⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 changes

📁 mediastreamer2是开源的网络传输媒体流的库
💻
📖 第 1 页 / 共 5 页
字号:
  *) Add support for ECC-based ciphersuites from draft-ietf-tls-ecc-01.txt.     As these are not official, they are not included in "ALL";     the "ECCdraft" ciphersuite group alias can be used to select them.     [Vipul Gupta and Sumit Gupta (Sun Microsystems Laboratories)]  *) Add ECDH engine support.     [Nils Gura and Douglas Stebila (Sun Microsystems Laboratories)]  *) Add ECDH in new directory crypto/ecdh/.     [Douglas Stebila (Sun Microsystems Laboratories)]  *) Let BN_rand_range() abort with an error after 100 iterations     without success (which indicates a broken PRNG).     [Bodo Moeller]  *) Change BN_mod_sqrt() so that it verifies that the input value     is really the square of the return value.  (Previously,     BN_mod_sqrt would show GIGO behaviour.)     [Bodo Moeller]  *) Add named elliptic curves over binary fields from X9.62, SECG,     and WAP/WTLS; add OIDs that were still missing.     [Sheueling Chang Shantz and Douglas Stebila     (Sun Microsystems Laboratories)]  *) Extend the EC library for elliptic curves over binary fields     (new files ec2_smpl.c, ec2_smpt.c, ec2_mult.c in crypto/ec/).     New EC_METHOD:          EC_GF2m_simple_method     New API functions:          EC_GROUP_new_curve_GF2m          EC_GROUP_set_curve_GF2m          EC_GROUP_get_curve_GF2m          EC_POINT_set_affine_coordinates_GF2m          EC_POINT_get_affine_coordinates_GF2m          EC_POINT_set_compressed_coordinates_GF2m     Point compression for binary fields is disabled by default for     patent reasons (compile with OPENSSL_EC_BIN_PT_COMP defined to     enable it).     As binary polynomials are represented as BIGNUMs, various members     of the EC_GROUP and EC_POINT data structures can be shared     between the implementations for prime fields and binary fields;     the above ..._GF2m functions (except for EX_GROUP_new_curve_GF2m)     are essentially identical to their ..._GFp counterparts.     (For simplicity, the '..._GFp' prefix has been dropped from     various internal method names.)     An internal 'field_div' method (similar to 'field_mul' and     'field_sqr') has been added; this is used only for binary fields.     [Sheueling Chang Shantz and Douglas Stebila     (Sun Microsystems Laboratories)]  *) Optionally dispatch EC_POINT_mul(), EC_POINT_precompute_mult()     through methods ('mul', 'precompute_mult').     The generic implementations (now internally called 'ec_wNAF_mul'     and 'ec_wNAF_precomputed_mult') remain the default if these     methods are undefined.     [Sheueling Chang Shantz and Douglas Stebila     (Sun Microsystems Laboratories)]  *) New function EC_GROUP_get_degree, which is defined through     EC_METHOD.  For curves over prime fields, this returns the bit     length of the modulus.     [Sheueling Chang Shantz and Douglas Stebila     (Sun Microsystems Laboratories)]  *) New functions EC_GROUP_dup, EC_POINT_dup.     (These simply call ..._new  and ..._copy).     [Sheueling Chang Shantz and Douglas Stebila     (Sun Microsystems Laboratories)]  *) Add binary polynomial arithmetic software in crypto/bn/bn_gf2m.c.     Polynomials are represented as BIGNUMs (where the sign bit is not     used) in the following functions [macros]:            BN_GF2m_add          BN_GF2m_sub             [= BN_GF2m_add]          BN_GF2m_mod             [wrapper for BN_GF2m_mod_arr]          BN_GF2m_mod_mul         [wrapper for BN_GF2m_mod_mul_arr]          BN_GF2m_mod_sqr         [wrapper for BN_GF2m_mod_sqr_arr]          BN_GF2m_mod_inv          BN_GF2m_mod_exp         [wrapper for BN_GF2m_mod_exp_arr]          BN_GF2m_mod_sqrt        [wrapper for BN_GF2m_mod_sqrt_arr]          BN_GF2m_mod_solve_quad  [wrapper for BN_GF2m_mod_solve_quad_arr]          BN_GF2m_cmp             [= BN_ucmp]     (Note that only the 'mod' functions are actually for fields GF(2^m).     BN_GF2m_add() is misnomer, but this is for the sake of consistency.)     For some functions, an the irreducible polynomial defining a     field can be given as an 'unsigned int[]' with strictly     decreasing elements giving the indices of those bits that are set;     i.e., p[] represents the polynomial          f(t) = t^p[0] + t^p[1] + ... + t^p[k]     where          p[0] > p[1] > ... > p[k] = 0.     