tells OpenSSL to use functions 17057 provided by the library user) must be used. When the standard 17058 debugging functions are used, CRYPTO_dbg_set_options can be used to 17059 request additional information: 17060 CRYPTO_dbg_set_options(V_CYRPTO_MDEBUG_xxx) corresponds to setting 17061 the CRYPTO_MDEBUG_xxx macro when compiling the library. 17062 17063 Also, things like CRYPTO_set_mem_functions will always give the 17064 expected result (the new set of functions is used for allocation 17065 and deallocation) at all times, regardless of platform and compiler 17066 options. 17067 17068 To finish it up, some functions that were never use in any other 17069 way than through macros have a new API and new semantic: 17070 17071 CRYPTO_dbg_malloc() 17072 CRYPTO_dbg_realloc() 17073 CRYPTO_dbg_free() 17074 17075 All macros of value have retained their old syntax. 17076 17077 *Richard Levitte and Bodo Moeller* 17078 17079 * Some S/MIME fixes. The OID for SMIMECapabilities was wrong, the 17080 ordering of SMIMECapabilities wasn't in "strength order" and there 17081 was a missing NULL in the AlgorithmIdentifier for the SHA1 signature 17082 algorithm. 17083 17084 *Steve Henson* 17085 17086 * Some ASN1 types with illegal zero length encoding (INTEGER, 17087 ENUMERATED and OBJECT IDENTIFIER) choked the ASN1 routines. 17088 17089 *Frans Heymans <fheymans@isaserver.be>, modified by Steve Henson* 17090 17091 * Merge in my S/MIME library for OpenSSL. This provides a simple 17092 S/MIME API on top of the PKCS#7 code, a MIME parser (with enough 17093 functionality to handle multipart/signed properly) and a utility 17094 called 'smime' to call all this stuff. This is based on code I 17095 originally wrote for Celo who have kindly allowed it to be 17096 included in OpenSSL. 17097 17098 *Steve Henson* 17099 17100 * Add variants des_set_key_checked and des_set_key_unchecked of 17101 des_set_key (aka des_key_sched). Global variable des_check_key 17102 decides which of these is called by des_set_key; this way 17103 des_check_key behaves as it always did, but applications and 17104 the library itself, which was buggy for des_check_key == 1, 17105 have a cleaner way to pick the version they need. 17106 17107 *Bodo Moeller* 17108 17109 * New function PKCS12_newpass() which changes the password of a 17110 PKCS12 structure. 17111 17112 *Steve Henson* 17113 17114 * Modify X509_TRUST and X509_PURPOSE so it also uses a static and 17115 dynamic mix. In both cases the ids can be used as an index into the 17116 table. Also modified the X509_TRUST_add() and X509_PURPOSE_add() 17117 functions so they accept a list of the field values and the 17118 application doesn't need to directly manipulate the X509_TRUST 17119 structure. 17120 17121 *Steve Henson* 17122 17123 * Modify the ASN1_STRING_TABLE stuff so it also uses bsearch and doesn't 17124 need initialising. 17125 17126 *Steve Henson* 17127 17128 * Modify the way the V3 extension code looks up extensions. This now 17129 works in a similar way to the object code: we have some "standard" 17130 extensions in a static table which is searched with OBJ_bsearch() 17131 and the application can add dynamic ones if needed. The file 17132 crypto/x509v3/ext_dat.h now has the info: this file needs to be 17133 updated whenever a new extension is added to the core code and kept 17134 in ext_nid order. There is a simple program 'tabtest.c' which checks 17135 this. New extensions are not added too often so this file can readily 17136 be maintained manually. 17137 17138 There are two big advantages in doing things this way. The extensions 17139 can be looked up immediately and no longer need to be "added" using 17140 X509V3_add_standard_extensions(): this function now does nothing. 17141 Side note: I get *lots* of email saying the extension code doesn't 17142 work because people forget to call this function. 17143 Also no dynamic allocation is done unless new extensions are added: 17144 so if we don't add custom extensions there is no need to call 17145 X509V3_EXT_cleanup(). 17146 17147 *Steve Henson* 17148 17149 * Modify enc utility's salting as follows: make salting the default. Add a 17150 magic header, so unsalted files fail gracefully instead of just decrypting 17151 to garbage. This is because not salting is a big security hole, so people 17152 should be discouraged from doing it. 17153 17154 *Ben Laurie* 17155 17156 * Fixes and enhancements to the 'x509' utility. It allowed a message 17157 digest to be passed on the command line but it only used this 17158 parameter when signing a certificate. Modified so all relevant 17159 operations are affected by the digest parameter including the 17160 -fingerprint and -x509toreq options. Also -x509toreq choked if a 17161 DSA key was used because it didn't fix the digest. 17162 17163 *Steve Henson* 17164 17165 * Initial certificate chain verify code. Currently tests the untrusted 17166 certificates for consistency with the verify purpose (which is set 17167 when the X509_STORE_CTX structure is set up) and checks the pathlength. 17168 17169 There is a NO_CHAIN_VERIFY compilation option to keep the old behaviour: 17170 this is because it will reject chains with invalid extensions whereas 17171 every previous version of OpenSSL and SSLeay made no checks at all. 17172 17173 Trust code: checks the root CA for the relevant trust settings. Trust 17174 settings have an initial value consistent with the verify purpose: e.g. 17175 if the verify purpose is for SSL client use it expects the CA to be 17176 trusted for SSL client use. However the default value can be changed to 17177 permit custom trust settings: one example of this would be to only trust 17178 certificates from a specific "secure" set of CAs. 17179 17180 Also added X509_STORE_CTX_new() and X509_STORE_CTX_free() functions 17181 which should be used for version portability: especially since the 17182 verify structure is likely to change more often now. 17183 17184 SSL integration. Add purpose and trust to SSL_CTX and SSL and functions 17185 to set them. If not set then assume SSL clients will verify SSL servers 17186 and vice versa. 17187 17188 Two new options to the verify program: -untrusted allows a set of 17189 untrusted certificates to be passed in and -purpose which sets the 17190 intended purpose of the certificate. If a purpose is set then the 17191 new chain verify code is used to check extension consistency. 17192 17193 *Steve Henson* 17194 17195 * Support for the authority information access extension. 17196 17197 *Steve Henson* 17198 17199 * Modify RSA and DSA PEM read routines to transparently handle 17200 PKCS#8 format private keys. New *_PUBKEY_* functions that handle 17201 public keys in a format compatible with certificate 17202 SubjectPublicKeyInfo structures. Unfortunately there were already 17203 functions called *_PublicKey_* which used various odd formats so 17204 these are retained for compatibility: however the DSA variants were 17205 never in a public release so they have been deleted. Changed dsa/rsa 17206 utilities to handle the new format: note no releases ever handled public 17207 keys so we should be OK. 17208 17209 The primary motivation for this change is to avoid the same fiasco 17210 that dogs private keys: there are several incompatible private key 17211 formats some of which are standard and some OpenSSL specific and 17212 require various evil hacks to allow partial transparent handling and 17213 even then it doesn't work with DER formats. Given the option anything 17214 other than PKCS#8 should be dumped: but the other formats have to 17215 stay in the name of compatibility. 17216 17217 With public keys and the benefit of hindsight one standard format 17218 is used which works with EVP_PKEY, RSA or DSA structures: though 17219 it clearly returns an error if you try to read the wrong kind of key. 17220 17221 Added a -pubkey option to the 'x509' utility to output the public key. 17222 Also rename the `EVP_PKEY_get_*()` to `EVP_PKEY_rget_*()` 17223 (renamed to `EVP_PKEY_get1_*()` in the OpenSSL 0.9.5 release) and add 17224 `EVP_PKEY_rset_*()` functions (renamed to `EVP_PKEY_set1_*()`) 17225 that do the same as the `EVP_PKEY_assign_*()` except they up the 17226 reference count of the added key (they don't "swallow" the 17227 supplied key). 17228 17229 *Steve Henson* 17230 17231 * Fixes to crypto/x509/by_file.c the code to read in certificates and 17232 CRLs would fail if the file contained no certificates or no CRLs: 17233 added a new function to read in both types and return the number 17234 read: this means that if none are read it will be an error. The 17235 DER versions of the certificate and CRL reader would always fail 17236 because it isn't possible to mix certificates and CRLs in DER format 17237 without choking one or the other routine. Changed this to just read 17238 a certificate: this is the best we can do. Also modified the code 17239 in `apps/verify.c` to take notice of return codes: it was previously 17240 attempting to read in certificates from NULL pointers and ignoring 17241 any errors: this is one reason why the cert and CRL reader seemed 17242 to work. It doesn't check return codes from the default certificate 17243 routines: these may well fail if the certificates aren't installed. 17244 17245 *Steve Henson* 17246 17247 * Code to support otherName option in GeneralName. 17248 17249 *Steve Henson* 17250 17251 * First update to verify code. Change the verify utility 17252 so it warns if it is passed a self signed certificate: 17253 for consistency with the normal behaviour. X509_verify 17254 has been modified to it will now verify a self signed 17255 certificate if *exactly* the same certificate appears 17256 in the store: it was previously impossible to trust a 17257 single self signed certificate. This means that: 17258 openssl verify ss.pem 17259 now gives a warning about a self signed certificate but 17260 openssl verify -CAfile ss.pem ss.pem 17261 is OK. 17262 17263 *Steve Henson* 17264 17265 * For servers, store verify_result in SSL_SESSION data structure 17266 (and add it to external session representation). 17267 This is needed when client certificate verifications fails, 17268 but an application-provided verification callback (set by 17269 SSL_CTX_set_cert_verify_callback) allows accepting the session 17270 anyway (i.e. leaves x509_store_ctx->error != X509_V_OK 17271 but returns 1): When the session is reused, we have to set 17272 ssl->verify_result to the appropriate error code to avoid 17273 security holes. 17274 17275 *Bodo Moeller, problem pointed out by Lutz Jaenicke* 17276 17277 * Fix a bug in the new PKCS#7 code: it didn't consider the 17278 case in PKCS7_dataInit() where the signed PKCS7 structure 17279 didn't contain any existing data because it was being created. 17280 17281 *Po-Cheng Chen <pocheng@nst.com.tw>, slightly modified by Steve Henson* 17282 17283 * Add a salt to the key derivation routines in enc.c. This 17284 forms the first 8 bytes of the encrypted file. Also add a 17285 -S option to allow a salt to be input on the command line. 17286 17287 *Steve Henson* 17288 17289 * New function X509_cmp(). Oddly enough there wasn't a function 17290 to compare two certificates. We do this by working out the SHA1 17291 hash and comparing that. X509_cmp() will be needed by the trust 17292 code. 17293 17294 *Steve Henson* 17295 17296 * SSL_get1_session() is like SSL_get_session(), but increments 17297 the reference count in the SSL_SESSION returned. 17298 17299 *Geoff Thorpe <geoff@eu.c2.net>* 17300 17301 * Fix for 'req': it was adding a null to request attributes. 17302 Also change the X509_LOOKUP and X509_INFO code to handle 17303 certificate auxiliary information. 17304 17305 *Steve Henson* 17306 17307 * Add support for 40 and 64 bit RC2 and RC4 algorithms: document 17308 the 'enc' command. 17309 17310 *Steve Henson* 17311 17312 * Add the possibility to add extra information to the memory leak 17313 detecting output, to form tracebacks, showing from where each 17314 allocation was originated: CRYPTO_push_info("constant string") adds 17315 the string plus current file name and line number to a per-thread 17316 stack, CRYPTO_pop_info() does the obvious, CRYPTO_remove_all_info() 17317 is like calling CYRPTO_pop_info() until the stack is empty. 17318 Also updated memory leak detection code to be multi-thread-safe. 17319 17320 *Richard Levitte* 17321 17322 * Add options -text and -noout to pkcs7 utility and delete the 17323 encryption options which never did anything. Update docs. 17324 17325 *Steve Henson* 17326 17327 * Add options to some of the utilities to allow the pass phrase 17328 to be included on either the command line (not recommended on 17329 OSes like Unix) or read from the environment. Update the 17330 manpages and fix a few bugs. 17331 17332 *Steve Henson* 17333 17334 * Add a few manpages for some of the openssl commands. 17335 17336 *Steve Henson* 17337 17338 * Fix the -revoke option in ca. It was freeing up memory twice, 17339 leaking and not finding already revoked certificates. 17340 17341 *Steve Henson* 17342 17343 * Extensive changes to support certificate auxiliary information. 17344 This involves the use of X509_CERT_AUX structure and X509_AUX 17345 functions. An X509_AUX function such as PEM_read_X509_AUX() 17346 can still read in a certificate file in the usual way but it 17347 will also read in any additional "auxiliary information". By 17348 doing things this way a fair degree of compatibility can be 17349 retained: existing certificates can have this information added 17350 using the new 'x509' options. 17351 17352 Current auxiliary information includes an "alias" and some trust 17353 settings. The trust settings will ultimately be used in enhanced 17354 certificate chain verification routines: currently a certificate 17355 can only be trusted if it is self signed and then it is trusted 17356 for all purposes. 17357 17358 *Steve Henson* 17359 17360 * Fix assembler for Alpha (tested only on DEC OSF not Linux or `*BSD`). 17361 The problem was that one of the replacement routines had not been working 17362 since SSLeay releases. For now the offending routine has been replaced 17363 with non-optimised assembler. Even so, this now gives around 95% 17364 performance improvement for 1024 bit RSA signs. 