Changelog for
bearssl-devel-0.6-2.78.x86_64.rpm :
* Tue Jan 18 2022 aloisioAATTgmx.com- Fix Factory build
* Wed Aug 15 2018 aloisioAATTgmx.com- Update to version 0.6
* Added general-purpose implementations of EAX and CCM modes (including shared precomputation support for EAX).
* Added general-purpose RSA/OAEP implementation.
* Added general-purpose HKDF implementation.
* Added support for CCM and CCM_8 TLS cipher suites (RFC 6655 and RFC 7251).
* Added RSA and EC key generation.
* Added private key encoding support (“raw” and PKCS#8 formats, both in DER and PEM, for RSA and EC key pairs).
* Made Base64 encoding/decoding constant-time (with regards to the encoded data bytes).
* Added a generic API for random seed providers.
* Added an extra DRBG based on AES/CTR + Hirose construction for reseeding.
* Some cosmetic fixes to avoid warnings with picky compilers.
* Makefile fix to achieve compatibility with OpenBSD.
* Fixed a bug in bit length computation for big integers (this was breaking RSA signatures with some specific implementations and key lengths).
* Made SSL/TLS client stricter in cipher suite selection (to align with server behaviour).- Refreshed bearssl-compile_flags.patch
* Wed Aug 16 2017 aloisioAATTgmx.com- Update to version 0.5
* Added support for the BoarSSL / Twrch test framework.
* Header files now include the ritual mantras that make them compatible with C++.
* Better Makefile behaviour with Clang (FreeBSD compatibility).
* Worked around a bug of GCC 4.8 and 4.9 in 32-bit x86 mode.
* Incoming application data after initiating closure is now properly ignored.
* Some instances of (critical) Certificate Policies extensions are now ignored (when it is safe to do so).
* Fixed some behavioural bugs with regards to renegotiation (all were failing safe).
* Added encoded OID for hash functions in the public API, to help with using RSA signatures in non-SSL contexts.
* Fixed bug in AES/CBC decryption on x86 with AES-NI opcode (this was breaking decryption with AES/CBC cipher suites and TLS 1.0 only).
* Added an explicit stack buffer initialisation (some provably harmless accesses to uninitialised data were performed, Valgrind was not happy).
* Fixed bug in the search tree for the cache of SSL sessions (occasional lock-ups).
* Fixed bug in modular reduction in the special field for P-256 (this was infrequently breaking ECDSA signatures).
* Added support for exporting keying material (RFC 5705).
* Added new general-purpose API for AEAD implementations (in non-SSL contexts) and an AES/GCM implementation that follows that API.
* Added a function to forget saved session parameter in the LRU cache.
* Added a new ChaCha20 implementation that uses SSE2 on x86 architectures (both 32-bit and 64-bit).
* Thu Apr 13 2017 aloisioAATTgmx.com- Update to version 0.4
* New AES and GHASH implementations for POWER8 processors (provides AES/GCM at more than 2 gigabytes per second!).
* Improved GHASH implementation with AES-NI opcodes (pclmulqdq).
* New Poly1305 implementation with 64→128 multiplications, available on some 64-bit architectures.
* New “i62” big-integer code with 64→128 multiplications, available on some 64-bit architectures (RSA is much faster).
* Some mostly cosmetic patches to support very old systems (BearSSL now compiles and run on Debian 2.2 “potato” from 2000, with GCC 2.95).
* Mon Jan 30 2017 aloisioAATTgmx.com- Update to version 0.3
* Support for ALPN extension (RFC 7301).
* New big-integers support code (“i15”), that uses 15-bit words internally; this offers better performance and constant-time code on the ARM Cortex M series.
* On the ARM Cortex M, a bit of inline assembly can be used to speed up multiplications and modular exponentations.
* Many new elliptic curve implementations: + ec_prime_i15: supports P-256, P-384 and P-521 with the “i15” big integers. + ec_p256_m15: specialised implementation for P-256; similar to “i15” but faster. Internally, 13-bit words are used (for easier carry propagation). + ec_p256_m31: like ec_p256_m15, but using 30-bit words. + ec_c25519_i15 and ecc25519_i31 implement Curve25519 with the “i15” and “i31” big integers, respectively. + ec_c25519_m15 and ecc25519_m31 are specialised implementations of Curve25519 with 13-bit and 30-bit words, respectively; they are faster, but with a larger compiled code size. + ec_all_m15 and ec_all_m31 are aggregate wrappers that provide support for the three NIST curves and Curve25519, with the “m15/i15” or the “m31/i31” code, respectively.
* New API for server-side private key handling: when using ECDHE, the pluggable module that computes the signature on the ServerKeyExchange message can now obtain the actual data, not just a hash thereof (this should help with EdDSA integration when that function is implemented).
* Revamped Makefile structure: + Simplified configuration files (in the conf/ directory) to allow for selectable sets of parameters, including build directory. + Visual Studio + nmake.exe is now a supported target.
* AES implementation with the AES-NI opcodes; works with GCC, Clang and Visual Studio, both in 32-bit and 64-bit modes.
* GHASH implementation with pclmulqdq; works with GCC, Clang and Visual Studio, both in 32-bit and 64-bit modes.
* Many fixes, including a buffer overrun.- Refreshed bearssl-compile_flags.patch
* Thu Jan 05 2017 aloisioAATTgmx.com- Update to version 0.2
* Support for ClientHello padding (RFC 7685).
* Support for TLS_FALLBACK_SCSV (RFC 7507) (server-side; on the client, this is entirely under control of the caller).
* New flag to prohibit renegotiations.
* API for saving and restoring session parameters (controllable session resumption on the client side).
* Client certificates: API to request a client certificate (on the server side), and to provide a client certificate (on the client side).
* API for generic name extraction from X.509 certificates (from the subject DN and the SAN extension).
* Improved T0 compilation (threaded code is about 10% shorter).
* ChaCha20+Poly1305 support (RFC 7905).
* Lots of fixes (including a couple of buffer overruns).
* Thu Nov 03 2016 aloisioAATTgmx.com- Initial version 0.1