This applies to the following functions:          BN_GF2m_mod_arr          BN_GF2m_mod_mul_arr          BN_GF2m_mod_sqr_arr          BN_GF2m_mod_inv_arr        [wrapper for BN_GF2m_mod_inv]          BN_GF2m_mod_div_arr        [wrapper for BN_GF2m_mod_div]          BN_GF2m_mod_exp_arr          BN_GF2m_mod_sqrt_arr          BN_GF2m_mod_solve_quad_arr          BN_GF2m_poly2arr          BN_GF2m_arr2poly     Conversion can be performed by the following functions:          BN_GF2m_poly2arr          BN_GF2m_arr2poly     bntest.c has additional tests for binary polynomial arithmetic.     Two implementations for BN_GF2m_mod_div() are available.     The default algorithm simply uses BN_GF2m_mod_inv() and     BN_GF2m_mod_mul().  The alternative algorithm is compiled in only     if OPENSSL_SUN_GF2M_DIV is defined (patent pending; read the     copyright notice in crypto/bn/bn_gf2m.c before enabling it).     [Sheueling Chang Shantz and Douglas Stebila     (Sun Microsystems Laboratories)]  *) Add new error code 'ERR_R_DISABLED' that can be used when some     functionality is disabled at compile-time.     [Douglas Stebila <douglas.stebila@sun.com>]  *) Change default behaviour of 'openssl asn1parse' so that more     information is visible when viewing, e.g., a certificate:     Modify asn1_parse2 (crypto/asn1/asn1_par.c) so that in non-'dump'     mode the content of non-printable OCTET STRINGs is output in a     style similar to INTEGERs, but with '[HEX DUMP]' prepended to     avoid the appearance of a printable string.     [Nils Larsch <nla@trustcenter.de>]  *) Add 'asn1_flag' and 'asn1_form' member to EC_GROUP with access     functions          EC_GROUP_set_asn1_flag()          EC_GROUP_get_asn1_flag()          EC_GROUP_set_point_conversion_form()          EC_GROUP_get_point_conversion_form()     These control ASN1 encoding details:     - Curves (i.e., groups) are encoded explicitly unless asn1_flag       has been set to OPENSSL_EC_NAMED_CURVE.     - Points are encoded in uncompressed form by default; options for       asn1_for are as for point2oct, namely          POINT_CONVERSION_COMPRESSED          POINT_CONVERSION_UNCOMPRESSED          POINT_CONVERSION_HYBRID     Also add 'seed' and 'seed_len' members to EC_GROUP with access     functions          EC_GROUP_set_seed()          EC_GROUP_get0_seed()          EC_GROUP_get_seed_len()     This is used only for ASN1 purposes (so far).     [Nils Larsch <nla@trustcenter.de>]  *) Add 'field_type' member to EC_METHOD, which holds the NID     of the appropriate field type OID.  The new function     EC_METHOD_get_field_type() returns this value.     [Nils Larsch <nla@trustcenter.de>]  *) Add functions           EC_POINT_point2bn()          EC_POINT_bn2point()          EC_POINT_point2hex()          EC_POINT_hex2point()     providing useful interfaces to EC_POINT_point2oct() and     EC_POINT_oct2point().     [Nils Larsch <nla@trustcenter.de>]  *) Change internals of the EC library so that the functions          EC_GROUP_set_generator()          EC_GROUP_get_generator()          EC_GROUP_get_order()          EC_GROUP_get_cofactor()     are implemented directly in crypto/ec/ec_lib.c and not dispatched     to methods, which would lead to unnecessary code duplication when     adding different types of curves.     [Nils Larsch <nla@trustcenter.de> with input by Bodo Moeller]  *) Implement compute_wNAF (crypto/ec/ec_mult.c) without BIGNUM     arithmetic, and such that modified wNAFs are generated     (which avoid length expansion in many cases).     [Bodo Moeller]  *) Add a function EC_GROUP_check_discriminant() (defined via     EC_METHOD) that verifies that the curve discriminant is non-zero.     Add a function EC_GROUP_check() that makes some sanity tests     on a EC_GROUP, its generator and order.  This includes     EC_GROUP_check_discriminant().     [Nils Larsch <nla@trustcenter.de>]  *) Add ECDSA in new directory crypto/ecdsa/.     Add applications 'openssl ecparam' and 'openssl ecdsa'     (these are based on 'openssl dsaparam' and 'openssl dsa').     