⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 changes

📁 mediastreamer2是开源的网络传输媒体流的库
💻
📖 第 1 页 / 共 5 页
字号:
 OpenSSL CHANGES _______________ Changes between 0.9.8 and 0.9.8a  [11 Oct 2005]  *) Remove the functionality of SSL_OP_MSIE_SSLV2_RSA_PADDING     (part of SSL_OP_ALL).  This option used to disable the     countermeasure against man-in-the-middle protocol-version     rollback in the SSL 2.0 server implementation, which is a bad     idea.  (CAN-2005-2969)     [Bodo Moeller; problem pointed out by Yutaka Oiwa (Research Center     for Information Security, National Institute of Advanced Industrial     Science and Technology [AIST], Japan)]  *) Add two function to clear and return the verify parameter flags.     [Steve Henson]  *) Keep cipherlists sorted in the source instead of sorting them at     runtime, thus removing the need for a lock.     [Nils Larsch]  *) Avoid some small subgroup attacks in Diffie-Hellman.     [Nick Mathewson and Ben Laurie]  *) Add functions for well-known primes.     [Nick Mathewson]  *) Extended Windows CE support.     [Satoshi Nakamura and Andy Polyakov]  *) Initialize SSL_METHOD structures at compile time instead of during     runtime, thus removing the need for a lock.     [Steve Henson]  *) Make PKCS7_decrypt() work even if no certificate is supplied by     attempting to decrypt each encrypted key in turn. Add support to     smime utility.     [Steve Henson] Changes between 0.9.7h and 0.9.8  [05 Jul 2005]  *) Add libcrypto.pc and libssl.pc for those who feel they need them.     [Richard Levitte]  *) Change CA.sh and CA.pl so they don't bundle the CSR and the private     key into the same file any more.     [Richard Levitte]  *) Add initial support for Win64, both IA64 and AMD64/x64 flavors.     [Andy Polyakov]  *) Add -utf8 command line and config file option to 'ca'.     [Stefan <stf@udoma.org]  *) Removed the macro des_crypt(), as it seems to conflict with some     libraries.  Use DES_crypt().     [Richard Levitte]  *) Correct naming of the 'chil' and '4758cca' ENGINEs. This     involves renaming the source and generated shared-libs for     both. The engines will accept the corrected or legacy ids     ('ncipher' and '4758_cca' respectively) when binding. NB,     this only applies when building 'shared'.     [Corinna Vinschen <vinschen@redhat.com> and Geoff Thorpe]  *) Add attribute functions to EVP_PKEY structure. Modify     PKCS12_create() to recognize a CSP name attribute and     use it. Make -CSP option work again in pkcs12 utility.     [Steve Henson]  *) Add new functionality to the bn blinding code:     - automatic re-creation of the BN_BLINDING parameters after       a fixed number of uses (currently 32)     - add new function for parameter creation     - introduce flags to control the update behaviour of the       BN_BLINDING parameters     - hide BN_BLINDING structure     Add a second BN_BLINDING slot to the RSA structure to improve     performance when a single RSA object is shared among several     threads.     [Nils Larsch]  *) Add support for DTLS.     [Nagendra Modadugu <nagendra@cs.stanford.edu> and Ben Laurie]  *) Add support for DER encoded private keys (SSL_FILETYPE_ASN1)     to SSL_CTX_use_PrivateKey_file() and SSL_use_PrivateKey_file()     [Walter Goulet]  *) Remove buggy and incompletet DH cert support from     ssl/ssl_rsa.c and ssl/s3_both.c     [Nils Larsch]  *) Use SHA-1 instead of MD5 as the default digest algorithm for     the apps/openssl applications.     [Nils Larsch]  *) Compile clean with "-Wall -Wmissing-prototypes     -Wstrict-prototypes -Wmissing-declarations -Werror". Currently     DEBUG_SAFESTACK must also be set.     [Ben Laurie]  *) Change ./Configure so that certain algorithms can be disabled by default.     The new counterpiece to "no-xxx" is "enable-xxx".     The patented RC5 and MDC2 algorithms will now be disabled unless     "enable-rc5" and "enable-mdc2", respectively, are specified.     (IDEA remains enabled despite being patented.  This is because IDEA     is frequently required for interoperability, and there is no license     fee for non-commercial use.  As before, "no-idea" can be used to     avoid this algorithm.)     [Bodo Moeller]  *) Add processing of proxy certificates (see RFC 3820).  This work was     sponsored by KTH (The Royal Institute of Technology in Stockholm) and     EGEE (Enabling Grids for E-science in Europe).     [Richard Levitte]  *) RC4 performance overhaul on modern architectures/implementations, such     as Intel P4, IA-64 and AMD64.     [Andy Polyakov]  *) New utility extract-section.pl. This can be used specify an alternative     section number in a pod file instead of having to treat each file as     a separate case in Makefile. This can be done by adding two lines to the     pod file:     =for comment openssl_section:XXX     The blank line is mandatory.     [Steve Henson]  *) New arguments -certform, -keyform and -pass for s_client and s_server     to allow alternative format key and certificate files and passphrase     sources.     [Steve Henson]  *) New structure X509_VERIFY_PARAM which combines current verify parameters,     update associated structures and add various utility functions.     Add new policy related verify parameters, include policy checking in      standard verify code. Enhance 'smime' application with extra parameters     to support policy checking and print out.     [Steve Henson]  *) Add a new engine to support VIA PadLock ACE extensions in the VIA C3     Nehemiah processors. These extensions support AES encryption in hardware     as well as RNG (though RNG support is currently disabled).     [Michal Ludvig <michal@logix.cz>, with help from Andy Polyakov]  *) Deprecate BN_[get|set]_params() functions (they were ignored internally).     [Geoff Thorpe]  *) New FIPS 180-2 algorithms, SHA-224/-256/-384/-512 are implemented.     [Andy Polyakov and a number of other people]  *) Improved PowerPC platform support. Most notably BIGNUM assembler     implementation contributed by IBM.     [Suresh Chari, Peter Waltenberg, Andy Polyakov]  *) The new 'RSA_generate_key_ex' function now takes a BIGNUM for the public     exponent rather than 'unsigned long'. There is a corresponding change to     the new 'rsa_keygen' element of the RSA_METHOD structure.     [Jelte Jansen, Geoff Thorpe]  *) Functionality for creating the initial serial number file is now     moved from CA.pl to the 'ca' utility with a new option -create_serial.     (Before OpenSSL 0.9.7e, CA.pl used to initialize the serial     number file to 1, which is bound to cause problems.  To avoid     the problems while respecting compatibility between different 0.9.7     patchlevels, 0.9.7e  employed 'openssl x509 -next_serial' in     CA.pl for serial number initialization.  With the new release 0.9.8,     we can fix the problem directly in the 'ca' utility.)     [Steve Henson]  *) Reduced header interdepencies by declaring more opaque objects in     ossl_typ.h. As a consequence, including some headers (eg. engine.h) will     give fewer recursive includes, which could break lazy source code - so     this change is covered by the OPENSSL_NO_DEPRECATED symbol. As always,     developers should define this symbol when building and using openssl to     ensure they track the recommended behaviour, interfaces, [etc], but     backwards-compatible behaviour prevails when this isn't defined.     [Geoff Thorpe]  *) New function X509_POLICY_NODE_print() which prints out policy nodes.     [Steve Henson]  *) Add new EVP function EVP_CIPHER_CTX_rand_key and associated functionality.     This will generate a random key of the appropriate length based on the      cipher context. The EVP_CIPHER can provide its own random key generation     routine to support keys of a specific form. This is used in the des and      3des routines to generate a key of the correct parity. Update S/MIME     code to use new functions and hence generate correct parity DES keys.     Add EVP_CHECK_DES_KEY #define to return an error if the key is not      valid (weak or incorrect parity).     [Steve Henson]  *) Add a local set of CRLs that can be used by X509_verify_cert() as well     as looking them up. This is useful when the verified structure may contain     CRLs, for example PKCS#7 signedData. Modify PKCS7_verify() to use any CRLs     present unless the new PKCS7_NO_CRL flag is asserted.     [Steve Henson]  *) Extend ASN1 oid configuration module. It now additionally accepts the     syntax:     shortName = some long name, 1.2.3.4     [Steve Henson]  *) Reimplemented the BN_CTX implementation. There is now no more static     limitation on the number of variables it can handle nor the depth of the     "stack" handling for BN_CTX_start()/BN_CTX_end() pairs. The stack     information can now expand as required, and rather than having a single     static array of bignums, BN_CTX now uses a linked-list of such arrays     allowing it to expand on demand whilst maintaining the usefulness of     BN_CTX's "bundling".     [Geoff Thorpe]  *) Add a missing BN_CTX parameter to the 'rsa_mod_exp' callback in RSA_METHOD     to allow all RSA operations to function using a single BN_CTX.     [Geoff Thorpe]  *) Preliminary support for certificate policy evaluation and checking. This     is initially intended to pass the tests outlined in "Conformance Testing     of Relying Party Client Certificate Path Processing Logic" v1.07.     [Steve Henson]  *) bn_dup_expand() has been deprecated, it was introduced in 0.9.7 and     remained unused and not that useful. A variety of other little bignum     tweaks and fixes have also been made continuing on from the audit (see     below).     [Geoff Thorpe]  *) Constify all or almost all d2i, c2i, s2i and r2i functions, along with     associated ASN1, EVP and SSL functions and old ASN1 macros.     [Richard Levitte]  *) BN_zero() only needs to set 'top' and 'neg' to zero for correct results,     and this should never fail. So the return value from the use of     BN_set_word() (which can fail due to needless expansion) is now deprecated;     if OPENSSL_NO_DEPRECATED is defined, BN_zero() is a void macro.     [Geoff Thorpe]  *) BN_CTX_get() should return zero-valued bignums, providing the same     initialised value as BN_new().     [Geoff Thorpe, suggested by Ulf M鰈ler]  *) Support for inhibitAnyPolicy certificate extension.     [Steve Henson]  *) An audit of the BIGNUM code is underway, for which debugging code is     enabled when BN_DEBUG is defined. This makes stricter enforcements on what     is considered valid when processing BIGNUMs, and causes execution to     assert() when a problem is discovered. If BN_DEBUG_RAND is defined,     further steps are taken to deliberately pollute unused data in BIGNUM     structures to try and expose faulty code further on. For now, openssl will     (in its default mode of operation) continue to tolerate the inconsistent     forms that it has tolerated in the past, but authors and packagers should     consider trying openssl and their own applications when compiled with     these debugging symbols defined. It will help highlight potential bugs in     their own code, and will improve the test coverage for OpenSSL itself. At     some point, these tighter rules will become openssl's default to improve     maintainability, though the assert()s and other overheads will remain only     in debugging configurations. See bn.h for more details.     [Geoff Thorpe, Nils Larsch, Ulf M鰈ler]  *) BN_CTX_init() has been deprecated, as BN_CTX is an opaque structure     that can only be obtained through BN_CTX_new() (which implicitly     initialises it). The presence of this function only made it possible     to overwrite an existing structure (and cause memory leaks).     [Geoff Thorpe]  *) Because of the callback-based approach for implementing LHASH as a     template type, lh_insert() adds opaque objects to hash-tables and     lh_doall() or lh_doall_arg() are typically used with a destructor callback     to clean up those corresponding objects before destroying the hash table     (and losing the object pointers). So some over-zealous constifications in     LHASH have been relaxed so that lh_insert() does not take (nor store) the     objects as "const" and the lh_doall[_arg] callback wrappers are not     prototyped to have "const" restrictions on the object pointers they are     given (and so aren't required to cast them away any more).     [Geoff Thorpe]  *) The tmdiff.h API was so ugly and minimal that our own timing utility     (speed) prefers to use its own implementation. The two implementations     haven't been consolidated as yet (volunteers?) but the tmdiff API has had     its object type properly exposed (MS_TM) instead of casting to/from "char     *". This may still change yet if someone realises MS_TM and "ms_time_***"     aren't necessarily the greatest nomenclatures - but this is what was used     internally to the implementation so I've used that for now.     [Geoff Thorpe]  *) Ensure that deprecated functions do not get compiled when     OPENSSL_NO_DEPRECATED is defined. Some "openssl" subcommands and a few of     the self-tests were still using deprecated key-generation functions so     these have been updated also.     [Geoff Thorpe]  *) Reorganise PKCS#7 code to separate the digest location functionality     into PKCS7_find_digest(), digest addtion into PKCS7_bio_add_digest().     New function PKCS7_set_digest() to set the digest type for PKCS#7

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -