X-Git-Url: https://git.librecmc.org/?a=blobdiff_plain;f=CHANGES;h=cd8f971a548ff1a8871e32ec4ef98e8848eeeda7;hb=e84b663a933eff8834d66233ac0d6882ed918b82;hp=54df5583526004c4fcf3fd9dd6e2c8bc3086ffa2;hpb=46a643763de6d8e39ecf6f76fa79b4d04885aa59;p=oweals%2Fopenssl.git diff --git a/CHANGES b/CHANGES index 54df558352..cd8f971a54 100644 --- a/CHANGES +++ b/CHANGES @@ -2,7 +2,39 @@ OpenSSL CHANGES _______________ - Changes between 0.9.7h and 0.9.8 [xx XXX xxxx] + Changes between 0.9.8 and 0.9.9 [xx XXX xxxx] + + *) + + Changes between 0.9.8 and 0.9.8a [XX xxx XXXX] + + *) + + Changes between 0.9.7h and 0.9.8 [05 Jul 2005] + + *) Add libcrypto.pc and libssl.pc for those who feel they need them. + [Richard Levitte] + + *) Change CA.sh and CA.pl so they don't bundle the CSR and the private + key into the same file any more. + [Richard Levitte] + + *) Add initial support for Win64, both IA64 and AMD64/x64 flavors. + [Andy Polyakov] + + *) Add -utf8 command line and config file option to 'ca'. + [Stefan and Geoff Thorpe] *) Add attribute functions to EVP_PKEY structure. Modify PKCS12_create() to recognize a CSP name attribute and @@ -799,11 +831,22 @@ Changes between 0.9.7g and 0.9.7h [XX xxx XXXX] + *) Minimal support for X9.31 signatures and PSS padding modes. This is + mainly for FIPS compliance and not fully integrated at this stage. + [Steve Henson] + + *) For DSA signing, unless DSA_FLAG_NO_EXP_CONSTTIME is set, perform + the exponentiation using a fixed-length exponent. (Otherwise, + the information leaked through timing could expose the secret key + after many signatures; cf. Bleichenbacher's attack on DSA with + biased k.) + [Bodo Moeller] + *) Make a new fixed-window mod_exp implementation the default for - RSA, DSA, and DH private-key operations to mitigate the - hyper-threading timing attacks pointed out by Colin Percival - (http://www.daemonology.net/hyperthreading-considered-harmful/), - and potential related attacks. + RSA, DSA, and DH private-key operations so that the sequence of + squares and multiplies and the memory access pattern are + independent of the particular secret key. This will mitigate + cache-timing and potential related attacks. BN_mod_exp_mont_consttime() is the new exponentiation implementation, and this is automatically used by BN_mod_exp_mont() if the new flag