ECDSA support is also included in various other files across the     library.  Most notably,     - 'openssl req' now has a '-newkey ecdsa:file' option;     - EVP_PKCS82PKEY (crypto/evp/evp_pkey.c) now can handle ECDSA;     - X509_PUBKEY_get (crypto/asn1/x_pubkey.c) and       d2i_PublicKey (crypto/asn1/d2i_pu.c) have been modified to make       them suitable for ECDSA where domain parameters must be       extracted before the specific public key;     - ECDSA engine support has been added.     [Nils Larsch <nla@trustcenter.de>]  *) Include some named elliptic curves, and add OIDs from X9.62,     SECG, and WAP/WTLS.  Each curve can be obtained from the new     function          EC_GROUP_new_by_curve_name(),     and the list of available named curves can be obtained with          EC_get_builtin_curves().     Also add a 'curve_name' member to EC_GROUP objects, which can be     accessed via         EC_GROUP_set_curve_name()         EC_GROUP_get_curve_name()     [Nils Larsch <larsch@trustcenter.de, Bodo Moeller]   *) Remove a few calls to bn_wexpand() in BN_sqr() (the one in there     was actually never needed) and in BN_mul().  The removal in BN_mul()     required a small change in bn_mul_part_recursive() and the addition     of the functions bn_cmp_part_words(), bn_sub_part_words() and     bn_add_part_words(), which do the same thing as bn_cmp_words(),     bn_sub_words() and bn_add_words() except they take arrays with     differing sizes.     [Richard Levitte] Changes between 0.9.7g and 0.9.7h  [11 Oct 2005]  *) Remove the functionality of SSL_OP_MSIE_SSLV2_RSA_PADDING     (part of SSL_OP_ALL).  This option used to disable the     countermeasure against man-in-the-middle protocol-version     rollback in the SSL 2.0 server implementation, which is a bad     idea.     [Bodo Moeller; problem pointed out by Yutaka Oiwa (Research Center     for Information Security, National Institute of Advanced Industrial     Science and Technology [AIST], Japan)]  *) Minimal support for X9.31 signatures and PSS padding modes. This is     mainly for FIPS compliance and not fully integrated at this stage.     [Steve Henson]  *) For DSA signing, unless DSA_FLAG_NO_EXP_CONSTTIME is set, perform     the exponentiation using a fixed-length exponent.  (Otherwise,     the information leaked through timing could expose the secret key     after many signatures; cf. Bleichenbacher's attack on DSA with     biased k.)     [Bodo Moeller]  *) Make a new fixed-window mod_exp implementation the default for     RSA, DSA, and DH private-key operations so that the sequence of     squares and multiplies and the memory access pattern are     independent of the particular secret key.  This will mitigate     cache-timing and potential related attacks.     BN_mod_exp_mont_consttime() is the new exponentiation implementation,     and this is automatically used by BN_mod_exp_mont() if the new flag     BN_FLG_EXP_CONSTTIME is set for the exponent.  RSA, DSA, and DH     will use this BN flag for private exponents unless the flag     RSA_FLAG_NO_EXP_CONSTTIME, DSA_FLAG_NO_EXP_CONSTTIME, or     DH_FLAG_NO_EXP_CONSTTIME, respectively, is set.     [Matthew D Wood (Intel Corp), with some changes by Bodo Moeller]  *) Change the client implementation for SSLv23_method() and     SSLv23_client_method() so that is uses the SSL 3.0/TLS 1.0     Client Hello message format if the SSL_OP_NO_SSLv2 option is set.     (Previously, the SSL 2.0 backwards compatible Client Hello     message format would be used even with SSL_OP_NO_SSLv2.)     [Bodo Moeller]  *) Add support for smime-type MIME parameter in S/MIME messages which some     clients need.     [Steve Henson]  *) New function BN_MONT_CTX_set_locked() to set montgomery parameters in     a threadsafe manner. Modify rsa code to use new function and add calls     to dsa and dh code (which had race conditions before).     [Steve Henson]  *) Include the fixed error library code in the C error file definitions     instead of fixing them up at runtime. This keeps the error code     structures constant.     [Steve Henson] Changes between 0.9.7f and 0.9.7g  [11 Apr 2005]

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -