blob: 86dd340cf693994af4e6fb14d67faf6adc34f427 [file] [log] [blame]
Paul Bakker99ed6782011-01-05 14:48:42 +00001PolarSSL ChangeLog
2
Paul Bakker37ca75d2011-01-06 12:28:03 +00003= Version Trunk
4Features
Paul Bakkerb63b0af2011-01-13 17:54:59 +00005Note: Most of these features have been donated by Fox-IT
6 * Added Doxygen source code documentation parts
Paul Bakker1b57b062011-01-06 15:48:19 +00007 * Added reading of DHM context from memory and file
Paul Bakker74111d32011-01-15 16:57:55 +00008 * Improved X509 certificate parsing to include extended
Paul Bakker76fd75a2011-01-16 21:12:10 +00009 certificate fields, including Key Usage
10 * Improved certificate verification and verification
11 against the available CRLs
Paul Bakker1f87fb62011-01-15 17:32:24 +000012 * Detection for DES weak keys and parity bits added
Paul Bakker72f62662011-01-16 21:27:44 +000013 * Improvements to support integration in other
14 applications:
15 + Added generic message digest and cipher wrapper
16 + Improved information about current capabilities,
17 status, objects and configuration
18 + Added verification callback on certificate chain
19 verification to allow external blacklisting
Paul Bakker37ca75d2011-01-06 12:28:03 +000020
Paul Bakker99ed6782011-01-05 14:48:42 +000021= Version 0.14.0 released on 2010-08-16
22Features
23 * Added support for SSL_EDH_RSA_AES_128_SHA and
24 SSL_EDH_RSA_CAMELLIA_128_SHA ciphersuites
25 * Added compile-time and run-time version information
26 * Expanded ssl_client2 arguments for more flexibility
27 * Added support for TLS v1.1
28
29Changes
30 * Made Makefile cleaner
31 * Removed dependency on rand() in rsa_pkcs1_encrypt().
32 Now using random fuction provided to function and
33 changed the prototype of rsa_pkcs1_encrypt(),
34 rsa_init() and rsa_gen_key().
35 * Some SSL defines were renamed in order to avoid
36 future confusion
37
38Bug fixes
39 * Fixed CMake out of source build for tests (found by
40 kkert)
41 * rsa_check_private() now supports PKCS1v2 keys as well
42 * Fixed deadlock in rsa_pkcs1_encrypt() on failing random
43 generator
44
45= Version 0.13.1 released on 2010-03-24
46Bug fixes
47 * Fixed Makefile in library that was mistakenly merged
48 * Added missing const string fixes
49
50= Version 0.13.0 released on 2010-03-21
51Features
52 * Added option parsing for host and port selection to
53 ssl_client2
54 * Added support for GeneralizedTime in X509 parsing
55 * Added cert_app program to allow easy reading and
56 printing of X509 certificates from file or SSL
57 connection.
58
59Changes
60 * Added const correctness for main code base
61 * X509 signature algorithm determination is now
62 in a function to allow easy future expansion
63 * Changed symmetric cipher functions to
64 identical interface (returning int result values)
65 * Changed ARC4 to use seperate input/output buffer
66 * Added reset function for HMAC context as speed-up
67 for specific use-cases
68
69Bug fixes
70 * Fixed bug resulting in failure to send the last
71 certificate in the chain in ssl_write_certificate() and
72 ssl_write_certificate_request() (found by fatbob)
73 * Added small fixes for compiler warnings on a Mac
74 (found by Frank de Brabander)
75 * Fixed algorithmic bug in mpi_is_prime() (found by
76 Smbat Tonoyan)
77
78= Version 0.12.1 released on 2009-10-04
79Changes
80 * Coverage test definitions now support 'depends_on'
81 tagging system.
82 * Tests requiring specific hashing algorithms now honor
83 the defines.
84
85Bug fixes
86 * Changed typo in #ifdef in x509parse.c (found
87 by Eduardo)
88
89= Version 0.12.0 released on 2009-07-28
90Features
91 * Added CMake makefiles as alternative to regular Makefiles.
92 * Added preliminary Code Coverage tests for AES, ARC4,
93 Base64, MPI, SHA-family, MD-family, HMAC-SHA-family,
94 Camellia, DES, 3-DES, RSA PKCS#1, XTEA, Diffie-Hellman
95 and X509parse.
96
97Changes
98 * Error codes are not (necessarily) negative. Keep
99 this is mind when checking for errors.
100 * RSA_RAW renamed to SIG_RSA_RAW for consistency.
101 * Fixed typo in name of POLARSSL_ERR_RSA_OUTPUT_TOO_LARGE.
102 * Changed interface for AES and Camellia setkey functions
103 to indicate invalid key lengths.
104
105Bug fixes
106 * Fixed include location of endian.h on FreeBSD (found by
107 Gabriel)
108 * Fixed include location of endian.h and name clash on
109 Apples (found by Martin van Hensbergen)
110 * Fixed HMAC-MD2 by modifying md2_starts(), so that the
111 required HMAC ipad and opad variables are not cleared.
112 (found by code coverage tests)
113 * Prevented use of long long in bignum if
114 POLARSSL_HAVE_LONGLONG not defined (found by Giles
115 Bathgate).
116 * Fixed incorrect handling of negative strings in
117 mpi_read_string() (found by code coverage tests).
118 * Fixed segfault on handling empty rsa_context in
119 rsa_check_pubkey() and rsa_check_privkey() (found by
120 code coverage tests).
121 * Fixed incorrect handling of one single negative input
122 value in mpi_add_abs() (found by code coverage tests).
123 * Fixed incorrect handling of negative first input
124 value in mpi_sub_abs() (found by code coverage tests).
125 * Fixed incorrect handling of negative first input
126 value in mpi_mod_mpi() and mpi_mod_int(). Resulting
127 change also affects mpi_write_string() (found by code
128 coverage tests).
129 * Corrected is_prime() results for 0, 1 and 2 (found by
130 code coverage tests).
131 * Fixed Camellia and XTEA for 64-bit Windows systems.
132
133= Version 0.11.1 released on 2009-05-17
134 * Fixed missing functionality for SHA-224, SHA-256, SHA384,
135 SHA-512 in rsa_pkcs1_sign()
136
137= Version 0.11.0 released on 2009-05-03
138 * Fixed a bug in mpi_gcd() so that it also works when both
139 input numbers are even and added testcases to check
140 (found by Pierre Habouzit).
141 * Added support for SHA-224, SHA-256, SHA-384 and SHA-512
142 one way hash functions with the PKCS#1 v1.5 signing and
143 verification.
144 * Fixed minor bug regarding mpi_gcd located within the
145 POLARSSL_GENPRIME block.
146 * Fixed minor memory leak in x509parse_crt() and added better
147 handling of 'full' certificate chains (found by Mathias
148 Olsson).
149 * Centralized file opening and reading for x509 files into
150 load_file()
151 * Made definition of net_htons() endian-clean for big endian
152 systems (Found by Gernot).
153 * Undefining POLARSSL_HAVE_ASM now also handles prevents asm in
154 padlock and timing code.
155 * Fixed an off-by-one buffer allocation in ssl_set_hostname()
156 responsible for crashes and unwanted behaviour.
157 * Added support for Certificate Revocation List (CRL) parsing.
158 * Added support for CRL revocation to x509parse_verify() and
159 SSL/TLS code.
160 * Fixed compatibility of XTEA and Camellia on a 64-bit system
161 (found by Felix von Leitner).