17365 17366 *Mark Cox* 17367 17368 * Hack to fix PKCS#7 decryption when used with some unorthodox RC2 17369 handling. Most clients have the effective key size in bits equal to 17370 the key length in bits: so a 40 bit RC2 key uses a 40 bit (5 byte) key. 17371 A few however don't do this and instead use the size of the decrypted key 17372 to determine the RC2 key length and the AlgorithmIdentifier to determine 17373 the effective key length. In this case the effective key length can still 17374 be 40 bits but the key length can be 168 bits for example. This is fixed 17375 by manually forcing an RC2 key into the EVP_PKEY structure because the 17376 EVP code can't currently handle unusual RC2 key sizes: it always assumes 17377 the key length and effective key length are equal. 17378 17379 *Steve Henson* 17380 17381 * Add a bunch of functions that should simplify the creation of 17382 X509_NAME structures. Now you should be able to do: 17383 X509_NAME_add_entry_by_txt(nm, "CN", MBSTRING_ASC, "Steve", -1, -1, 0); 17384 and have it automatically work out the correct field type and fill in 17385 the structures. The more adventurous can try: 17386 X509_NAME_add_entry_by_txt(nm, field, MBSTRING_UTF8, str, -1, -1, 0); 17387 and it will (hopefully) work out the correct multibyte encoding. 17388 17389 *Steve Henson* 17390 17391 * Change the 'req' utility to use the new field handling and multibyte 17392 copy routines. Before the DN field creation was handled in an ad hoc 17393 way in req, ca, and x509 which was rather broken and didn't support 17394 BMPStrings or UTF8Strings. Since some software doesn't implement 17395 BMPStrings or UTF8Strings yet, they can be enabled using the config file 17396 using the dirstring_type option. See the new comment in the default 17397 openssl.cnf for more info. 17398 17399 *Steve Henson* 17400 17401 * Make crypto/rand/md_rand.c more robust: 17402 - Assure unique random numbers after fork(). 17403 - Make sure that concurrent threads access the global counter and 17404 md serializably so that we never lose entropy in them 17405 or use exactly the same state in multiple threads. 17406 Access to the large state is not always serializable because 17407 the additional locking could be a performance killer, and 17408 md should be large enough anyway. 17409 17410 *Bodo Moeller* 17411 17412 * New file `apps/app_rand.c` with commonly needed functionality 17413 for handling the random seed file. 17414 17415 Use the random seed file in some applications that previously did not: 17416 ca, 17417 dsaparam -genkey (which also ignored its '-rand' option), 17418 s_client, 17419 s_server, 17420 x509 (when signing). 17421 Except on systems with /dev/urandom, it is crucial to have a random 17422 seed file at least for key creation, DSA signing, and for DH exchanges; 17423 for RSA signatures we could do without one. 17424 17425 gendh and gendsa (unlike genrsa) used to read only the first byte 17426 of each file listed in the '-rand' option. The function as previously 17427 found in genrsa is now in app_rand.c and is used by all programs 17428 that support '-rand'. 17429 17430 *Bodo Moeller* 17431 17432 * In RAND_write_file, use mode 0600 for creating files; 17433 don't just chmod when it may be too late. 17434 17435 *Bodo Moeller* 17436 17437 * Report an error from X509_STORE_load_locations 17438 when X509_LOOKUP_load_file or X509_LOOKUP_add_dir failed. 17439 17440 *Bill Perry* 17441 17442 * New function ASN1_mbstring_copy() this copies a string in either 17443 ASCII, Unicode, Universal (4 bytes per character) or UTF8 format 17444 into an ASN1_STRING type. A mask of permissible types is passed 17445 and it chooses the "minimal" type to use or an error if not type 17446 is suitable. 17447 17448 *Steve Henson* 17449 17450 * Add function equivalents to the various macros in asn1.h. The old 17451 macros are retained with an `M_` prefix. Code inside the library can 17452 use the `M_` macros. External code (including the openssl utility) 17453 should *NOT* in order to be "shared library friendly". 17454 17455 *Steve Henson* 17456 17457 * Add various functions that can check a certificate's extensions 17458 to see if it usable for various purposes such as SSL client, 17459 server or S/MIME and CAs of these types. This is currently 17460 VERY EXPERIMENTAL but will ultimately be used for certificate chain 17461 verification. Also added a -purpose flag to x509 utility to 17462 print out all the purposes. 17463 17464 *Steve Henson* 17465 17466 * Add a CRYPTO_EX_DATA to X509 certificate structure and associated 17467 functions. 17468 17469 *Steve Henson* 17470 17471 * New `X509V3_{X509,CRL,REVOKED}_get_d2i()` functions. These will search 17472 for, obtain and decode and extension and obtain its critical flag. 17473 This allows all the necessary extension code to be handled in a 17474 single function call. 17475 17476 *Steve Henson* 17477 17478 * RC4 tune-up featuring 30-40% performance improvement on most RISC 17479 platforms. See crypto/rc4/rc4_enc.c for further details. 17480 17481 *Andy Polyakov* 17482 17483 * New -noout option to asn1parse. This causes no output to be produced 17484 its main use is when combined with -strparse and -out to extract data 17485 from a file (which may not be in ASN.1 format). 17486 17487 *Steve Henson* 17488 17489 * Fix for pkcs12 program. It was hashing an invalid certificate pointer 17490 when producing the local key id. 17491 17492 *Richard Levitte <levitte@stacken.kth.se>* 17493 17494 * New option -dhparam in s_server. This allows a DH parameter file to be 17495 stated explicitly. If it is not stated then it tries the first server 17496 certificate file. The previous behaviour hard coded the filename 17497 "server.pem". 17498 17499 *Steve Henson* 17500 17501 * Add -pubin and -pubout options to the rsa and dsa commands. These allow 17502 a public key to be input or output. For example: 17503 openssl rsa -in key.pem -pubout -out pubkey.pem 17504 Also added necessary DSA public key functions to handle this. 17505 17506 *Steve Henson* 17507 17508 * Fix so PKCS7_dataVerify() doesn't crash if no certificates are contained 17509 in the message. This was handled by allowing 17510 X509_find_by_issuer_and_serial() to tolerate a NULL passed to it. 17511 17512 *Steve Henson, reported by Sampo Kellomaki <sampo@mail.neuronio.pt>* 17513 17514 * Fix for bug in d2i_ASN1_bytes(): other ASN1 functions add an extra null 17515 to the end of the strings whereas this didn't. This would cause problems 17516 if strings read with d2i_ASN1_bytes() were later modified. 17517 17518 *Steve Henson, reported by Arne Ansper <arne@ats.cyber.ee>* 17519 17520 * Fix for base64 decode bug. When a base64 bio reads only one line of 17521 data and it contains EOF it will end up returning an error. This is 17522 caused by input 46 bytes long. The cause is due to the way base64 17523 BIOs find the start of base64 encoded data. They do this by trying a 17524 trial decode on each line until they find one that works. When they 17525 do a flag is set and it starts again knowing it can pass all the 17526 data directly through the decoder. Unfortunately it doesn't reset 17527 the context it uses. This means that if EOF is reached an attempt 17528 is made to pass two EOFs through the context and this causes the 17529 resulting error. This can also cause other problems as well. As is 17530 usual with these problems it takes *ages* to find and the fix is 17531 trivial: move one line. 17532 17533 *Steve Henson, reported by ian@uns.ns.ac.yu (Ivan Nejgebauer)* 17534 17535 * Ugly workaround to get s_client and s_server working under Windows. The 17536 old code wouldn't work because it needed to select() on sockets and the 17537 tty (for keypresses and to see if data could be written). Win32 only 17538 supports select() on sockets so we select() with a 1s timeout on the 17539 sockets and then see if any characters are waiting to be read, if none 17540 are present then we retry, we also assume we can always write data to 17541 the tty. This isn't nice because the code then blocks until we've 17542 received a complete line of data and it is effectively polling the 17543 keyboard at 1s intervals: however it's quite a bit better than not 17544 working at all :-) A dedicated Windows application might handle this 17545 with an event loop for example. 17546 17547 *Steve Henson* 17548 17549 * Enhance RSA_METHOD structure. Now there are two extra methods, rsa_sign 17550 and rsa_verify. When the RSA_FLAGS_SIGN_VER option is set these functions 17551 will be called when RSA_sign() and RSA_verify() are used. This is useful 17552 if rsa_pub_dec() and rsa_priv_enc() equivalents are not available. 17553 For this to work properly RSA_public_decrypt() and RSA_private_encrypt() 17554 should *not* be used: RSA_sign() and RSA_verify() must be used instead. 17555 This necessitated the support of an extra signature type NID_md5_sha1 17556 for SSL signatures and modifications to the SSL library to use it instead 17557 of calling RSA_public_decrypt() and RSA_private_encrypt(). 17558 17559 *Steve Henson* 17560 17561 * Add new -verify -CAfile and -CApath options to the crl program, these 17562 will lookup a CRL issuers certificate and verify the signature in a 17563 similar way to the verify program. Tidy up the crl program so it 17564 no longer accesses structures directly. Make the ASN1 CRL parsing a bit 17565 less strict. It will now permit CRL extensions even if it is not 17566 a V2 CRL: this will allow it to tolerate some broken CRLs. 17567 17568 *Steve Henson* 17569 17570 * Initialize all non-automatic variables each time one of the openssl 17571 sub-programs is started (this is necessary as they may be started 17572 multiple times from the "OpenSSL>" prompt). 17573 17574 *Lennart Bang, Bodo Moeller* 17575 17576 * Preliminary compilation option RSA_NULL which disables RSA crypto without 17577 removing all other RSA functionality (this is what NO_RSA does). This 17578 is so (for example) those in the US can disable those operations covered 17579 by the RSA patent while allowing storage and parsing of RSA keys and RSA 17580 key generation. 17581 17582 *Steve Henson* 17583 17584 * Non-copying interface to BIO pairs. 17585 (still largely untested) 17586 17587 *Bodo Moeller* 17588 17589 * New function ASN1_tag2str() to convert an ASN1 tag to a descriptive 17590 ASCII string. This was handled independently in various places before. 17591 17592 *Steve Henson* 17593 17594 * New functions UTF8_getc() and UTF8_putc() that parse and generate 17595 UTF8 strings a character at a time. 17596 17597 *Steve Henson* 17598 17599 * Use client_version from client hello to select the protocol 17600 (s23_srvr.c) and for RSA client key exchange verification 17601 (s3_srvr.c), as required by the SSL 3.0/TLS 1.0 specifications. 17602 17603 *Bodo Moeller* 17604 17605 * Add various utility functions to handle SPKACs, these were previously 17606 handled by poking round in the structure internals. Added new function 17607 NETSCAPE_SPKI_print() to print out SPKAC and a new utility 'spkac' to 17608 print, verify and generate SPKACs. Based on an original idea from 17609 Massimiliano Pala <madwolf@comune.modena.it> but extensively modified. 17610 17611 *Steve Henson* 17612 17613 * RIPEMD160 is operational on all platforms and is back in 'make test'. 17614 17615 *Andy Polyakov* 17616 17617 * Allow the config file extension section to be overwritten on the 17618 command line. Based on an original idea from Massimiliano Pala 17619 <madwolf@comune.modena.it>. The new option is called -extensions 17620 and can be applied to ca, req and x509. Also -reqexts to override 17621 the request extensions in req and -crlexts to override the crl extensions 17622 in ca. 17623 17624 *Steve Henson* 17625 17626 * Add new feature to the SPKAC handling in ca. Now you can include 17627 the same field multiple times by preceding it by "XXXX." for example: 17628 1.OU="Unit name 1" 17629 2.OU="Unit name 2" 17630 this is the same syntax as used in the req config file. 17631 17632 *Steve Henson* 17633 17634 * Allow certificate extensions to be added to certificate requests. These 17635 are specified in a 'req_extensions' option of the req section of the 17636 config file. They can be printed out with the -text option to req but 17637 are otherwise ignored at present. 17638 17639 *Steve Henson* 17640 17641 * Fix a horrible bug in enc_read() in crypto/evp/bio_enc.c: if the first 17642 data read consists of only the final block it would not decrypted because 17643 EVP_CipherUpdate() would correctly report zero bytes had been decrypted. 17644 A misplaced 'break' also meant the decrypted final block might not be 17645 copied until the next read. 17646 17647 *Steve Henson* 17648 17649 * Initial support for DH_METHOD. Again based on RSA_METHOD. Also added 17650 a few extra parameters to the DH structure: these will be useful if 17651 for example we want the value of 'q' or implement X9.42 DH. 17652 17653 *Steve Henson* 17654 17655 * Initial support for DSA_METHOD. This is based on the RSA_METHOD and 17656 provides hooks that allow the default DSA functions or functions on a 17657 "per key" basis to be replaced. This allows hardware acceleration and 17658 hardware key storage to be handled without major modification to the 17659 library. Also added low-level modexp hooks and CRYPTO_EX structure and 17660 associated functions. 17661 17662 *Steve Henson* 17663 17664 * Add a new flag to memory BIOs, BIO_FLAG_MEM_RDONLY. This marks the BIO 17665 as "read only": it can't be written to and the buffer it points to will 17666 not be freed. Reading from a read only BIO is much more efficient than 17667 a normal memory BIO. This was added because there are several times when 17668 an area of memory needs to be read from a BIO. The previous method was 17669 to create a memory BIO and write the data to it, this results in two 17670 copies of the data and an O(n^2) reading algorithm. There is a new 17671 function BIO_new_mem_buf() which creates a read only memory BIO from 17672 an area of memory. Also modified the PKCS#7 routines to use read only 17673 memory BIOs. 17674 17675 *Steve Henson* 17676 17677 * Bugfix: ssl23_get_client_hello did not work properly when called in 17678 state SSL23_ST_SR_CLNT_HELLO_B, i.e. when the first 7 bytes of 17679 a SSLv2-compatible client hello for SSLv3 or TLSv1 could be read, 17680 but a retry condition occurred while trying to read the rest. 17681 17682 *Bodo Moeller* 17683 17684 * The PKCS7_ENC_CONTENT_new() function was setting the content type as 17685 NID_pkcs7_encrypted by default: this was wrong since this should almost 17686 always be NID_pkcs7_data. Also modified the PKCS7_set_type() to handle 17687 the encrypted data type: this is a more sensible place to put it and it 17688 allows the PKCS#12 code to be tidied up that duplicated this 17689 functionality. 