-
Notifications
You must be signed in to change notification settings - Fork 15
/
ChangeLog
107 lines (89 loc) · 3.29 KB
/
ChangeLog
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
* openssl-ibmca 2.4.1
- Provider: Change the default log directory to /tmp
- Bug fixes
* openssl-ibmca 2.4.0
- Provider: Adjustments for OpenSSL versions 3.1 and 3.2
- Provider: Support RSA blinding
- Provider: Constant-time fixes for RSA PKCS#1 v1.5 and OAEP padding
- Provider: Support "implicit rejection" option for RSA PKCS#1 v1.5 padding
- Provider: Adjustments in OpenSSL config generator and example configs
- Engine: EC: Cache ICA key in EC_KEY object (performance improvement)
- Engine: Enable RSA blinding
* openssl-ibmca 2.3.1
- Adjustments for libica 4.1.0
* openssl-ibmca 2.3.0
- First version including the provider
- Fix for engine build without OpenSSL 3.0 sources
* openssl-ibmca 2.2.3
- Fix PKEY segfault with OpenSSL 3.0
* openssl-ibmca 2.2.2
- Fix tests with OpenSSL 3.0
- Build against libica 4.0
* openssl-ibmca 2.2.1
- Bug fixes
* openssl-ibmca 2.2.0
- Implement fallbacks based on OpenSSL
- Disable software fallbacks from libica
- Allow to specify default library (libica vs. libica-cex) to use
- Provide "libica" engine ctrl to switch library at load time
- Update README.md
- Remove libica link dependency
- Generate sample configuration files from system configuration
- Restructure registration global data
* openssl-ibmca 2.1.3
- Bug fix
* openssl-ibmca 2.1.2
- Bug fixes
* openssl-ibmca 2.1.1
- Bug fixes
* openssl-ibmca 2.1.0
- Add MSA9 CPACF support for X25519, X448, Ed25519 and Ed448
* openssl-ibmca 2.0.3
- Add MSA9 CPACF support for ECDSA sign/verify
* openssl-ibmca 2.0.2
- Fix doing rsa-me, altough rsa-crt would be possible.
* openssl-ibmca 2.0.1
- Dont fail when a libica symbol cannot be resolved.
* openssl-ibmca 2.0.0
- Add ECC support.
- Add check and distcheck make-targets.
- Project cleanup, code was broken into multiple files and coding style cleanup.
- Improvements to compat macros for openssl.
- Don't disable libica sw fallbacks.
- Fix dlclose logic.
* openssl-ibmca 1.4.1
- Fix structure size for aes-256-ecb/cbc/cfb/ofb
- Update man page
- Switch to ibmca.so filename to allow standalone use
- Switch off Libica fallback mode if available
- Make sure ibmca_init only runs once
- Provide simple macro for DEBUG_PRINTF possibility
- Cleanup and slight rework of function set_supported_meths
* openssl-ibmca 1.4.0
- Re-license to Apache License v2.0
- Fix aes_gcm initialization.
- Update man page.
- Add macros for OpenSSL 0.9.8 compat.
- Remove AC_FUNC_MALLOC from configure.ac
- Add compat macro for OpenSSL 1.0.1e-fips.
- Setting 'foreign' strictness for automake.
- Add AES-GCM support.
- Rework EVP_aes macros.
- Remove dependency of old local OpenSSL headers.
- Fix engine initialization to set function pointers only once.
- Update .gitignore file.
- Remove blank COPYING and NEWS files.
- Remove INSTALL and move its content to README.md
- Update README.md file to make use of markdown.
- Rename README file to README.md to use markdown
- Add CONTRIBUTING guidelines.
- Adding coding style documentation.
- Enable EVP_MD_FLAG_FIPS flag for SHA-*.
- Initialize rsa_keygen in RSA_METHOD for openssl < 1.1.0
- Fix SHA512 EVP digest struct to use EVP_MD_FLAG_PKEY_METHOD_SIGNATURE when
using OpenSSL 1.0
- Fix wrong parenthesis
- convert libica loading to dlopen() and friends
- Add support to DSO on new API of OpenSSL-1.1.0
* openssl-ibmca 1.3.1
- Support OpenSSL-1.1 and older versions