File bearssl.changes of Package bearssl
-------------------------------------------------------------------
Tue Jan 18 09:54:55 UTC 2022 - Luigi Baldoni <aloisio@gmx.com>
- Fix Factory build
-------------------------------------------------------------------
Wed Aug 15 08:21:00 UTC 2018 - aloisio@gmx.com
- Update to version 0.6
* Added general-purpose implementations of EAX and CCM modes
(including shared precomputation support for EAX).
* Added general-purpose RSA/OAEP implementation.
* Added general-purpose HKDF implementation.
* Added support for CCM and CCM_8 TLS cipher suites (RFC 6655
and RFC 7251).
* Added RSA and EC key generation.
* Added private key encoding support (“raw” and PKCS#8
formats, both in DER and PEM, for RSA and EC key pairs).
* Made Base64 encoding/decoding constant-time (with regards to
the encoded data bytes).
* Added a generic API for random seed providers.
* Added an extra DRBG based on AES/CTR + Hirose construction
for reseeding.
* Some cosmetic fixes to avoid warnings with picky compilers.
* Makefile fix to achieve compatibility with OpenBSD.
* Fixed a bug in bit length computation for big integers (this
was breaking RSA signatures with some specific implementations
and key lengths).
* Made SSL/TLS client stricter in cipher suite selection (to
align with server behaviour).
- Refreshed bearssl-compile_flags.patch
-------------------------------------------------------------------
Wed Aug 16 14:52:07 UTC 2017 - aloisio@gmx.com
- Update to version 0.5
* Added support for the BoarSSL / Twrch test framework.
* Header files now include the ritual mantras that make them
compatible with C++.
* Better Makefile behaviour with Clang (FreeBSD compatibility).
* Worked around a bug of GCC 4.8 and 4.9 in 32-bit x86 mode.
* Incoming application data after initiating closure is now
properly ignored.
* Some instances of (critical) Certificate Policies extensions
are now ignored (when it is safe to do so).
* Fixed some behavioural bugs with regards to renegotiation
(all were failing safe).
* Added encoded OID for hash functions in the public API, to
help with using RSA signatures in non-SSL contexts.
* Fixed bug in AES/CBC decryption on x86 with AES-NI opcode
(this was breaking decryption with AES/CBC cipher suites and
TLS 1.0 only).
* Added an explicit stack buffer initialisation (some provably
harmless accesses to uninitialised data were performed,
Valgrind was not happy).
* Fixed bug in the search tree for the cache of SSL sessions
(occasional lock-ups).
* Fixed bug in modular reduction in the special field for
P-256 (this was infrequently breaking ECDSA signatures).
* Added support for exporting keying material (RFC 5705).
* Added new general-purpose API for AEAD implementations (in
non-SSL contexts) and an AES/GCM implementation that follows
that API.
* Added a function to forget saved session parameter in the
LRU cache.
* Added a new ChaCha20 implementation that uses SSE2 on x86
architectures (both 32-bit and 64-bit).
-------------------------------------------------------------------
Thu Apr 13 09:28:59 UTC 2017 - aloisio@gmx.com
- Update to version 0.4
* New AES and GHASH implementations for POWER8 processors
(provides AES/GCM at more than 2 gigabytes per second!).
* Improved GHASH implementation with AES-NI opcodes
(pclmulqdq).
* New Poly1305 implementation with 64→128 multiplications,
available on some 64-bit architectures.
* New “i62” big-integer code with 64→128 multiplications,
available on some 64-bit architectures (RSA is much faster).
* Some mostly cosmetic patches to support very old systems
(BearSSL now compiles and run on Debian 2.2 “potato” from
2000, with GCC 2.95).
-------------------------------------------------------------------
Mon Jan 30 12:13:59 UTC 2017 - aloisio@gmx.com
- Update to version 0.3
* Support for ALPN extension (RFC 7301).
* New big-integers support code (“i15”), that uses 15-bit
words internally; this offers better performance and
constant-time code on the ARM Cortex M series.
* On the ARM Cortex M, a bit of inline assembly can be used
to speed up multiplications and modular exponentations.
* Many new elliptic curve implementations:
+ ec_prime_i15: supports P-256, P-384 and P-521 with the
“i15” big integers.
+ ec_p256_m15: specialised implementation for P-256;
similar to “i15” but faster. Internally, 13-bit words
are used (for easier carry propagation).
+ ec_p256_m31: like ec_p256_m15, but using 30-bit words.
+ ec_c25519_i15 and ecc25519_i31 implement Curve25519 with
the “i15” and “i31” big integers, respectively.
+ ec_c25519_m15 and ecc25519_m31 are specialised
implementations of Curve25519 with 13-bit and 30-bit
words, respectively; they are faster, but with a larger
compiled code size.
+ ec_all_m15 and ec_all_m31 are aggregate wrappers that
provide support for the three NIST curves and Curve25519,
with the “m15/i15” or the “m31/i31” code, respectively.
* New API for server-side private key handling: when using
ECDHE, the pluggable module that computes the signature on
the ServerKeyExchange message can now obtain the actual
data, not just a hash thereof (this should help with EdDSA
integration when that function is implemented).
* Revamped Makefile structure:
+ Simplified configuration files (in the conf/ directory)
to allow for selectable sets of parameters, including
build directory.
+ Visual Studio + nmake.exe is now a supported target.
* AES implementation with the AES-NI opcodes; works with
GCC, Clang and Visual Studio, both in 32-bit and 64-bit
modes.
* GHASH implementation with pclmulqdq; works with GCC, Clang
and Visual Studio, both in 32-bit and 64-bit modes.
* Many fixes, including a buffer overrun.
- Refreshed bearssl-compile_flags.patch
-------------------------------------------------------------------
Thu Jan 5 14:53:22 UTC 2017 - aloisio@gmx.com
- Update to version 0.2
* Support for ClientHello padding (RFC 7685).
* Support for TLS_FALLBACK_SCSV (RFC 7507) (server-side;
on the client, this is entirely under control of the
caller).
* New flag to prohibit renegotiations.
* API for saving and restoring session parameters
(controllable session resumption on the client side).
* Client certificates: API to request a client certificate
(on the server side), and to provide a client certificate
(on the client side).
* API for generic name extraction from X.509 certificates
(from the subject DN and the SAN extension).
* Improved T0 compilation (threaded code is about 10%
shorter).
* ChaCha20+Poly1305 support (RFC 7905).
* Lots of fixes (including a couple of buffer overruns).
-------------------------------------------------------------------
Thu Nov 3 15:41:08 UTC 2016 - aloisio@gmx.com
- Initial version 0.1