17690 17691 *Steve Henson* 17692 17693 * Changed obj_dat.pl script so it takes its input and output files on 17694 the command line. This should avoid shell escape redirection problems 17695 under Win32. 17696 17697 *Steve Henson* 17698 17699 * Initial support for certificate extension requests, these are included 17700 in things like Xenroll certificate requests. Included functions to allow 17701 extensions to be obtained and added. 17702 17703 *Steve Henson* 17704 17705 * -crlf option to s_client and s_server for sending newlines as 17706 CRLF (as required by many protocols). 17707 17708 *Bodo Moeller* 17709 17710### Changes between 0.9.3a and 0.9.4 [09 Aug 1999] 17711 17712 * Install libRSAglue.a when OpenSSL is built with RSAref. 17713 17714 *Ralf S. Engelschall* 17715 17716 * A few more `#ifndef NO_FP_API / #endif` pairs for consistency. 17717 17718 *Andrija Antonijevic <TheAntony2@bigfoot.com>* 17719 17720 * Fix -startdate and -enddate (which was missing) arguments to 'ca' 17721 program. 17722 17723 *Steve Henson* 17724 17725 * New function DSA_dup_DH, which duplicates DSA parameters/keys as 17726 DH parameters/keys (q is lost during that conversion, but the resulting 17727 DH parameters contain its length). 17728 17729 For 1024-bit p, DSA_generate_parameters followed by DSA_dup_DH is 17730 much faster than DH_generate_parameters (which creates parameters 17731 where `p = 2*q + 1`), and also the smaller q makes DH computations 17732 much more efficient (160-bit exponentiation instead of 1024-bit 17733 exponentiation); so this provides a convenient way to support DHE 17734 ciphersuites in SSL/TLS servers (see ssl/ssltest.c). It is of 17735 utter importance to use 17736 SSL_CTX_set_options(s_ctx, SSL_OP_SINGLE_DH_USE); 17737 or 17738 SSL_set_options(s_ctx, SSL_OP_SINGLE_DH_USE); 17739 when such DH parameters are used, because otherwise small subgroup 17740 attacks may become possible! 17741 17742 *Bodo Moeller* 17743 17744 * Avoid memory leak in i2d_DHparams. 17745 17746 *Bodo Moeller* 17747 17748 * Allow the -k option to be used more than once in the enc program: 17749 this allows the same encrypted message to be read by multiple recipients. 17750 17751 *Steve Henson* 17752 17753 * New function OBJ_obj2txt(buf, buf_len, a, no_name), this converts 17754 an ASN1_OBJECT to a text string. If the "no_name" parameter is set then 17755 it will always use the numerical form of the OID, even if it has a short 17756 or long name. 17757 17758 *Steve Henson* 17759 17760 * Added an extra RSA flag: RSA_FLAG_EXT_PKEY. Previously the rsa_mod_exp 17761 method only got called if p,q,dmp1,dmq1,iqmp components were present, 17762 otherwise bn_mod_exp was called. In the case of hardware keys for example 17763 no private key components need be present and it might store extra data 17764 in the RSA structure, which cannot be accessed from bn_mod_exp. 17765 By setting RSA_FLAG_EXT_PKEY rsa_mod_exp will always be called for 17766 private key operations. 17767 17768 *Steve Henson* 17769 17770 * Added support for SPARC Linux. 17771 17772 *Andy Polyakov* 17773 17774 * pem_password_cb function type incompatibly changed from 17775 typedef int pem_password_cb(char *buf, int size, int rwflag); 17776 to 17777 ....(char *buf, int size, int rwflag, void *userdata); 17778 so that applications can pass data to their callbacks: 17779 The `PEM[_ASN1]_{read,write}...` functions and macros now take an 17780 additional void * argument, which is just handed through whenever 17781 the password callback is called. 17782 17783 *Damien Miller <dmiller@ilogic.com.au>; tiny changes by Bodo Moeller* 17784 17785 New function SSL_CTX_set_default_passwd_cb_userdata. 17786 17787 Compatibility note: As many C implementations push function arguments 17788 onto the stack in reverse order, the new library version is likely to 17789 interoperate with programs that have been compiled with the old 17790 pem_password_cb definition (PEM_whatever takes some data that 17791 happens to be on the stack as its last argument, and the callback 17792 just ignores this garbage); but there is no guarantee whatsoever that 17793 this will work. 17794 17795 * The -DPLATFORM="\"$(PLATFORM)\"" definition and the similar -DCFLAGS=... 17796 (both in crypto/Makefile.ssl for use by crypto/cversion.c) caused 17797 problems not only on Windows, but also on some Unix platforms. 17798 To avoid problematic command lines, these definitions are now in an 17799 auto-generated file crypto/buildinf.h (created by crypto/Makefile.ssl 17800 for standard "make" builds, by util/mk1mf.pl for "mk1mf" builds). 17801 17802 *Bodo Moeller* 17803 17804 * MIPS III/IV assembler module is reimplemented. 17805 17806 *Andy Polyakov* 17807 17808 * More DES library cleanups: remove references to srand/rand and 17809 delete an unused file. 17810 17811 *Ulf Möller* 17812 17813 * Add support for the free Netwide assembler (NASM) under Win32, 17814 since not many people have MASM (ml) and it can be hard to obtain. 17815 This is currently experimental but it seems to work OK and pass all 17816 the tests. Check out INSTALL.W32 for info. 17817 17818 *Steve Henson* 17819 17820 * Fix memory leaks in s3_clnt.c: All non-anonymous SSL3/TLS1 connections 17821 without temporary keys kept an extra copy of the server key, 17822 and connections with temporary keys did not free everything in case 17823 of an error. 17824 17825 *Bodo Moeller* 17826 17827 * New function RSA_check_key and new openssl rsa option -check 17828 for verifying the consistency of RSA keys. 17829 17830 *Ulf Moeller, Bodo Moeller* 17831 17832 * Various changes to make Win32 compile work: 17833 1. Casts to avoid "loss of data" warnings in p5_crpt2.c 17834 2. Change unsigned int to int in b_dump.c to avoid "signed/unsigned 17835 comparison" warnings. 17836 3. Add `sk_<TYPE>_sort` to DEF file generator and do make update. 17837 17838 *Steve Henson* 17839 17840 * Add a debugging option to PKCS#5 v2 key generation function: when 17841 you #define DEBUG_PKCS5V2 passwords, salts, iteration counts and 17842 derived keys are printed to stderr. 17843 17844 *Steve Henson* 17845 17846 * Copy the flags in ASN1_STRING_dup(). 17847 17848 *Roman E. Pavlov <pre@mo.msk.ru>* 17849 17850 * The x509 application mishandled signing requests containing DSA 17851 keys when the signing key was also DSA and the parameters didn't match. 17852 17853 It was supposed to omit the parameters when they matched the signing key: 17854 the verifying software was then supposed to automatically use the CA's 17855 parameters if they were absent from the end user certificate. 17856 17857 Omitting parameters is no longer recommended. The test was also 17858 the wrong way round! This was probably due to unusual behaviour in 17859 EVP_cmp_parameters() which returns 1 if the parameters match. 17860 This meant that parameters were omitted when they *didn't* match and 17861 the certificate was useless. Certificates signed with 'ca' didn't have 17862 this bug. 17863 17864 *Steve Henson, reported by Doug Erickson <Doug.Erickson@Part.NET>* 17865 17866 * Memory leak checking (-DCRYPTO_MDEBUG) had some problems. 17867 The interface is as follows: 17868 Applications can use 17869 CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ON) aka MemCheck_start(), 17870 CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_OFF) aka MemCheck_stop(); 17871 "off" is now the default. 17872 The library internally uses 17873 CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_DISABLE) aka MemCheck_off(), 17874 CRYPTO_mem_ctrl(CRYPTO_MEM_CHECK_ENABLE) aka MemCheck_on() 17875 to disable memory-checking temporarily. 17876 17877 Some inconsistent states that previously were possible (and were 17878 even the default) are now avoided. 17879 17880 -DCRYPTO_MDEBUG_TIME is new and additionally stores the current time 17881 with each memory chunk allocated; this is occasionally more helpful 17882 than just having a counter. 17883 17884 -DCRYPTO_MDEBUG_THREAD is also new and adds the thread ID. 17885 17886 -DCRYPTO_MDEBUG_ALL enables all of the above, plus any future 17887 extensions. 17888 17889 *Bodo Moeller* 17890 17891 * Introduce "mode" for SSL structures (with defaults in SSL_CTX), 17892 which largely parallels "options", but is for changing API behaviour, 17893 whereas "options" are about protocol behaviour. 17894 Initial "mode" flags are: 17895 17896 SSL_MODE_ENABLE_PARTIAL_WRITE Allow SSL_write to report success when 17897 a single record has been written. 17898 SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER Don't insist that SSL_write 17899 retries use the same buffer location. 17900 (But all of the contents must be 17901 copied!) 17902 17903 *Bodo Moeller* 17904 17905 * Bugfix: SSL_set_options ignored its parameter, only SSL_CTX_set_options 17906 worked. 17907 17908 * Fix problems with no-hmac etc. 17909 17910 *Ulf Möller, pointed out by Brian Wellington <bwelling@tislabs.com>* 17911 17912 * New functions RSA_get_default_method(), RSA_set_method() and 17913 RSA_get_method(). These allows replacement of RSA_METHODs without having 17914 to mess around with the internals of an RSA structure. 17915 17916 *Steve Henson* 17917 17918 * Fix memory leaks in DSA_do_sign and DSA_is_prime. 17919 Also really enable memory leak checks in openssl.c and in some 17920 test programs. 17921 17922 *Chad C. Mulligan, Bodo Moeller* 17923 17924 * Fix a bug in d2i_ASN1_INTEGER() and i2d_ASN1_INTEGER() which can mess 17925 up the length of negative integers. This has now been simplified to just 17926 store the length when it is first determined and use it later, rather 17927 than trying to keep track of where data is copied and updating it to 17928 point to the end. 17929 *Steve Henson, reported by Brien Wheeler <bwheeler@authentica-security.com>* 17930 17931 * Add a new function PKCS7_signatureVerify. This allows the verification 17932 of a PKCS#7 signature but with the signing certificate passed to the 17933 function itself. This contrasts with PKCS7_dataVerify which assumes the 17934 certificate is present in the PKCS#7 structure. This isn't always the 17935 case: certificates can be omitted from a PKCS#7 structure and be 17936 distributed by "out of band" means (such as a certificate database). 17937 17938 *Steve Henson* 17939 17940 * Complete the `PEM_*` macros with DECLARE_PEM versions to replace the 17941 function prototypes in pem.h, also change util/mkdef.pl to add the 17942 necessary function names. 17943 17944 *Steve Henson* 17945 17946 * mk1mf.pl (used by Windows builds) did not properly read the 17947 options set by Configure in the top level Makefile, and Configure 17948 was not even able to write more than one option correctly. 17949 Fixed, now "no-idea no-rc5 -DCRYPTO_MDEBUG" etc. works as intended. 17950 17951 *Bodo Moeller* 17952 17953 * New functions CONF_load_bio() and CONF_load_fp() to allow a config 17954 file to be loaded from a BIO or FILE pointer. The BIO version will 17955 for example allow memory BIOs to contain config info. 17956 17957 *Steve Henson* 17958 17959 * New function "CRYPTO_num_locks" that returns CRYPTO_NUM_LOCKS. 17960 Whoever hopes to achieve shared-library compatibility across versions 17961 must use this, not the compile-time macro. 17962 (Exercise 0.9.4: Which is the minimum library version required by 17963 such programs?) 17964 Note: All this applies only to multi-threaded programs, others don't 17965 need locks. 17966 17967 *Bodo Moeller* 17968 17969 * Add missing case to s3_clnt.c state machine -- one of the new SSL tests 17970 through a BIO pair triggered the default case, i.e. 17971 SSLerr(...,SSL_R_UNKNOWN_STATE). 17972 17973 *Bodo Moeller* 17974 17975 * New "BIO pair" concept (crypto/bio/bss_bio.c) so that applications 17976 can use the SSL library even if none of the specific BIOs is 17977 appropriate. 17978 17979 *Bodo Moeller* 17980 17981 * Fix a bug in i2d_DSAPublicKey() which meant it returned the wrong value 17982 for the encoded length. 17983 17984 *Jeon KyoungHo <khjeon@sds.samsung.co.kr>* 17985 17986 * Add initial documentation of the X509V3 functions. 17987 17988 *Steve Henson* 17989 17990 * Add a new pair of functions PEM_write_PKCS8PrivateKey() and 17991 PEM_write_bio_PKCS8PrivateKey() that are equivalent to 17992 PEM_write_PrivateKey() and PEM_write_bio_PrivateKey() but use the more 17993 secure PKCS#8 private key format with a high iteration count. 17994 17995 *Steve Henson* 17996 17997 * Fix determination of Perl interpreter: A perl or perl5 17998 *directory* in $PATH was also accepted as the interpreter. 17999 18000 *Ralf S. Engelschall* 18001 18002 * Fix demos/sign/sign.c: well there wasn't anything strictly speaking 18003 wrong with it but it was very old and did things like calling 18004 PEM_ASN1_read() directly and used MD5 for the hash not to mention some 18005 unusual formatting. 18006 18007 *Steve Henson* 18008 18009 * Fix demos/selfsign.c: it used obsolete and deleted functions, changed 18010 to use the new extension code. 18011 18012 *Steve Henson* 18013 18014 * Implement the PEM_read/PEM_write functions in crypto/pem/pem_all.c 18015 with macros. This should make it easier to change their form, add extra 18016 arguments etc. Fix a few PEM prototypes which didn't have cipher as a 18017 constant. 18018 18019 *Steve Henson* 18020 18021 * Add to configuration table a new entry that can specify an alternative 18022 name for unistd.h (for pre-POSIX systems); we need this for NeXTstep, 18023 according to Mark Crispin <MRC@Panda.COM>. 18024 18025 *Bodo Moeller* 18026 18027 * DES CBC did not update the IV. Weird. 18028 18029 *Ben Laurie* 18030lse 18031 des_cbc_encrypt does not update the IV, but des_ncbc_encrypt does. 18032 Changing the behaviour of the former might break existing programs -- 18033 where IV updating is needed, des_ncbc_encrypt can be used. 18034ndif 18035 18036 * When bntest is run from "make test" it drives bc to check its 18037 calculations, as well as internally checking them. If an internal check 18038 fails, it needs to cause bc to give a non-zero result or make test carries 18039 on without noticing the failure. Fixed. 18040 18041 *Ben Laurie* 18042 18043 * DES library cleanups. 18044 18045 *Ulf Möller* 18046 18047 * Add support for PKCS#5 v2.0 PBE algorithms. This will permit PKCS#8 to be 18048 used with any cipher unlike PKCS#5 v1.5 which can at most handle 64 bit 18049 ciphers. NOTE: although the key derivation function has been verified 18050 against some published test vectors it has not been extensively tested 18051 yet. Added a -v2 "cipher" option to pkcs8 application to allow the use 18052 of v2.0. 