162
163= Version 0.10.0 released on 2009-01-12
164 * Migrated XySSL to PolarSSL
165 * Added XTEA symmetric cipher
166 * Added Camellia symmetric cipher
167 * Added support for ciphersuites: SSL_RSA_CAMELLIA_128_SHA,
168 SSL_RSA_CAMELLIA_256_SHA and SSL_EDH_RSA_CAMELLIA_256_SHA
169 * Fixed dangerous bug that can cause a heap overflow in
170 rsa_pkcs1_decrypt (found by Christophe Devine)
171
172================================================================
173XySSL ChangeLog
174
175= Version 0.9 released on 2008-03-16
176
177 * Added support for ciphersuite: SSL_RSA_AES_128_SHA
178 * Enabled support for large files by default in aescrypt2.c
179 * Preliminary openssl wrapper contributed by David Barrett
180 * Fixed a bug in ssl_write() that caused the same payload to
181 be sent twice in non-blocking mode when send returns EAGAIN
182 * Fixed ssl_parse_client_hello(): session id and challenge must
183 not be swapped in the SSLv2 ClientHello (found by Greg Robson)
184 * Added user-defined callback debug function (Krystian Kolodziej)
185 * Before freeing a certificate, properly zero out all cert. data
186 * Fixed the "mode" parameter so that encryption/decryption are
187 not swapped on PadLock; also fixed compilation on older versions
188 of gcc (bug reported by David Barrett)
189 * Correctly handle the case in padlock_xcryptcbc() when input or
190 ouput data is non-aligned by falling back to the software
191 implementation, as VIA Nehemiah cannot handle non-aligned buffers
192 * Fixed a memory leak in x509parse_crt() which was reported by Greg
193 Robson-Garth; some x509write.c fixes by Pascal Vizeli, thanks to
194 Matthew Page who reported several bugs
195 * Fixed x509_get_ext() to accept some rare certificates which have
196 an INTEGER instead of a BOOLEAN for BasicConstraints::cA.
197 * Added support on the client side for the TLS "hostname" extension
198 (patch contributed by David Patino)
199 * Make x509parse_verify() return BADCERT_CN_MISMATCH when an empty
200 string is passed as the CN (bug reported by spoofy)
201 * Added an option to enable/disable the BN assembly code
202 * Updated rsa_check_privkey() to verify that (D*E) = 1 % (P-1)*(Q-1)
203 * Disabled obsolete hash functions by default (MD2, MD4); updated
204 selftest and benchmark to not test ciphers that have been disabled
205 * Updated x509parse_cert_info() to correctly display byte 0 of the
206 serial number, setup correct server port in the ssl client example
207 * Fixed a critical denial-of-service with X.509 cert. verification:
208 peer may cause xyssl to loop indefinitely by sending a certificate
209 for which the RSA signature check fails (bug reported by Benoit)
210 * Added test vectors for: AES-CBC, AES-CFB, DES-CBC and 3DES-CBC,
211 HMAC-MD5, HMAC-SHA1, HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512
212 * Fixed HMAC-SHA-384 and HMAC-SHA-512 (thanks to Josh Sinykin)
213 * Modified ssl_parse_client_key_exchange() to protect against
214 Daniel Bleichenbacher attack on PKCS#1 v1.5 padding, as well
215 as the Klima-Pokorny-Rosa extension of Bleichenbacher's attack
216 * Updated rsa_gen_key() so that ctx->N is always nbits in size
217 * Fixed assembly PPC compilation errors on Mac OS X, thanks to
218 David Barrett and Dusan Semen
219
220= Version 0.8 released on 2007-10-20
221
222 * Modified the HMAC functions to handle keys larger
223 than 64 bytes, thanks to Stephane Desneux and gary ng
224 * Fixed ssl_read_record() to properly update the handshake
225 message digests, which fixes IE6/IE7 client authentication
226 * Cleaned up the XYSSL* #defines, suggested by Azriel Fasten
227 * Fixed net_recv(), thanks to Lorenz Schori and Egon Kocjan
228 * Added user-defined callbacks for handling I/O and sessions
229 * Added lots of debugging output in the SSL/TLS functions
230 * Added preliminary X.509 cert. writing by Pascal Vizeli
231 * Added preliminary support for the VIA PadLock routines
232 * Added AES-CFB mode of operation, contributed by chmike
233 * Added an SSL/TLS stress testing program (ssl_test.c)
234 * Updated the RSA PKCS#1 code to allow choosing between
235 RSA_PUBLIC and RSA_PRIVATE, as suggested by David Barrett
236 * Updated ssl_read() to skip 0-length records from OpenSSL
237 * Fixed the make install target to comply with *BSD make
238 * Fixed a bug in mpi_read_binary() on 64-bit platforms
239 * mpi_is_prime() speedups, thanks to Kevin McLaughlin
240 * Fixed a long standing memory leak in mpi_is_prime()
241 * Replaced realloc with malloc in mpi_grow(), and set
242 the sign of zero as positive in mpi_init() (reported
243 by Jonathan M. McCune)
244
245= Version 0.7 released on 2007-07-07
246
247 * Added support for the MicroBlaze soft-core processor
248 * Fixed a bug in ssl_tls.c which sometimes prevented SSL
249 connections from being established with non-blocking I/O
250 * Fixed a couple bugs in the VS6 and UNIX Makefiles
251 * Fixed the "PIC register ebx clobbered in asm" bug
252 * Added HMAC starts/update/finish support functions
253 * Added the SHA-224, SHA-384 and SHA-512 hash functions
254 * Fixed the net_set_*block routines, thanks to Andreas
255 * Added a few demonstration programs: md5sum, sha1sum,
256 dh_client, dh_server, rsa_genkey, rsa_sign, rsa_verify
257 * Added new bignum import and export helper functions
258 * Rewrote README.txt in program/ssl/ca to better explain
259 how to create a test PKI
260
261= Version 0.6 released on 2007-04-01
262
263 * Ciphers used in SSL/TLS can now be disabled at compile
264 time, to reduce the memory footprint on embedded systems
265 * Added multiply assembly code for the TriCore and modified
266 havege_struct for this processor, thanks to David Patiño
267 * Added multiply assembly code for 64-bit PowerPCs,
268 thanks to Peking University and the OSU Open Source Lab
269 * Added experimental support of Quantum Cryptography
270 * Added support for autoconf, contributed by Arnaud Cornet
271 * Fixed "long long" compilation issues on IA-64 and PPC64
272 * Fixed a bug introduced in xyssl-0.5/timing.c: hardclock
273 was not being correctly defined on ARM and MIPS
274
275= Version 0.5 released on 2007-03-01
276
277 * Added multiply assembly code for SPARC and Alpha
278 * Added (beta) support for non-blocking I/O operations
279 * Implemented session resuming and client authentication
280 * Fixed some portability issues on WinCE, MINIX 3, Plan9
281 (thanks to Benjamin Newman), HP-UX, FreeBSD and Solaris
282 * Improved the performance of the EDH key exchange
283 * Fixed a bug that caused valid packets with a payload
284 size of 16384 bytes to be rejected
285
286= Version 0.4 released on 2007-02-01
287
288 * Added support for Ephemeral Diffie-Hellman key exchange
289 * Added multiply asm code for SSE2, ARM, PPC, MIPS and M68K
290 * Various improvement to the modular exponentiation code
291 * Rewrote the headers to generate the API docs with doxygen
292 * Fixed a bug in ssl_encrypt_buf (incorrect padding was
293 generated) and in ssl_parse_client_hello (max. client
294 version was not properly set), thanks to Didier Rebeix
295 * Fixed another bug in ssl_parse_client_hello: clients with
296 cipherlists larger than 96 bytes were incorrectly rejected
297 * Fixed a couple memory leak in x509_read.c
298
299= Version 0.3 released on 2007-01-01
300
301 * Added server-side SSLv3 and TLSv1.0 support
302 * Multiple fixes to enhance the compatibility with g++,
303 thanks to Xosé Antón Otero Ferreira
304 * Fixed a bug in the CBC code, thanks to dowst; also,
305 the bignum code is no longer dependant on long long
306 * Updated rsa_pkcs1_sign to handle arbitrary large inputs
307 * Updated timing.c for improved compatibility with i386
308 and 486 processors, thanks to Arnaud Cornet
309
310= Version 0.2 released on 2006-12-01
311
312 * Updated timing.c to support ARM and MIPS arch
313 * Updated the MPI code to support 8086 on MSVC 1.5
314 * Added the copyright notice at the top of havege.h
315 * Fixed a bug in sha2_hmac, thanks to newsoft/Wenfang Zhang
316 * Fixed a bug reported by Adrian Rüegsegger in x509_read_key
317 * Fixed a bug reported by Torsten Lauter in ssl_read_record
318 * Fixed a bug in rsa_check_privkey that would wrongly cause
319 valid RSA keys to be dismissed (thanks to oldwolf)
320 * Fixed a bug in mpi_is_prime that caused some primes to fail
321 the Miller-Rabin primality test
322
323 I'd also like to thank Younès Hafri for the CRUX linux port,
324 Khalil Petit who added XySSL into pkgsrc and Arnaud Cornet
325 who maintains the Debian package :-)
326
327= Version 0.1 released on 2006-11-01
328