File bearssl.changes of Package bearssl

-------------------------------------------------------------------
Tue Jan 18 09:54:55 UTC 2022 - Luigi Baldoni <aloisio@gmx.com>

- Fix Factory build 

-------------------------------------------------------------------
Wed Aug 15 08:21:00 UTC 2018 - aloisio@gmx.com

- Update to version 0.6
  * Added general-purpose implementations of EAX and CCM modes
    (including shared precomputation support for EAX).
  * Added general-purpose RSA/OAEP implementation.
  * Added general-purpose HKDF implementation.
  * Added support for CCM and CCM_8 TLS cipher suites (RFC 6655
    and RFC 7251).
  * Added RSA and EC key generation.
  * Added private key encoding support (“raw” and PKCS#8
    formats, both in DER and PEM, for RSA and EC key pairs).
  * Made Base64 encoding/decoding constant-time (with regards to
    the encoded data bytes).
  * Added a generic API for random seed providers.
  * Added an extra DRBG based on AES/CTR + Hirose construction
    for reseeding.
  * Some cosmetic fixes to avoid warnings with picky compilers.
  * Makefile fix to achieve compatibility with OpenBSD.
  * Fixed a bug in bit length computation for big integers (this
    was breaking RSA signatures with some specific implementations
    and key lengths).
  * Made SSL/TLS client stricter in cipher suite selection (to
    align with server behaviour).

- Refreshed bearssl-compile_flags.patch

-------------------------------------------------------------------
Wed Aug 16 14:52:07 UTC 2017 - aloisio@gmx.com

- Update to version 0.5
  * Added support for the BoarSSL / Twrch test framework.
  * Header files now include the ritual mantras that make them
    compatible with C++.
  * Better Makefile behaviour with Clang (FreeBSD compatibility).
  * Worked around a bug of GCC 4.8 and 4.9 in 32-bit x86 mode.
  * Incoming application data after initiating closure is now
    properly ignored.
  * Some instances of (critical) Certificate Policies extensions
    are now ignored (when it is safe to do so).
  * Fixed some behavioural bugs with regards to renegotiation
    (all were failing safe).
  * Added encoded OID for hash functions in the public API, to
    help with using RSA signatures in non-SSL contexts.
  * Fixed bug in AES/CBC decryption on x86 with AES-NI opcode
    (this was breaking decryption with AES/CBC cipher suites and
    TLS 1.0 only).
  * Added an explicit stack buffer initialisation (some provably
    harmless accesses to uninitialised data were performed,
    Valgrind was not happy).
  * Fixed bug in the search tree for the cache of SSL sessions
    (occasional lock-ups).
  * Fixed bug in modular reduction in the special field for
    P-256 (this was infrequently breaking ECDSA signatures).
  * Added support for exporting keying material (RFC 5705).
  * Added new general-purpose API for AEAD implementations (in
    non-SSL contexts) and an AES/GCM implementation that follows
    that API.
  * Added a function to forget saved session parameter in the
    LRU cache.
  * Added a new ChaCha20 implementation that uses SSE2 on x86
    architectures (both 32-bit and 64-bit).

-------------------------------------------------------------------
Thu Apr 13 09:28:59 UTC 2017 - aloisio@gmx.com

- Update to version 0.4
  * New AES and GHASH implementations for POWER8 processors 
    (provides AES/GCM at more than 2 gigabytes per second!).
  * Improved GHASH implementation with AES-NI opcodes 
    (pclmulqdq).
  * New Poly1305 implementation with 64→128 multiplications, 
    available on some 64-bit architectures.
  * New “i62” big-integer code with 64→128 multiplications, 
    available on some 64-bit architectures (RSA is much faster).
  * Some mostly cosmetic patches to support very old systems 
    (BearSSL now compiles and run on Debian 2.2 “potato” from
    2000, with GCC 2.95).

-------------------------------------------------------------------
Mon Jan 30 12:13:59 UTC 2017 - aloisio@gmx.com

- Update to version 0.3
  * Support for ALPN extension (RFC 7301).
  * New big-integers support code (“i15”), that uses 15-bit 
    words internally; this offers better performance and 
    constant-time code on the ARM Cortex M series.
  * On the ARM Cortex M, a bit of inline assembly can be used 
    to speed up multiplications and modular exponentations.
  * Many new elliptic curve implementations:
    + ec_prime_i15: supports P-256, P-384 and P-521 with the 
      “i15” big integers.
    + ec_p256_m15: specialised implementation for P-256; 
      similar to “i15” but faster. Internally, 13-bit words
      are used (for easier carry propagation).
    + ec_p256_m31: like ec_p256_m15, but using 30-bit words.
    + ec_c25519_i15 and ecc25519_i31 implement Curve25519 with 
      the “i15” and “i31” big integers, respectively.
    + ec_c25519_m15 and ecc25519_m31 are specialised 
      implementations of Curve25519 with 13-bit and 30-bit
      words, respectively; they are faster, but with a larger
      compiled code size.
    + ec_all_m15 and ec_all_m31 are aggregate wrappers that 
      provide support for the three NIST curves and Curve25519,
      with the “m15/i15” or the “m31/i31” code, respectively.
  * New API for server-side private key handling: when using 
    ECDHE, the pluggable module that computes the signature on
    the ServerKeyExchange message can now obtain the actual
    data, not just a hash thereof (this should help with EdDSA
    integration when that function is implemented).
  * Revamped Makefile structure:
    + Simplified configuration files (in the conf/ directory) 
      to allow for selectable sets of parameters, including
      build directory.
    + Visual Studio + nmake.exe is now a supported target.
  * AES implementation with the AES-NI opcodes; works with 
    GCC, Clang and Visual Studio, both in 32-bit and 64-bit
    modes.
  * GHASH implementation with pclmulqdq; works with GCC, Clang 
    and Visual Studio, both in 32-bit and 64-bit modes.
  * Many fixes, including a buffer overrun.

- Refreshed bearssl-compile_flags.patch

-------------------------------------------------------------------
Thu Jan  5 14:53:22 UTC 2017 - aloisio@gmx.com

- Update to version 0.2
  * Support for ClientHello padding (RFC 7685).
  * Support for TLS_FALLBACK_SCSV (RFC 7507) (server-side; 
    on the client, this is entirely under control of the
    caller).
  * New flag to prohibit renegotiations.
  * API for saving and restoring session parameters 
    (controllable session resumption on the client side).
  * Client certificates: API to request a client certificate 
    (on the server side), and to provide a client certificate
    (on the client side).
  * API for generic name extraction from X.509 certificates 
    (from the subject DN and the SAN extension).
  * Improved T0 compilation (threaded code is about 10% 
    shorter).
  * ChaCha20+Poly1305 support (RFC 7905).
  * Lots of fixes (including a couple of buffer overruns).

-------------------------------------------------------------------
Thu Nov  3 15:41:08 UTC 2016 - aloisio@gmx.com

- Initial version 0.1

openSUSE Build Service is sponsored by