18053 18054 *Steve Henson* 18055 18056 * Instead of "mkdir -p", which is not fully portable, use new 18057 Perl script "util/mkdir-p.pl". 18058 18059 *Bodo Moeller* 18060 18061 * Rewrite the way password based encryption (PBE) is handled. It used to 18062 assume that the ASN1 AlgorithmIdentifier parameter was a PBEParameter 18063 structure. This was true for the PKCS#5 v1.5 and PKCS#12 PBE algorithms 18064 but doesn't apply to PKCS#5 v2.0 where it can be something else. Now 18065 the 'parameter' field of the AlgorithmIdentifier is passed to the 18066 underlying key generation function so it must do its own ASN1 parsing. 18067 This has also changed the EVP_PBE_CipherInit() function which now has a 18068 'parameter' argument instead of literal salt and iteration count values 18069 and the function EVP_PBE_ALGOR_CipherInit() has been deleted. 18070 18071 *Steve Henson* 18072 18073 * Support for PKCS#5 v1.5 compatible password based encryption algorithms 18074 and PKCS#8 functionality. New 'pkcs8' application linked to openssl. 18075 Needed to change the PEM_STRING_EVP_PKEY value which was just "PRIVATE 18076 KEY" because this clashed with PKCS#8 unencrypted string. Since this 18077 value was just used as a "magic string" and not used directly its 18078 value doesn't matter. 18079 18080 *Steve Henson* 18081 18082 * Introduce some semblance of const correctness to BN. Shame C doesn't 18083 support mutable. 18084 18085 *Ben Laurie* 18086 18087 * "linux-sparc64" configuration (ultrapenguin). 18088 18089 *Ray Miller <ray.miller@oucs.ox.ac.uk>* 18090 "linux-sparc" configuration. 18091 18092 *Christian Forster <fo@hawo.stw.uni-erlangen.de>* 18093 18094 * config now generates no-xxx options for missing ciphers. 18095 18096 *Ulf Möller* 18097 18098 * Support the EBCDIC character set (work in progress). 18099 File ebcdic.c not yet included because it has a different license. 18100 18101 *Martin Kraemer <Martin.Kraemer@MchP.Siemens.De>* 18102 18103 * Support BS2000/OSD-POSIX. 18104 18105 *Martin Kraemer <Martin.Kraemer@MchP.Siemens.De>* 18106 18107 * Make callbacks for key generation use `void *` instead of `char *`. 18108 18109 *Ben Laurie* 18110 18111 * Make S/MIME samples compile (not yet tested). 18112 18113 *Ben Laurie* 18114 18115 * Additional typesafe stacks. 18116 18117 *Ben Laurie* 18118 18119 * New configuration variants "bsdi-elf-gcc" (BSD/OS 4.x). 18120 18121 *Bodo Moeller* 18122 18123### Changes between 0.9.3 and 0.9.3a [29 May 1999] 18124 18125 * New configuration variant "sco5-gcc". 18126 18127 * Updated some demos. 18128 18129 *Sean O Riordain, Wade Scholine* 18130 18131 * Add missing BIO_free at exit of pkcs12 application. 18132 18133 *Wu Zhigang* 18134 18135 * Fix memory leak in conf.c. 18136 18137 *Steve Henson* 18138 18139 * Updates for Win32 to assembler version of MD5. 18140 18141 *Steve Henson* 18142 18143 * Set #! path to perl in `apps/der_chop` to where we found it 18144 instead of using a fixed path. 18145 18146 *Bodo Moeller* 18147 18148 * SHA library changes for irix64-mips4-cc. 18149 18150 *Andy Polyakov* 18151 18152 * Improvements for VMS support. 18153 18154 *Richard Levitte* 18155 18156### Changes between 0.9.2b and 0.9.3 [24 May 1999] 18157 18158 * Bignum library bug fix. IRIX 6 passes "make test" now! 18159 This also avoids the problems with SC4.2 and unpatched SC5. 18160 18161 *Andy Polyakov <appro@fy.chalmers.se>* 18162 18163 * New functions sk_num, sk_value and sk_set to replace the previous macros. 18164 These are required because of the typesafe stack would otherwise break 18165 existing code. If old code used a structure member which used to be STACK 18166 and is now STACK_OF (for example cert in a PKCS7_SIGNED structure) with 18167 sk_num or sk_value it would produce an error because the num, data members 18168 are not present in STACK_OF. Now it just produces a warning. sk_set 18169 replaces the old method of assigning a value to sk_value 18170 (e.g. sk_value(x, i) = y) which the library used in a few cases. Any code 18171 that does this will no longer work (and should use sk_set instead) but 18172 this could be regarded as a "questionable" behaviour anyway. 18173 18174 *Steve Henson* 18175 18176 * Fix most of the other PKCS#7 bugs. The "experimental" code can now 18177 correctly handle encrypted S/MIME data. 18178 18179 *Steve Henson* 18180 18181 * Change type of various DES function arguments from des_cblock 18182 (which means, in function argument declarations, pointer to char) 18183 to des_cblock * (meaning pointer to array with 8 char elements), 18184 which allows the compiler to do more typechecking; it was like 18185 that back in SSLeay, but with lots of ugly casts. 18186 18187 Introduce new type const_des_cblock. 18188 18189 *Bodo Moeller* 18190 18191 * Reorganise the PKCS#7 library and get rid of some of the more obvious 18192 problems: find RecipientInfo structure that matches recipient certificate 18193 and initialise the ASN1 structures properly based on passed cipher. 18194 18195 *Steve Henson* 18196 18197 * Belatedly make the BN tests actually check the results. 18198 18199 *Ben Laurie* 18200 18201 * Fix the encoding and decoding of negative ASN1 INTEGERS and conversion 18202 to and from BNs: it was completely broken. New compilation option 18203 NEG_PUBKEY_BUG to allow for some broken certificates that encode public 18204 key elements as negative integers. 18205 18206 *Steve Henson* 18207 18208 * Reorganize and speed up MD5. 18209 18210 *Andy Polyakov <appro@fy.chalmers.se>* 18211 18212 * VMS support. 18213 18214 *Richard Levitte <richard@levitte.org>* 18215 18216 * New option -out to asn1parse to allow the parsed structure to be 18217 output to a file. This is most useful when combined with the -strparse 18218 option to examine the output of things like OCTET STRINGS. 18219 18220 *Steve Henson* 18221 18222 * Make SSL library a little more fool-proof by not requiring any longer 18223 that `SSL_set_{accept,connect}_state` be called before 18224 `SSL_{accept,connect}` may be used (`SSL_set_..._state` is omitted 18225 in many applications because usually everything *appeared* to work as 18226 intended anyway -- now it really works as intended). 18227 18228 *Bodo Moeller* 18229 18230 * Move openssl.cnf out of lib/. 18231 18232 *Ulf Möller* 18233 18234 * Fix various things to let OpenSSL even pass "egcc -pipe -O2 -Wall 18235 -Wshadow -Wpointer-arith -Wcast-align -Wmissing-prototypes 18236 -Wmissing-declarations -Wnested-externs -Winline" with EGCS 1.1.2+ 18237 18238 *Ralf S. Engelschall* 18239 18240 * Various fixes to the EVP and PKCS#7 code. It may now be able to 18241 handle PKCS#7 enveloped data properly. 18242 18243 *Sebastian Akerman <sak@parallelconsulting.com>, modified by Steve* 18244 18245 * Create a duplicate of the SSL_CTX's CERT in SSL_new instead of 18246 copying pointers. The cert_st handling is changed by this in 18247 various ways (and thus what used to be known as ctx->default_cert 18248 is now called ctx->cert, since we don't resort to `s->ctx->[default_]cert` 18249 any longer when s->cert does not give us what we need). 18250 ssl_cert_instantiate becomes obsolete by this change. 18251 As soon as we've got the new code right (possibly it already is?), 18252 we have solved a couple of bugs of the earlier code where s->cert 18253 was used as if it could not have been shared with other SSL structures. 18254 18255 Note that using the SSL API in certain dirty ways now will result 18256 in different behaviour than observed with earlier library versions: 18257 Changing settings for an `SSL_CTX *ctx` after having done s = SSL_new(ctx) 18258 does not influence s as it used to. 18259 18260 In order to clean up things more thoroughly, inside SSL_SESSION 18261 we don't use CERT any longer, but a new structure SESS_CERT 18262 that holds per-session data (if available); currently, this is 18263 the peer's certificate chain and, for clients, the server's certificate 18264 and temporary key. CERT holds only those values that can have 18265 meaningful defaults in an SSL_CTX. 18266 18267 *Bodo Moeller* 18268 18269 * New function X509V3_EXT_i2d() to create an X509_EXTENSION structure 18270 from the internal representation. Various PKCS#7 fixes: remove some 18271 evil casts and set the enc_dig_alg field properly based on the signing 18272 key type. 18273 18274 *Steve Henson* 18275 18276 * Allow PKCS#12 password to be set from the command line or the 18277 environment. Let 'ca' get its config file name from the environment 18278 variables "OPENSSL_CONF" or "SSLEAY_CONF" (for consistency with 'req' 18279 and 'x509'). 18280 18281 *Steve Henson* 18282 18283 * Allow certificate policies extension to use an IA5STRING for the 18284 organization field. This is contrary to the PKIX definition but 18285 VeriSign uses it and IE5 only recognises this form. Document 'x509' 18286 extension option. 18287 18288 *Steve Henson* 18289 18290 * Add PEDANTIC compiler flag to allow compilation with gcc -pedantic, 18291 without disallowing inline assembler and the like for non-pedantic builds. 18292 18293 *Ben Laurie* 18294 18295 * Support Borland C++ builder. 18296 18297 *Janez Jere <jj@void.si>, modified by Ulf Möller* 18298 18299 * Support Mingw32. 18300 18301 *Ulf Möller* 18302 18303 * SHA-1 cleanups and performance enhancements. 18304 18305 *Andy Polyakov <appro@fy.chalmers.se>* 18306 18307 * Sparc v8plus assembler for the bignum library. 18308 18309 *Andy Polyakov <appro@fy.chalmers.se>* 18310 18311 * Accept any -xxx and +xxx compiler options in Configure. 18312 18313 *Ulf Möller* 18314 18315 * Update HPUX configuration. 18316 18317 *Anonymous* 18318 18319 * Add missing `sk_<type>_unshift()` function to safestack.h 18320 18321 *Ralf S. Engelschall* 18322 18323 * New function SSL_CTX_use_certificate_chain_file that sets the 18324 "extra_cert"s in addition to the certificate. (This makes sense 18325 only for "PEM" format files, as chains as a whole are not 18326 DER-encoded.) 18327 18328 *Bodo Moeller* 18329 18330 * Support verify_depth from the SSL API. 18331 x509_vfy.c had what can be considered an off-by-one-error: 18332 Its depth (which was not part of the external interface) 18333 was actually counting the number of certificates in a chain; 18334 now it really counts the depth. 18335 18336 *Bodo Moeller* 18337 18338 * Bugfix in crypto/x509/x509_cmp.c: The SSLerr macro was used 18339 instead of X509err, which often resulted in confusing error 18340 messages since the error codes are not globally unique 18341 (e.g. an alleged error in ssl3_accept when a certificate 18342 didn't match the private key). 18343 18344 * New function SSL_CTX_set_session_id_context that allows to set a default 18345 value (so that you don't need SSL_set_session_id_context for each 18346 connection using the SSL_CTX). 18347 18348 *Bodo Moeller* 18349 18350 * OAEP decoding bug fix. 18351 18352 *Ulf Möller* 18353 18354 * Support INSTALL_PREFIX for package builders, as proposed by 18355 David Harris. 18356 18357 *Bodo Moeller* 18358 18359 * New Configure options "threads" and "no-threads". For systems 18360 where the proper compiler options are known (currently Solaris 18361 and Linux), "threads" is the default. 18362 18363 *Bodo Moeller* 18364 18365 * New script util/mklink.pl as a faster substitute for util/mklink.sh. 18366 18367 *Bodo Moeller* 18368 18369 * Install various scripts to $(OPENSSLDIR)/misc, not to 18370 $(INSTALLTOP)/bin -- they shouldn't clutter directories 18371 such as /usr/local/bin. 18372 18373 *Bodo Moeller* 18374 18375 * "make linux-shared" to build shared libraries. 18376 18377 *Niels Poppe <niels@netbox.org>* 18378 18379 * New Configure option `no-<cipher>` (rsa, idea, rc5, ...). 18380 18381 *Ulf Möller* 18382 18383 * Add the PKCS#12 API documentation to openssl.txt. Preliminary support for 18384 extension adding in x509 utility. 18385 18386 *Steve Henson* 18387 18388 * Remove NOPROTO sections and error code comments. 18389 18390 *Ulf Möller* 18391 18392 * Partial rewrite of the DEF file generator to now parse the ANSI 18393 prototypes. 18394 18395 *Steve Henson* 18396 18397 * New Configure options --prefix=DIR and --openssldir=DIR. 18398 18399 *Ulf Möller* 18400 18401 * Complete rewrite of the error code script(s). It is all now handled 18402 by one script at the top level which handles error code gathering, 18403 header rewriting and C source file generation. It should be much better 18404 than the old method: it now uses a modified version of Ulf's parser to 18405 read the ANSI prototypes in all header files (thus the old K&R definitions 18406 aren't needed for error creation any more) and do a better job of 18407 translating function codes into names. The old 'ASN1 error code embedded 18408 in a comment' is no longer necessary and it doesn't use .err files which 18409 have now been deleted. Also the error code call doesn't have to appear all 18410 on one line (which resulted in some large lines...). 18411 18412 *Steve Henson* 18413 18414 * Change #include filenames from `<foo.h>` to `<openssl/foo.h>`. 18415 18416 *Bodo Moeller* 18417 18418 * Change behaviour of ssl2_read when facing length-0 packets: Don't return 18419 0 (which usually indicates a closed connection), but continue reading. 18420 18421 *Bodo Moeller* 18422 18423 * Fix some race conditions. 18424 18425 *Bodo Moeller* 18426 18427 * Add support for CRL distribution points extension. Add Certificate 18428 Policies and CRL distribution points documentation. 18429 18430 *Steve Henson* 18431 18432 * Move the autogenerated header file parts to crypto/opensslconf.h. 18433 18434 *Ulf Möller* 18435 18436 * Fix new 56-bit DES export ciphersuites: they were using 7 bytes instead of 18437 8 of keying material. Merlin has also confirmed interop with this fix 18438 between OpenSSL and Baltimore C/SSL 2.0 and J/SSL 2.0. 18439 18440 *Merlin Hughes <merlin@baltimore.ie>* 18441 18442 * Fix lots of warnings. 18443 18444 *Richard Levitte <levitte@stacken.kth.se>* 18445 18446 * In add_cert_dir() in crypto/x509/by_dir.c, break out of the loop if 18447 the directory spec didn't end with a LIST_SEPARATOR_CHAR. 18448 18449 *Richard Levitte <levitte@stacken.kth.se>* 18450 18451 * Fix problems with sizeof(long) == 8. 18452 18453 *Andy Polyakov <appro@fy.chalmers.se>* 18454 18455 * Change functions to ANSI C. 18456 18457 *Ulf Möller* 18458 18459 * Fix typos in error codes. 18460 18461 *Martin Kraemer <Martin.Kraemer@MchP.Siemens.De>, Ulf Möller* 18462 18463 * Remove defunct assembler files from Configure. 18464 18465 *Ulf Möller* 18466 18467 * SPARC v8 assembler BIGNUM implementation. 18468 18469 *Andy Polyakov <appro@fy.chalmers.se>* 18470 18471 * Support for Certificate Policies extension: both print and set. 18472 Various additions to support the r2i method this uses. 18473 18474 *Steve Henson* 18475 18476 * A lot of constification, and fix a bug in X509_NAME_oneline() that could 18477 return a const string when you are expecting an allocated buffer. 18478 18479 *Ben Laurie* 18480 18481 * Add support for ASN1 types UTF8String and VISIBLESTRING, also the CHOICE 18482 types DirectoryString and DisplayText. 18483 18484 *Steve Henson* 18485 18486 * Add code to allow r2i extensions to access the configuration database, 18487 add an LHASH database driver and add several ctx helper functions. 18488 18489 *Steve Henson* 18490 18491 * Fix an evil bug in bn_expand2() which caused various BN functions to 18492 fail when they extended the size of a BIGNUM. 18493 18494 *Steve Henson* 18495 18496 * Various utility functions to handle SXNet extension. Modify mkdef.pl to 18497 support typesafe stack. 18498 18499 *Steve Henson* 18500 18501 * Fix typo in SSL_[gs]et_options(). 18502 18503 *Nils Frostberg <nils@medcom.se>* 18504 18505 * Delete various functions and files that belonged to the (now obsolete) 18506 old X509V3 handling code. 18507 18508 *Steve Henson* 18509 18510 * New Configure option "rsaref". 18511 18512 *Ulf Möller* 18513 18514 * Don't auto-generate pem.h. 18515 18516 *Bodo Moeller* 18517 18518 * Introduce type-safe ASN.1 SETs. 18519 18520 *Ben Laurie* 18521 18522 * Convert various additional casted stacks to type-safe STACK_OF() variants. 18523 18524 *Ben Laurie, Ralf S. Engelschall, Steve Henson* 18525 18526 * Introduce type-safe STACKs. This will almost certainly break lots of code 18527 that links with OpenSSL (well at least cause lots of warnings), but fear 18528 not: the conversion is trivial, and it eliminates loads of evil casts. A 18529 few STACKed things have been converted already. Feel free to convert more. 18530 In the fullness of time, I'll do away with the STACK type altogether. 18531 18532 *Ben Laurie* 18533 18534 * Add `openssl ca -revoke <certfile>` facility which revokes a certificate 18535 specified in `<certfile>` by updating the entry in the index.txt file. 18536 This way one no longer has to edit the index.txt file manually for 18537 revoking a certificate. The -revoke option does the gory details now. 18538 18539 *Massimiliano Pala <madwolf@openca.org>, Ralf S. Engelschall* 18540 18541 * Fix `openssl crl -noout -text` combination where `-noout` killed the 18542 `-text` option at all and this way the `-noout -text` combination was 18543 inconsistent in `openssl crl` with the friends in `openssl x509|rsa|dsa`. 18544 18545 *Ralf S. Engelschall* 18546 18547 * Make sure a corresponding plain text error message exists for the 18548 X509_V_ERR_CERT_REVOKED/23 error number which can occur when a 18549 verify callback function determined that a certificate was revoked. 18550 18551 *Ralf S. Engelschall* 18552 18553 * Bugfix: In test/testenc, don't test `openssl <cipher>` for 18554 ciphers that were excluded, e.g. by -DNO_IDEA. Also, test 18555 all available ciphers including rc5, which was forgotten until now. 18556 In order to let the testing shell script know which algorithms 18557 are available, a new (up to now undocumented) command 18558 `openssl list-cipher-commands` is used. 18559 18560 *Bodo Moeller* 18561 18562 * Bugfix: s_client occasionally would sleep in select() when 18563 it should have checked SSL_pending() first. 18564 18565 *Bodo Moeller* 18566 18567 * New functions DSA_do_sign and DSA_do_verify to provide access to 18568 the raw DSA values prior to ASN.1 encoding. 18569 18570 *Ulf Möller* 18571 18572 * Tweaks to Configure 18573 18574 *Niels Poppe <niels@netbox.org>* 18575 18576 * Add support for PKCS#5 v2.0 ASN1 PBES2 structures. No other support, 18577 yet... 18578 18579 *Steve Henson* 18580 18581 * New variables $(RANLIB) and $(PERL) in the Makefiles. 18582 18583 *Ulf Möller* 18584 18585 * New config option to avoid instructions that are illegal on the 80386. 18586 The default code is faster, but requires at least a 486. 18587 18588 *Ulf Möller* 18589 18590 * Got rid of old SSL2_CLIENT_VERSION (inconsistently used) and 18591 SSL2_SERVER_VERSION (not used at all) macros, which are now the 18592 same as SSL2_VERSION anyway. 18593 18594 *Bodo Moeller* 18595 18596 * New "-showcerts" option for s_client. 18597 18598 *Bodo Moeller* 18599 18600 * Still more PKCS#12 integration. Add pkcs12 application to openssl 18601 application. Various cleanups and fixes. 18602 18603 *Steve Henson* 18604 18605 * More PKCS#12 integration. Add new pkcs12 directory with Makefile.ssl and 18606 modify error routines to work internally. Add error codes and PBE init 18607 to library startup routines. 18608 18609 *Steve Henson* 18610 18611 * Further PKCS#12 integration. Added password based encryption, PKCS#8 and 18612 packing functions to asn1 and evp. Changed function names and error 18613 codes along the way. 18614 18615 *Steve Henson* 18616 18617 * PKCS12 integration: and so it begins... First of several patches to 18618 slowly integrate PKCS#12 functionality into OpenSSL. Add PKCS#12 18619 objects to objects.h 18620 18621 *Steve Henson* 18622 18623 * Add a new 'indent' option to some X509V3 extension code. Initial ASN1 18624 and display support for Thawte strong extranet extension. 18625 18626 *Steve Henson* 18627 18628 * Add LinuxPPC support. 18629 18630 *Jeff Dubrule <igor@pobox.org>* 18631 18632 * Get rid of redundant BN file bn_mulw.c, and rename bn_div64 to 18633 bn_div_words in alpha.s. 18634 18635 *Hannes Reinecke <H.Reinecke@hw.ac.uk> and Ben Laurie* 18636 18637 * Make sure the RSA OAEP test is skipped under -DRSAref because 18638 OAEP isn't supported when OpenSSL is built with RSAref. 18639 18640 *Ulf Moeller <ulf@fitug.de>* 18641 18642 * Move definitions of IS_SET/IS_SEQUENCE inside crypto/asn1/asn1.h 18643 so they no longer are missing under -DNOPROTO. 18644 18645 *Soren S. Jorvang <soren@t.dk>* 18646 18647### Changes between 0.9.1c and 0.9.2b [22 Mar 1999] 18648 18649 * Make SSL_get_peer_cert_chain() work in servers. Unfortunately, it still 18650 doesn't work when the session is reused. Coming soon! 18651 18652 *Ben Laurie* 18653 18654 * Fix a security hole, that allows sessions to be reused in the wrong 18655 context thus bypassing client cert protection! All software that uses 18656 client certs and session caches in multiple contexts NEEDS PATCHING to 18657 allow session reuse! A fuller solution is in the works. 18658 18659 *Ben Laurie, problem pointed out by Holger Reif, Bodo Moeller (and ???)* 18660 18661 * Some more source tree cleanups (removed obsolete files 18662 crypto/bf/asm/bf586.pl, test/test.txt and crypto/sha/asm/f.s; changed 18663 permission on "config" script to be executable) and a fix for the INSTALL 18664 document. 18665 18666 *Ulf Moeller <ulf@fitug.de>* 18667 18668 * Remove some legacy and erroneous uses of malloc, free instead of 18669 Malloc, Free. 18670 18671 *Lennart Bang <lob@netstream.se>, with minor changes by Steve* 18672 18673 * Make rsa_oaep_test return non-zero on error. 18674 18675 *Ulf Moeller <ulf@fitug.de>* 18676 18677 * Add support for native Solaris shared libraries. Configure 18678 solaris-sparc-sc4-pic, make, then run shlib/solaris-sc4.sh. It'd be nice 18679 if someone would make that last step automatic. 18680 18681 *Matthias Loepfe <Matthias.Loepfe@AdNovum.CH>* 18682 18683 * ctx_size was not built with the right compiler during "make links". Fixed. 18684 18685 *Ben Laurie* 18686 18687 * Change the meaning of 'ALL' in the cipher list. It now means "everything 18688 except NULL ciphers". This means the default cipher list will no longer 18689 enable NULL ciphers. They need to be specifically enabled e.g. with 18690 the string "DEFAULT:eNULL". 18691 18692 *Steve Henson* 18693 18694 * Fix to RSA private encryption routines: if p < q then it would 18695 occasionally produce an invalid result. This will only happen with 18696 externally generated keys because OpenSSL (and SSLeay) ensure p > q. 18697 18698 *Steve Henson* 18699 18700 * Be less restrictive and allow also `perl util/perlpath.pl 18701 /path/to/bin/perl` in addition to `perl util/perlpath.pl /path/to/bin`, 18702 because this way one can also use an interpreter named `perl5` (which is 18703 usually the name of Perl 5.xxx on platforms where an Perl 4.x is still 18704 installed as `perl`). 18705 18706 *Matthias Loepfe <Matthias.Loepfe@adnovum.ch>* 18707 18708 * Let util/clean-depend.pl work also with older Perl 5.00x versions. 18709 18710 *Matthias Loepfe <Matthias.Loepfe@adnovum.ch>* 18711 18712 * Fix Makefile.org so CC,CFLAG etc are passed to 'make links' add 18713 advapi32.lib to Win32 build and change the pem test comparison 18714 to fc.exe (thanks to Ulrich Kroener <kroneru@yahoo.com> for the 18715 suggestion). Fix misplaced ASNI prototypes and declarations in evp.h 18716 and crypto/des/ede_cbcm_enc.c. 18717 18718 *Steve Henson* 18719 18720 * DES quad checksum was broken on big-endian architectures. Fixed. 18721 18722 *Ben Laurie* 18723 18724 * Comment out two functions in bio.h that aren't implemented. Fix up the 18725 Win32 test batch file so it (might) work again. The Win32 test batch file 18726 is horrible: I feel ill.... 18727 18728 *Steve Henson* 18729 18730 * Move various #ifdefs around so NO_SYSLOG, NO_DIRENT etc are now selected 18731 in e_os.h. Audit of header files to check ANSI and non ANSI 18732 sections: 10 functions were absent from non ANSI section and not exported 18733 from Windows DLLs. Fixed up libeay.num for new functions. 18734 18735 *Steve Henson* 18736 18737 * Make `openssl version` output lines consistent. 18738 18739 *Ralf S. Engelschall* 18740 18741 * Fix Win32 symbol export lists for BIO functions: Added 18742 BIO_get_ex_new_index, BIO_get_ex_num, BIO_get_ex_data and BIO_set_ex_data 18743 to ms/libeay{16,32}.def. 18744 18745 *Ralf S. Engelschall* 18746 18747 * Second round of fixing the OpenSSL perl/ stuff. It now at least compiled 18748 fine under Unix and passes some trivial tests I've now added. But the 18749 whole stuff is horribly incomplete, so a README.1ST with a disclaimer was 18750 added to make sure no one expects that this stuff really works in the 18751 OpenSSL 0.9.2 release. Additionally I've started to clean the XS sources 18752 up and fixed a few little bugs and inconsistencies in OpenSSL.{pm,xs} and 18753 openssl_bio.xs. 18754 18755 *Ralf S. Engelschall* 18756 18757 * Fix the generation of two part addresses in perl. 18758 18759 *Kenji Miyake <kenji@miyake.org>, integrated by Ben Laurie* 18760 18761 * Add config entry for Linux on MIPS. 18762 18763 *John Tobey <jtobey@channel1.com>* 18764 18765 * Make links whenever Configure is run, unless we are on Windoze. 18766 18767 *Ben Laurie* 18768 18769 * Permit extensions to be added to CRLs using crl_section in openssl.cnf. 18770 Currently only issuerAltName and AuthorityKeyIdentifier make any sense 18771 in CRLs. 18772 18773 *Steve Henson* 18774 18775 * Add a useful kludge to allow package maintainers to specify compiler and 18776 other platforms details on the command line without having to patch the 18777 Configure script every time: One now can use 18778 `perl Configure <id>:<details>`, 18779 i.e. platform ids are allowed to have details appended 18780 to them (separated by colons). This is treated as there would be a static 18781 pre-configured entry in Configure's %table under key `<id>` with value 18782 `<details>` and `perl Configure <id>` is called. So, when you want to 18783 perform a quick test-compile under FreeBSD 3.1 with pgcc and without 18784 assembler stuff you can use `perl Configure "FreeBSD-elf:pgcc:-O6:::"` 18785 now, which overrides the FreeBSD-elf entry on-the-fly. 18786 18787 *Ralf S. Engelschall* 18788 18789 * Disable new TLS1 ciphersuites by default: they aren't official yet. 18790 18791 *Ben Laurie* 18792 18793 * Allow DSO flags like -fpic, -fPIC, -KPIC etc. to be specified 18794 on the `perl Configure ...` command line. This way one can compile 18795 OpenSSL libraries with Position Independent Code (PIC) which is needed 18796 for linking it into DSOs. 18797 18798 *Ralf S. Engelschall* 18799 18800 * Remarkably, export ciphers were totally broken and no-one had noticed! 18801 Fixed. 18802 18803 *Ben Laurie* 18804 18805 * Cleaned up the LICENSE document: The official contact for any license 18806 questions now is the OpenSSL core team under openssl-core@openssl.org. 18807 And add a paragraph about the dual-license situation to make sure people 18808 recognize that _BOTH_ the OpenSSL license _AND_ the SSLeay license apply 18809 to the OpenSSL toolkit. 18810 18811 *Ralf S. Engelschall* 18812 18813 * General source tree makefile cleanups: Made `making xxx in yyy...` 18814 display consistent in the source tree and replaced `/bin/rm` by `rm`. 18815 Additionally cleaned up the `make links` target: Remove unnecessary 18816 semicolons, subsequent redundant removes, inline point.sh into mklink.sh 18817 to speed processing and no longer clutter the display with confusing 18818 stuff. Instead only the actually done links are displayed. 18819 18820 *Ralf S. Engelschall* 18821 18822 * Permit null encryption ciphersuites, used for authentication only. It used 18823 to be necessary to set the preprocessor define SSL_ALLOW_ENULL to do this. 18824 It is now necessary to set SSL_FORBID_ENULL to prevent the use of null 18825 encryption. 18826 18827 *Ben Laurie* 18828 18829 * Add a bunch of fixes to the PKCS#7 stuff. It used to sometimes reorder 18830 signed attributes when verifying signatures (this would break them), 18831 the detached data encoding was wrong and public keys obtained using 18832 X509_get_pubkey() weren't freed. 18833 18834 *Steve Henson* 18835 18836 * Add text documentation for the BUFFER functions. Also added a work around 18837 to a Win95 console bug. This was triggered by the password read stuff: the 18838 last character typed gets carried over to the next fread(). If you were 18839 generating a new cert request using 'req' for example then the last 18840 character of the passphrase would be CR which would then enter the first 18841 field as blank. 18842 18843 *Steve Henson* 18844 18845 * Added the new 'Includes OpenSSL Cryptography Software' button as 18846 doc/openssl_button.{gif,html} which is similar in style to the old SSLeay 18847 button and can be used by applications based on OpenSSL to show the 18848 relationship to the OpenSSL project. 18849 18850 *Ralf S. Engelschall* 18851 18852 * Remove confusing variables in function signatures in files 18853 ssl/ssl_lib.c and ssl/ssl.h. 18854 18855 *Lennart Bong <lob@kulthea.stacken.kth.se>* 18856 18857 * Don't install bss_file.c under PREFIX/include/ 18858 18859 *Lennart Bong <lob@kulthea.stacken.kth.se>* 18860 18861 * Get the Win32 compile working again. Modify mkdef.pl so it can handle 18862 functions that return function pointers and has support for NT specific 18863 stuff. Fix mk1mf.pl and VC-32.pl to support NT differences also. Various 18864 #ifdef WIN32 and WINNTs sprinkled about the place and some changes from 18865 unsigned to signed types: this was killing the Win32 compile. 18866 18867 *Steve Henson* 18868 18869 * Add new certificate file to stack functions, 18870 SSL_add_dir_cert_subjects_to_stack() and 18871 SSL_add_file_cert_subjects_to_stack(). These largely supplant 18872 SSL_load_client_CA_file(), and can be used to add multiple certs easily 18873 to a stack (usually this is then handed to SSL_CTX_set_client_CA_list()). 18874 This means that Apache-SSL and similar packages don't have to mess around 18875 to add as many CAs as they want to the preferred list. 18876 18877 *Ben Laurie* 18878 18879 * Experiment with doxygen documentation. Currently only partially applied to 18880 ssl/ssl_lib.c. 18881 See <http://www.stack.nl/~dimitri/doxygen/index.html>, and run doxygen with 18882 openssl.doxy as the configuration file. 18883 18884 *Ben Laurie* 18885 18886 * Get rid of remaining C++-style comments which strict C compilers hate. 18887 18888 *Ralf S. Engelschall, pointed out by Carlos Amengual* 18889 18890 * Changed BN_RECURSION in bn_mont.c to BN_RECURSION_MONT so it is not 18891 compiled in by default: it has problems with large keys. 18892 18893 *Steve Henson* 18894 18895 * Add a bunch of SSL_xxx() functions for configuring the temporary RSA and 18896 DH private keys and/or callback functions which directly correspond to 18897 their SSL_CTX_xxx() counterparts but work on a per-connection basis. This 18898 is needed for applications which have to configure certificates on a 18899 per-connection basis (e.g. Apache+mod_ssl) instead of a per-context basis 18900 (e.g. s_server). 18901 For the RSA certificate situation is makes no difference, but 18902 for the DSA certificate situation this fixes the "no shared cipher" 18903 problem where the OpenSSL cipher selection procedure failed because the 18904 temporary keys were not overtaken from the context and the API provided 18905 no way to reconfigure them. 18906 The new functions now let applications reconfigure the stuff and they 18907 are in detail: SSL_need_tmp_RSA, SSL_set_tmp_rsa, SSL_set_tmp_dh, 18908 SSL_set_tmp_rsa_callback and SSL_set_tmp_dh_callback. Additionally a new 18909 non-public-API function ssl_cert_instantiate() is used as a helper 18910 function and also to reduce code redundancy inside ssl_rsa.c. 18911 18912 *Ralf S. Engelschall* 18913 18914 * Move s_server -dcert and -dkey options out of the undocumented feature 18915 area because they are useful for the DSA situation and should be 18916 recognized by the users. 18917 18918 *Ralf S. Engelschall* 18919 18920 * Fix the cipher decision scheme for export ciphers: the export bits are 18921 *not* within SSL_MKEY_MASK or SSL_AUTH_MASK, they are within 18922 SSL_EXP_MASK. So, the original variable has to be used instead of the 18923 already masked variable. 18924 18925 *Richard Levitte <levitte@stacken.kth.se>* 18926 18927 * Fix `port` variable from `int` to `unsigned int` in crypto/bio/b_sock.c 18928 18929 *Richard Levitte <levitte@stacken.kth.se>* 18930 18931 * Change type of another md_len variable in pk7_doit.c:PKCS7_dataFinal() 18932 from `int` to `unsigned int` because it is a length and initialized by 18933 EVP_DigestFinal() which expects an `unsigned int *`. 18934 18935 *Richard Levitte <levitte@stacken.kth.se>* 18936 18937 * Don't hard-code path to Perl interpreter on shebang line of Configure 18938 script. Instead use the usual Shell->Perl transition trick. 18939 18940 *Ralf S. Engelschall* 18941 18942 * Make `openssl x509 -noout -modulus`' functional also for DSA certificates 18943 (in addition to RSA certificates) to match the behaviour of `openssl dsa 18944 -noout -modulus` as it's already the case for `openssl rsa -noout 18945 -modulus`. For RSA the -modulus is the real "modulus" while for DSA 18946 currently the public key is printed (a decision which was already done by 18947 `openssl dsa -modulus` in the past) which serves a similar purpose. 18948 Additionally the NO_RSA no longer completely removes the whole -modulus 18949 option; it now only avoids using the RSA stuff. Same applies to NO_DSA 18950 now, too. 18951 18952 *Ralf S. Engelschall* 18953 18954 * Add Arne Ansper's reliable BIO - this is an encrypted, block-digested 18955 BIO. See the source (crypto/evp/bio_ok.c) for more info. 18956 18957 *Arne Ansper <arne@ats.cyber.ee>* 18958 18959 * Dump the old yucky req code that tried (and failed) to allow raw OIDs 18960 to be added. Now both 'req' and 'ca' can use new objects defined in the 18961 config file. 18962 18963 *Steve Henson* 18964 18965 * Add cool BIO that does syslog (or event log on NT). 18966 18967 *Arne Ansper <arne@ats.cyber.ee>, integrated by Ben Laurie* 18968 18969 * Add support for new TLS ciphersuites, TLS_RSA_EXPORT56_WITH_RC4_56_MD5, 18970 TLS_RSA_EXPORT56_WITH_RC2_CBC_56_MD5 and 18971 TLS_RSA_EXPORT56_WITH_DES_CBC_SHA, as specified in "56-bit Export Cipher 18972 Suites For TLS", draft-ietf-tls-56-bit-ciphersuites-00.txt. 18973 18974 *Ben Laurie* 18975 18976 * Add preliminary config info for new extension code. 18977 18978 *Steve Henson* 18979 18980 * Make RSA_NO_PADDING really use no padding. 18981 18982 *Ulf Moeller <ulf@fitug.de>* 18983 18984 * Generate errors when private/public key check is done. 18985 18986 *Ben Laurie* 18987 18988 * Overhaul for 'crl' utility. New function X509_CRL_print. Partial support 18989 for some CRL extensions and new objects added. 18990 18991 *Steve Henson* 18992 18993 * Really fix the ASN1 IMPLICIT bug this time... Partial support for private 18994 key usage extension and fuller support for authority key id. 18995 18996 *Steve Henson* 18997 18998 * Add OAEP encryption for the OpenSSL crypto library. OAEP is the improved 18999 padding method for RSA, which is recommended for new applications in PKCS 19000 #1 v2.0 (RFC 2437, October 1998). 19001 OAEP (Optimal Asymmetric Encryption Padding) has better theoretical 19002 foundations than the ad-hoc padding used in PKCS #1 v1.5. It is secure 19003 against Bleichbacher's attack on RSA. 19004 *Ulf Moeller <ulf@fitug.de>, reformatted, corrected and integrated by 19005 Ben Laurie* 19006 19007 * Updates to the new SSL compression code 19008 19009 *Eric A. Young, (from changes to C2Net SSLeay, integrated by Mark Cox)* 19010 19011 * Fix so that the version number in the master secret, when passed 19012 via RSA, checks that if TLS was proposed, but we roll back to SSLv3 19013 (because the server will not accept higher), that the version number 19014 is 0x03,0x01, not 0x03,0x00 19015 19016 *Eric A. Young, (from changes to C2Net SSLeay, integrated by Mark Cox)* 19017 19018 * Run extensive memory leak checks on SSL commands. Fixed *lots* of memory 19019 leaks in `ssl/` relating to new `X509_get_pubkey()` behaviour. Also fixes 19020 in `apps/` and an unrelated leak in `crypto/dsa/dsa_vrf.c`. 19021 19022 *Steve Henson* 19023 19024 * Support for RAW extensions where an arbitrary extension can be 19025 created by including its DER encoding. See `apps/openssl.cnf` for 19026 an example. 19027 19028 *Steve Henson* 19029 19030 * Make sure latest Perl versions don't interpret some generated C array 19031 code as Perl array code in the crypto/err/err_genc.pl script. 19032 19033 *Lars Weber <3weber@informatik.uni-hamburg.de>* 19034 19035 * Modify ms/do_ms.bat to not generate assembly language makefiles since 19036 not many people have the assembler. Various Win32 compilation fixes and 19037 update to the INSTALL.W32 file with (hopefully) more accurate Win32 19038 build instructions. 19039 19040 *Steve Henson* 19041 19042 * Modify configure script 'Configure' to automatically create crypto/date.h 19043 file under Win32 and also build pem.h from pem.org. New script 19044 util/mkfiles.pl to create the MINFO file on environments that can't do a 19045 'make files': perl util/mkfiles.pl >MINFO should work. 19046 19047 *Steve Henson* 19048 19049 * Major rework of DES function declarations, in the pursuit of correctness 19050 and purity. As a result, many evil casts evaporated, and some weirdness, 19051 too. You may find this causes warnings in your code. Zapping your evil 19052 casts will probably fix them. Mostly. 19053 19054 *Ben Laurie* 19055 19056 * Fix for a typo in asn1.h. Bug fix to object creation script 19057 obj_dat.pl. It considered a zero in an object definition to mean 19058 "end of object": none of the objects in objects.h have any zeros 19059 so it wasn't spotted. 19060 19061 *Steve Henson, reported by Erwann ABALEA <eabalea@certplus.com>* 19062 19063 * Add support for Triple DES Cipher Block Chaining with Output Feedback 19064 Masking (CBCM). In the absence of test vectors, the best I have been able 19065 to do is check that the decrypt undoes the encrypt, so far. Send me test 19066 vectors if you have them. 19067 19068 *Ben Laurie* 19069 19070 * Correct calculation of key length for export ciphers (too much space was 19071 allocated for null ciphers). This has not been tested! 19072 19073 *Ben Laurie* 19074 19075 * Modifications to the mkdef.pl for Win32 DEF file creation. The usage 19076 message is now correct (it understands "crypto" and "ssl" on its 19077 command line). There is also now an "update" option. This will update 19078 the util/ssleay.num and util/libeay.num files with any new functions. 19079 If you do a: 19080 perl util/mkdef.pl crypto ssl update 19081 it will update them. 19082 19083 *Steve Henson* 19084 19085 * Overhauled the Perl interface: 19086 - ported BN stuff to OpenSSL's different BN library 19087 - made the perl/ source tree CVS-aware 19088 - renamed the package from SSLeay to OpenSSL (the files still contain 19089 their history because I've copied them in the repository) 19090 - removed obsolete files (the test scripts will be replaced 19091 by better Test::Harness variants in the future) 19092 19093 *Ralf S. Engelschall* 19094 19095 * First cut for a very conservative source tree cleanup: 19096 1. merge various obsolete readme texts into doc/ssleay.txt 19097 where we collect the old documents and readme texts. 19098 2. remove the first part of files where I'm already sure that we no 19099 longer need them because of three reasons: either they are just temporary 19100 files which were left by Eric or they are preserved original files where 19101 I've verified that the diff is also available in the CVS via "cvs diff 19102 -rSSLeay_0_8_1b" or they were renamed (as it was definitely the case for 19103 the crypto/md/ stuff). 19104 19105 *Ralf S. Engelschall* 19106 19107 * More extension code. Incomplete support for subject and issuer alt 19108 name, issuer and authority key id. Change the i2v function parameters 19109 and add an extra 'crl' parameter in the X509V3_CTX structure: guess 19110 what that's for :-) Fix to ASN1 macro which messed up 19111 IMPLICIT tag and add f_enum.c which adds a2i, i2a for ENUMERATED. 19112 19113 *Steve Henson* 19114 19115 * Preliminary support for ENUMERATED type. This is largely copied from the 19116 INTEGER code. 19117 19118 *Steve Henson* 19119 19120 * Add new function, EVP_MD_CTX_copy() to replace frequent use of memcpy. 19121 19122 *Eric A. Young, (from changes to C2Net SSLeay, integrated by Mark Cox)* 19123 19124 * Make sure `make rehash` target really finds the `openssl` program. 19125 19126 *Ralf S. Engelschall, Matthias Loepfe <Matthias.Loepfe@adnovum.ch>* 19127 19128 * Squeeze another 7% of speed out of MD5 assembler, at least on a P2. I'd 19129 like to hear about it if this slows down other processors. 19130 19131 *Ben Laurie* 19132 19133 * Add CygWin32 platform information to Configure script. 19134 19135 *Alan Batie <batie@aahz.jf.intel.com>* 19136 19137 * Fixed ms/32all.bat script: `no_asm` -> `no-asm` 19138 19139 *Rainer W. Gerling <gerling@mpg-gv.mpg.de>* 19140 19141 * New program nseq to manipulate netscape certificate sequences 19142 19143 *Steve Henson* 19144 19145 * Modify crl2pkcs7 so it supports multiple -certfile arguments. Fix a 19146 few typos. 19147 19148 *Steve Henson* 19149 19150 * Fixes to BN code. Previously the default was to define BN_RECURSION 19151 but the BN code had some problems that would cause failures when 19152 doing certificate verification and some other functions. 19153 19154 *Eric A. Young, (from changes to C2Net SSLeay, integrated by Mark Cox)* 19155 19156 * Add ASN1 and PEM code to support netscape certificate sequences. 19157 19158 *Steve Henson* 19159 19160 * Add ASN1 and PEM code to support netscape certificate sequences. 19161 19162 *Steve Henson* 19163 19164 * Add several PKIX and private extended key usage OIDs. 19165 19166 *Steve Henson* 19167 19168 * Modify the 'ca' program to handle the new extension code. Modify 19169 openssl.cnf for new extension format, add comments. 19170 19171 *Steve Henson* 19172 19173 * More X509 V3 changes. Fix typo in v3_bitstr.c. Add support to 'req' 19174 and add a sample to openssl.cnf so req -x509 now adds appropriate 19175 CA extensions. 19176 19177 *Steve Henson* 19178 19179 * Continued X509 V3 changes. Add to other makefiles, integrate with the 19180 error code, add initial support to X509_print() and x509 application. 19181 19182 *Steve Henson* 19183 19184 * Takes a deep breath and start adding X509 V3 extension support code. Add 19185 files in crypto/x509v3. Move original stuff to crypto/x509v3/old. All this 19186 stuff is currently isolated and isn't even compiled yet. 19187 19188 *Steve Henson* 19189 19190 * Continuing patches for GeneralizedTime. Fix up certificate and CRL 19191 ASN1 to use ASN1_TIME and modify print routines to use ASN1_TIME_print. 19192 Removed the versions check from X509 routines when loading extensions: 19193 this allows certain broken certificates that don't set the version 19194 properly to be processed. 19195 19196 *Steve Henson* 19197 19198 * Deal with irritating shit to do with dependencies, in YAAHW (Yet Another 19199 Ad Hoc Way) - Makefile.ssls now all contain local dependencies, which 19200 can still be regenerated with "make depend". 19201 19202 *Ben Laurie* 19203 19204 * Spelling mistake in C version of CAST-128. 19205 19206 *Ben Laurie, reported by Jeremy Hylton <jeremy@cnri.reston.va.us>* 19207 19208 * Changes to the error generation code. The perl script err-code.pl 19209 now reads in the old error codes and retains the old numbers, only 19210 adding new ones if necessary. It also only changes the .err files if new 19211 codes are added. The makefiles have been modified to only insert errors 19212 when needed (to avoid needlessly modifying header files). This is done 19213 by only inserting errors if the .err file is newer than the auto generated 19214 C file. To rebuild all the error codes from scratch (the old behaviour) 19215 either modify crypto/Makefile.ssl to pass the -regen flag to err_code.pl 19216 or delete all the .err files. 19217 19218 *Steve Henson* 19219 19220 * CAST-128 was incorrectly implemented for short keys. The C version has 19221 been fixed, but is untested. The assembler versions are also fixed, but 19222 new assembler HAS NOT BEEN GENERATED FOR WIN32 - the Makefile needs fixing 19223 to regenerate it if needed. 19224 *Ben Laurie, reported (with fix for C version) by Jun-ichiro itojun 19225 Hagino <itojun@kame.net>* 19226 19227 * File was opened incorrectly in randfile.c. 19228 19229 *Ulf Möller <ulf@fitug.de>* 19230 19231 * Beginning of support for GeneralizedTime. d2i, i2d, check and print 19232 functions. Also ASN1_TIME suite which is a CHOICE of UTCTime or 19233 GeneralizedTime. ASN1_TIME is the proper type used in certificates et 19234 al: it's just almost always a UTCTime. Note this patch adds new error 19235 codes so do a "make errors" if there are problems. 19236 19237 *Steve Henson* 19238 19239 * Correct Linux 1 recognition in config. 19240 19241 *Ulf Möller <ulf@fitug.de>* 19242 19243 * Remove pointless MD5 hash when using DSA keys in ca. 19244 19245 *Anonymous <nobody@replay.com>* 19246 19247 * Generate an error if given an empty string as a cert directory. Also 19248 generate an error if handed NULL (previously returned 0 to indicate an 19249 error, but didn't set one). 19250 19251 *Ben Laurie, reported by Anonymous <nobody@replay.com>* 19252 19253 * Add prototypes to SSL methods. Make SSL_write's buffer const, at last. 19254 19255 *Ben Laurie* 19256 19257 * Fix the dummy function BN_ref_mod_exp() in rsaref.c to have the correct 19258 parameters. This was causing a warning which killed off the Win32 compile. 19259 19260 *Steve Henson* 19261 19262 * Remove C++ style comments from crypto/bn/bn_local.h. 19263 19264 *Neil Costigan <neil.costigan@celocom.com>* 19265 19266 * The function OBJ_txt2nid was broken. It was supposed to return a nid 19267 based on a text string, looking up short and long names and finally 19268 "dot" format. The "dot" format stuff didn't work. Added new function 19269 OBJ_txt2obj to do the same but return an ASN1_OBJECT and rewrote 19270 OBJ_txt2nid to use it. OBJ_txt2obj can also return objects even if the 19271 OID is not part of the table. 19272 19273 *Steve Henson* 19274 19275 * Add prototypes to X509 lookup/verify methods, fixing a bug in 19276 X509_LOOKUP_by_alias(). 19277 19278 *Ben Laurie* 19279 19280 * Sort openssl functions by name. 19281 19282 *Ben Laurie* 19283 19284 * Get the `gendsa` command working and add it to the `list` command. Remove 19285 encryption from sample DSA keys (in case anyone is interested the password 19286 was "1234"). 19287 19288 *Steve Henson* 19289 19290 * Make *all* `*_free` functions accept a NULL pointer. 19291 19292 *Frans Heymans <fheymans@isaserver.be>* 19293 19294 * If a DH key is generated in s3_srvr.c, don't blow it by trying to use 19295 NULL pointers. 19296 19297 *Anonymous <nobody@replay.com>* 19298 19299 * s_server should send the CAfile as acceptable CAs, not its own cert. 19300 19301 *Bodo Moeller <3moeller@informatik.uni-hamburg.de>* 19302 19303 * Don't blow it for numeric `-newkey` arguments to `apps/req`. 19304 19305 *Bodo Moeller <3moeller@informatik.uni-hamburg.de>* 19306 19307 * Temp key "for export" tests were wrong in s3_srvr.c. 19308 19309 *Anonymous <nobody@replay.com>* 19310 19311 * Add prototype for temp key callback functions 19312 SSL_CTX_set_tmp_{rsa,dh}_callback(). 19313 19314 *Ben Laurie* 19315 19316 * Make DH_free() tolerate being passed a NULL pointer (like RSA_free() and 19317 DSA_free()). Make X509_PUBKEY_set() check for errors in d2i_PublicKey(). 19318 19319 *Steve Henson* 19320 19321 * X509_name_add_entry() freed the wrong thing after an error. 19322 19323 *Arne Ansper <arne@ats.cyber.ee>* 19324 19325 * rsa_eay.c would attempt to free a NULL context. 19326 19327 *Arne Ansper <arne@ats.cyber.ee>* 19328 19329 * BIO_s_socket() had a broken should_retry() on Windoze. 19330 19331 *Arne Ansper <arne@ats.cyber.ee>* 19332 19333 * BIO_f_buffer() didn't pass on BIO_CTRL_FLUSH. 19334 19335 *Arne Ansper <arne@ats.cyber.ee>* 19336 19337 * Make sure the already existing X509_STORE->depth variable is initialized 19338 in X509_STORE_new(), but document the fact that this variable is still 19339 unused in the certificate verification process. 19340 19341 *Ralf S. Engelschall* 19342 19343 * Fix the various library and `apps/` files to free up pkeys obtained from 19344 X509_PUBKEY_get() et al. Also allow x509.c to handle netscape extensions. 19345 19346 *Steve Henson* 19347 19348 * Fix reference counting in X509_PUBKEY_get(). This makes 19349 demos/maurice/example2.c work, amongst others, probably. 19350 19351 *Steve Henson and Ben Laurie* 19352 19353 * First cut of a cleanup for `apps/`. First the `ssleay` program is now named 19354 `openssl` and second, the shortcut symlinks for the `openssl <command>` 19355 are no longer created. This way we have a single and consistent command 19356 line interface `openssl <command>`, similar to `cvs <command>`. 19357 19358 *Ralf S. Engelschall, Paul Sutton and Ben Laurie* 19359 19360 * ca.c: move test for DSA keys inside #ifndef NO_DSA. Make pubkey 19361 BIT STRING wrapper always have zero unused bits. 19362 19363 *Steve Henson* 19364 19365 * Add CA.pl, perl version of CA.sh, add extended key usage OID. 19366 19367 *Steve Henson* 19368 19369 * Make the top-level INSTALL documentation easier to understand. 19370 19371 *Paul Sutton* 19372 19373 * Makefiles updated to exit if an error occurs in a sub-directory 19374 make (including if user presses ^C) [Paul Sutton] 19375 19376 * Make Montgomery context stuff explicit in RSA data structure. 19377 19378 *Ben Laurie* 19379 19380 * Fix build order of pem and err to allow for generated pem.h. 19381 19382 *Ben Laurie* 19383 19384 * Fix renumbering bug in X509_NAME_delete_entry(). 19385 19386 *Ben Laurie* 19387 19388 * Enhanced the err-ins.pl script so it makes the error library number 19389 global and can add a library name. This is needed for external ASN1 and 19390 other error libraries. 19391 19392 *Steve Henson* 19393 19394 * Fixed sk_insert which never worked properly. 19395 19396 *Steve Henson* 19397 19398 * Fix ASN1 macros so they can handle indefinite length constructed 19399 EXPLICIT tags. Some non standard certificates use these: they can now 19400 be read in. 19401 19402 *Steve Henson* 19403 19404 * Merged the various old/obsolete SSLeay documentation files (doc/xxx.doc) 19405 into a single doc/ssleay.txt bundle. This way the information is still 19406 preserved but no longer messes up this directory. Now it's new room for 19407 the new set of documentation files. 19408 19409 *Ralf S. Engelschall* 19410 19411 * SETs were incorrectly DER encoded. This was a major pain, because they 19412 shared code with SEQUENCEs, which aren't coded the same. This means that 19413 almost everything to do with SETs or SEQUENCEs has either changed name or 19414 number of arguments. 19415 19416 *Ben Laurie, based on a partial fix by GP Jayan <gp@nsj.co.jp>* 19417 19418 * Fix test data to work with the above. 19419 19420 *Ben Laurie* 19421 19422 * Fix the RSA header declarations that hid a bug I fixed in 0.9.0b but 19423 was already fixed by Eric for 0.9.1 it seems. 19424 19425 *Ben Laurie - pointed out by Ulf Möller <ulf@fitug.de>* 19426 19427 * Autodetect FreeBSD3. 19428 19429 *Ben Laurie* 19430 19431 * Fix various bugs in Configure. This affects the following platforms: 19432 nextstep 19433 ncr-scde 19434 unixware-2.0 19435 unixware-2.0-pentium 19436 sco5-cc. 19437 19438 *Ben Laurie* 19439 19440 * Eliminate generated files from CVS. Reorder tests to regenerate files 19441 before they are needed. 19442 19443 *Ben Laurie* 19444 19445 * Generate Makefile.ssl from Makefile.org (to keep CVS happy). 19446 19447 *Ben Laurie* 19448 19449### Changes between 0.9.1b and 0.9.1c [23-Dec-1998] 19450 19451 * Added OPENSSL_VERSION_NUMBER to crypto/crypto.h and 19452 changed SSLeay to OpenSSL in version strings. 19453 19454 *Ralf S. Engelschall* 19455 19456 * Some fixups to the top-level documents. 19457 19458 *Paul Sutton* 19459 19460 * Fixed the nasty bug where rsaref.h was not found under compile-time 19461 because the symlink to include/ was missing. 19462 19463 *Ralf S. Engelschall* 19464 19465 * Incorporated the popular no-RSA/DSA-only patches 19466 which allow to compile an RSA-free SSLeay. 19467 19468 *Andrew Cooke / Interrader Ldt., Ralf S. Engelschall* 19469 19470 * Fixed nasty rehash problem under `make -f Makefile.ssl links` 19471 when "ssleay" is still not found. 19472 19473 *Ralf S. Engelschall* 19474 19475 * Added more platforms to Configure: Cray T3E, HPUX 11, 19476 19477 *Ralf S. Engelschall, Beckmann <beckman@acl.lanl.gov>* 19478 19479 * Updated the README file. 19480 19481 *Ralf S. Engelschall* 19482 19483 * Added various .cvsignore files in the CVS repository subdirs 19484 to make a "cvs update" really silent. 19485 19486 *Ralf S. Engelschall* 19487 19488 * Recompiled the error-definition header files and added 19489 missing symbols to the Win32 linker tables. 19490 19491 *Ralf S. Engelschall* 19492 19493 * Cleaned up the top-level documents; 19494 o new files: CHANGES and LICENSE 19495 o merged VERSION, HISTORY* and README* files a CHANGES.SSLeay 19496 o merged COPYRIGHT into LICENSE 19497 o removed obsolete TODO file 19498 o renamed MICROSOFT to INSTALL.W32 19499 19500 *Ralf S. Engelschall* 19501 19502 * Removed dummy files from the 0.9.1b source tree: 19503 crypto/asn1/x crypto/bio/cd crypto/bio/fg crypto/bio/grep crypto/bio/vi 19504 crypto/bn/asm/......add.c crypto/bn/asm/a.out crypto/dsa/f crypto/md5/f 19505 crypto/pem/gmon.out crypto/perlasm/f crypto/pkcs7/build crypto/rsa/f 19506 crypto/sha/asm/f crypto/threads/f ms/zzz ssl/f ssl/f.mak test/f 19507 util/f.mak util/pl/f util/pl/f.mak crypto/bf/bf_locl.old apps/f 19508 19509 *Ralf S. Engelschall* 19510 19511 * Added various platform portability fixes. 19512 19513 *Mark J. Cox* 19514 19515 * The Genesis of the OpenSSL rpject: 19516 We start with the latest (unreleased) SSLeay version 0.9.1b which Eric A. 19517 Young and Tim J. Hudson created while they were working for C2Net until 19518 summer 1998. 19519 19520 *The OpenSSL Project* 19521 19522### Changes between 0.9.0b and 0.9.1b [not released] 19523 19524 * Updated a few CA certificates under certs/ 19525 19526 *Eric A. Young* 19527 19528 * Changed some BIGNUM api stuff. 19529 19530 *Eric A. Young* 19531 19532 * Various platform ports: OpenBSD, Ultrix, IRIX 64bit, NetBSD, 19533 DGUX x86, Linux Alpha, etc. 19534 19535 *Eric A. Young* 19536 19537 * New COMP library [crypto/comp/] for SSL Record Layer Compression: 19538 RLE (dummy implemented) and ZLIB (really implemented when ZLIB is 19539 available). 19540 19541 *Eric A. Young* 19542 19543 * Add -strparse option to asn1pars program which parses nested 19544 binary structures 19545 19546 *Dr Stephen Henson <shenson@bigfoot.com>* 19547 19548 * Added "oid_file" to ssleay.cnf for "ca" and "req" programs. 19549 19550 *Eric A. Young* 19551 19552 * DSA fix for "ca" program. 19553 19554 *Eric A. Young* 19555 19556 * Added "-genkey" option to "dsaparam" program. 19557 19558 *Eric A. Young* 19559 19560 * Added RIPE MD160 (rmd160) message digest. 19561 19562 *Eric A. Young* 19563 19564 * Added -a (all) option to "ssleay version" command. 19565 19566 *Eric A. Young* 19567 19568 * Added PLATFORM define which is the id given to Configure. 19569 19570 *Eric A. Young* 19571 19572 * Added MemCheck_XXXX functions to crypto/mem.c for memory checking. 19573 19574 *Eric A. Young* 19575 19576 * Extended the ASN.1 parser routines. 19577 19578 *Eric A. Young* 19579 19580 * Extended BIO routines to support REUSEADDR, seek, tell, etc. 19581 19582 *Eric A. Young* 19583 19584 * Added a BN_CTX to the BN library. 19585 19586 *Eric A. Young* 19587 19588 * Fixed the weak key values in DES library 19589 19590 *Eric A. Young* 19591 19592 * Changed API in EVP library for cipher aliases. 19593 19594 *Eric A. Young* 19595 19596 * Added support for RC2/64bit cipher. 19597 19598 *Eric A. Young* 19599 19600 * Converted the lhash library to the crypto/mem.c functions. 19601 19602 *Eric A. Young* 19603 19604 * Added more recognized ASN.1 object ids. 19605 19606 *Eric A. Young* 19607 19608 * Added more RSA padding checks for SSL/TLS. 19609 19610 *Eric A. Young* 19611 19612 * Added BIO proxy/filter functionality. 19613 19614 *Eric A. Young* 19615 19616 * Added extra_certs to SSL_CTX which can be used 19617 send extra CA certificates to the client in the CA cert chain sending 19618 process. It can be configured with SSL_CTX_add_extra_chain_cert(). 19619 19620 *Eric A. Young* 19621 19622 * Now Fortezza is denied in the authentication phase because 19623 this is key exchange mechanism is not supported by SSLeay at all. 19624 19625 *Eric A. Young* 19626 19627 * Additional PKCS1 checks. 19628 19629 *Eric A. Young* 19630 19631 * Support the string "TLSv1" for all TLS v1 ciphers. 19632 19633 *Eric A. Young* 19634 19635 * Added function SSL_get_ex_data_X509_STORE_CTX_idx() which gives the 19636 ex_data index of the SSL context in the X509_STORE_CTX ex_data. 19637 19638 *Eric A. Young* 19639 19640 * Fixed a few memory leaks. 19641 19642 *Eric A. Young* 19643 19644 * Fixed various code and comment typos. 19645 19646 *Eric A. Young* 19647 19648 * A minor bug in ssl/s3_clnt.c where there would always be 4 0 19649 bytes sent in the client random. 19650 19651 *Edward Bishop <ebishop@spyglass.com>* 19652 19653<!-- Links --> 19654 19655[CVE-2023-2650]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-2650 19656[CVE-2023-1255]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-1255 19657[CVE-2023-0466]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0466 19658[CVE-2023-0465]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0465 19659[CVE-2023-0464]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0464 19660[CVE-2023-0401]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0401 19661[CVE-2023-0286]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0286 19662[CVE-2023-0217]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0217 19663[CVE-2023-0216]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0216 19664[CVE-2023-0215]: https://www.openssl.org/news/vulnerabilities.html#CVE-2023-0215 19665[CVE-2022-4450]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-4450 19666[CVE-2022-4304]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-4304 19667[CVE-2022-4203]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-4203 19668[CVE-2022-3996]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-3996 19669[CVE-2022-2274]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-2274 19670[CVE-2022-2097]: https://www.openssl.org/news/vulnerabilities.html#CVE-2022-2097 19671[CVE-2020-1971]: https://www.openssl.org/news/vulnerabilities.html#CVE-2020-1971 19672[CVE-2020-1967]: https://www.openssl.org/news/vulnerabilities.html#CVE-2020-1967 19673[CVE-2019-1563]: https://www.openssl.org/news/vulnerabilities.html#CVE-2019-1563 19674[CVE-2019-1559]: https://www.openssl.org/news/vulnerabilities.html#CVE-2019-1559 19675[CVE-2019-1552]: https://www.openssl.org/news/vulnerabilities.html#CVE-2019-1552 19676[CVE-2019-1551]: https://www.openssl.org/news/vulnerabilities.html#CVE-2019-1551 19677[CVE-2019-1549]: https://www.openssl.org/news/vulnerabilities.html#CVE-2019-1549 19678[CVE-2019-1547]: https://www.openssl.org/news/vulnerabilities.html#CVE-2019-1547 19679[CVE-2019-1543]: https://www.openssl.org/news/vulnerabilities.html#CVE-2019-1543 19680[CVE-2018-5407]: https://www.openssl.org/news/vulnerabilities.html#CVE-2018-5407 19681[CVE-2018-0739]: https://www.openssl.org/news/vulnerabilities.html#CVE-2018-0739 19682[CVE-2018-0737]: https://www.openssl.org/news/vulnerabilities.html#CVE-2018-0737 19683[CVE-2018-0735]: https://www.openssl.org/news/vulnerabilities.html#CVE-2018-0735 19684[CVE-2018-0734]: https://www.openssl.org/news/vulnerabilities.html#CVE-2018-0734 19685[CVE-2018-0733]: https://www.openssl.org/news/vulnerabilities.html#CVE-2018-0733 19686[CVE-2018-0732]: https://www.openssl.org/news/vulnerabilities.html#CVE-2018-0732 19687[CVE-2017-3738]: https://www.openssl.org/news/vulnerabilities.html#CVE-2017-3738 19688[CVE-2017-3737]: https://www.openssl.org/news/vulnerabilities.html#CVE-2017-3737 19689[CVE-2017-3736]: https://www.openssl.org/news/vulnerabilities.html#CVE-2017-3736 19690[CVE-2017-3735]: https://www.openssl.org/news/vulnerabilities.html#CVE-2017-3735 19691[CVE-2017-3733]: https://www.openssl.org/news/vulnerabilities.html#CVE-2017-3733 19692[CVE-2017-3732]: https://www.openssl.org/news/vulnerabilities.html#CVE-2017-3732 19693[CVE-2017-3731]: https://www.openssl.org/news/vulnerabilities.html#CVE-2017-3731 19694[CVE-2017-3730]: https://www.openssl.org/news/vulnerabilities.html#CVE-2017-3730 19695[CVE-2016-7055]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-7055 19696[CVE-2016-7054]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-7054 19697[CVE-2016-7053]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-7053 19698[CVE-2016-7052]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-7052 19699[CVE-2016-6309]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-6309 19700[CVE-2016-6308]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-6308 19701[CVE-2016-6307]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-6307 19702[CVE-2016-6306]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-6306 19703[CVE-2016-6305]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-6305 19704[CVE-2016-6304]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-6304 19705[CVE-2016-6303]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-6303 19706[CVE-2016-6302]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-6302 19707[CVE-2016-2183]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-2183 19708[CVE-2016-2182]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-2182 19709[CVE-2016-2181]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-2181 19710[CVE-2016-2180]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-2180 19711[CVE-2016-2179]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-2179 19712[CVE-2016-2178]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-2178 19713[CVE-2016-2177]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-2177 19714[CVE-2016-2176]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-2176 19715[CVE-2016-2109]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-2109 19716[CVE-2016-2107]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-2107 19717[CVE-2016-2106]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-2106 19718[CVE-2016-2105]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-2105 19719[CVE-2016-0800]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-0800 19720[CVE-2016-0799]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-0799 19721[CVE-2016-0798]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-0798 19722[CVE-2016-0797]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-0797 19723[CVE-2016-0705]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-0705 19724[CVE-2016-0702]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-0702 19725[CVE-2016-0701]: https://www.openssl.org/news/vulnerabilities.html#CVE-2016-0701 19726[CVE-2015-3197]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-3197 19727[CVE-2015-3196]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-3196 19728[CVE-2015-3195]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-3195 19729[CVE-2015-3194]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-3194 19730[CVE-2015-3193]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-3193 19731[CVE-2015-1793]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-1793 19732[CVE-2015-1792]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-1792 19733[CVE-2015-1791]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-1791 19734[CVE-2015-1790]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-1790 19735[CVE-2015-1789]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-1789 19736[CVE-2015-1788]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-1788 19737[CVE-2015-1787]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-1787 19738[CVE-2015-0293]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0293 19739[CVE-2015-0291]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0291 19740[CVE-2015-0290]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0290 19741[CVE-2015-0289]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0289 19742[CVE-2015-0288]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0288 19743[CVE-2015-0287]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0287 19744[CVE-2015-0286]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0286 19745[CVE-2015-0285]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0285 19746[CVE-2015-0209]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0209 19747[CVE-2015-0208]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0208 19748[CVE-2015-0207]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0207 19749[CVE-2015-0206]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0206 19750[CVE-2015-0205]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0205 19751[CVE-2015-0204]: https://www.openssl.org/news/vulnerabilities.html#CVE-2015-0204 19752[CVE-2014-8275]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-8275 19753[CVE-2014-5139]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-5139 19754[CVE-2014-3572]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3572 19755[CVE-2014-3571]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3571 19756[CVE-2014-3570]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3570 19757[CVE-2014-3569]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3569 19758[CVE-2014-3568]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3568 19759[CVE-2014-3567]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3567 19760[CVE-2014-3566]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3566 19761[CVE-2014-3513]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3513 19762[CVE-2014-3512]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3512 19763[CVE-2014-3511]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3511 19764[CVE-2014-3510]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3510 19765[CVE-2014-3509]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3509 19766[CVE-2014-3508]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3508 19767[CVE-2014-3507]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3507 19768[CVE-2014-3506]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3506 19769[CVE-2014-3505]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3505 19770[CVE-2014-3470]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-3470 19771[CVE-2014-0224]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-0224 19772[CVE-2014-0221]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-0221 19773[CVE-2014-0195]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-0195 19774[CVE-2014-0160]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-0160 19775[CVE-2014-0076]: https://www.openssl.org/news/vulnerabilities.html#CVE-2014-0076 19776[CVE-2013-6450]: https://www.openssl.org/news/vulnerabilities.html#CVE-2013-6450 19777[CVE-2013-4353]: https://www.openssl.org/news/vulnerabilities.html#CVE-2013-4353 19778[CVE-2013-0169]: https://www.openssl.org/news/vulnerabilities.html#CVE-2013-0169 19779[CVE-2013-0166]: https://www.openssl.org/news/vulnerabilities.html#CVE-2013-0166 19780[CVE-2012-2686]: https://www.openssl.org/news/vulnerabilities.html#CVE-2012-2686 19781[CVE-2012-2333]: https://www.openssl.org/news/vulnerabilities.html#CVE-2012-2333 19782[CVE-2012-2110]: https://www.openssl.org/news/vulnerabilities.html#CVE-2012-2110 19783[CVE-2012-0884]: https://www.openssl.org/news/vulnerabilities.html#CVE-2012-0884 19784[CVE-2012-0050]: https://www.openssl.org/news/vulnerabilities.html#CVE-2012-0050 19785[CVE-2012-0027]: https://www.openssl.org/news/vulnerabilities.html#CVE-2012-0027 19786[CVE-2011-4619]: https://www.openssl.org/news/vulnerabilities.html#CVE-2011-4619 19787[CVE-2011-4577]: https://www.openssl.org/news/vulnerabilities.html#CVE-2011-4577 19788[CVE-2011-4576]: https://www.openssl.org/news/vulnerabilities.html#CVE-2011-4576 19789[CVE-2011-4109]: https://www.openssl.org/news/vulnerabilities.html#CVE-2011-4109 19790[CVE-2011-4108]: https://www.openssl.org/news/vulnerabilities.html#CVE-2011-4108 19791[CVE-2011-3210]: https://www.openssl.org/news/vulnerabilities.html#CVE-2011-3210 19792[CVE-2011-3207]: https://www.openssl.org/news/vulnerabilities.html#CVE-2011-3207 19793[CVE-2011-0014]: https://www.openssl.org/news/vulnerabilities.html#CVE-2011-0014 19794[CVE-2010-4252]: https://www.openssl.org/news/vulnerabilities.html#CVE-2010-4252 19795[CVE-2010-4180]: https://www.openssl.org/news/vulnerabilities.html#CVE-2010-4180 19796[CVE-2010-3864]: https://www.openssl.org/news/vulnerabilities.html#CVE-2010-3864 19797[CVE-2010-1633]: https://www.openssl.org/news/vulnerabilities.html#CVE-2010-1633 19798[CVE-2010-0740]: https://www.openssl.org/news/vulnerabilities.html#CVE-2010-0740 19799[CVE-2010-0433]: https://www.openssl.org/news/vulnerabilities.html#CVE-2010-0433 19800[CVE-2009-4355]: https://www.openssl.org/news/vulnerabilities.html#CVE-2009-4355 19801[CVE-2009-3555]: https://www.openssl.org/news/vulnerabilities.html#CVE-2009-3555 19802[CVE-2009-3245]: https://www.openssl.org/news/vulnerabilities.html#CVE-2009-3245 19803[CVE-2009-1386]: https://www.openssl.org/news/vulnerabilities.html#CVE-2009-1386 19804[CVE-2009-1379]: https://www.openssl.org/news/vulnerabilities.html#CVE-2009-1379 19805[CVE-2009-1378]: https://www.openssl.org/news/vulnerabilities.html#CVE-2009-1378 19806[CVE-2009-1377]: https://www.openssl.org/news/vulnerabilities.html#CVE-2009-1377 19807[CVE-2009-0789]: https://www.openssl.org/news/vulnerabilities.html#CVE-2009-0789 19808[CVE-2009-0591]: https://www.openssl.org/news/vulnerabilities.html#CVE-2009-0591 19809[CVE-2009-0590]: https://www.openssl.org/news/vulnerabilities.html#CVE-2009-0590 19810[CVE-2008-5077]: https://www.openssl.org/news/vulnerabilities.html#CVE-2008-5077 19811[CVE-2008-1678]: https://www.openssl.org/news/vulnerabilities.html#CVE-2008-1678 19812[CVE-2008-1672]: https://www.openssl.org/news/vulnerabilities.html#CVE-2008-1672 19813[CVE-2008-0891]: https://www.openssl.org/news/vulnerabilities.html#CVE-2008-0891 19814[CVE-2007-5135]: https://www.openssl.org/news/vulnerabilities.html#CVE-2007-5135 19815[CVE-2007-4995]: https://www.openssl.org/news/vulnerabilities.html#CVE-2007-4995 19816[CVE-2006-4343]: https://www.openssl.org/news/vulnerabilities.html#CVE-2006-4343 19817[CVE-2006-4339]: https://www.openssl.org/news/vulnerabilities.html#CVE-2006-4339 19818[CVE-2006-3738]: https://www.openssl.org/news/vulnerabilities.html#CVE-2006-3738 19819[CVE-2006-2940]: https://www.openssl.org/news/vulnerabilities.html#CVE-2006-2940 19820[CVE-2006-2937]: https://www.openssl.org/news/vulnerabilities.html#CVE-2006-2937 19821[CVE-2005-2969]: https://www.openssl.org/news/vulnerabilities.html#CVE-2005-2969 19822[CVE-2004-0112]: https://www.openssl.org/news/vulnerabilities.html#CVE-2004-0112 19823[CVE-2004-0079]: https://www.openssl.org/news/vulnerabilities.html#CVE-2004-0079 19824[CVE-2003-0851]: https://www.openssl.org/news/vulnerabilities.html#CVE-2003-0851 19825[CVE-2003-0545]: https://www.openssl.org/news/vulnerabilities.html#CVE-2003-0545 19826[CVE-2003-0544]: https://www.openssl.org/news/vulnerabilities.html#CVE-2003-0544 19827[CVE-2003-0543]: https://www.openssl.org/news/vulnerabilities.html#CVE-2003-0543 19828[CVE-2003-0078]: https://www.openssl.org/news/vulnerabilities.html#CVE-2003-0078 19829[CVE-2002-0659]: https://www.openssl.org/news/vulnerabilities.html#CVE-2002-0659 19830[CVE-2002-0657]: https://www.openssl.org/news/vulnerabilities.html#CVE-2002-0657 19831[CVE-2002-0656]: https://www.openssl.org/news/vulnerabilities.html#CVE-2002-0656 19832[CVE-2002-0655]: https://www.openssl.org/news/vulnerabilities.html#CVE-2002-0655 19833