SEARCH
NEW RPMS
DIRECTORIES
ABOUT
FAQ
VARIOUS
BLOG

 
 
Changelog for softhsm-devel-2.6.1-35.1.x86_64.rpm :

* Tue May 21 2024 Matej Cepl - Use correct SOURCE for /usr/share/p11-kit/modules/softhsm.module (fix bsc#1224356).
* Sat May 11 2024 Matej Cepl - We actually don\'t need any hard Requires for OpenSSL at all (and yes, rpmlint is right, we shouldn\'t use it at all).
* Tue May 07 2024 Matej Cepl - Add creation of ods user.
* Mon Apr 15 2024 Matej Cepl - Rebuild with inspiration (and patches) from the Fedora package.- Remove obsolete patch softhsm-rsakeys.patch- Add Fedora patches (comments in SPEC indicate their true origin): - softhsm-openssl3-tests.patch - softhsm-prevent-global-deleted-objects-access.patch - softhsm-2.6.1-rh1831086-exit.patch - softhsm-2.6.1-uninitialized.patch
* Thu Apr 21 2022 Marcus Meissner - switched URL to https
* Thu Apr 30 2020 Martin Hauke - Update to version 2.6.1
* Issue #542: Support Ed448/X448 for OpenSSL
* Issue #538: Improved warning and compilation issues for GCC10
* Tue Mar 17 2020 Martin Hauke - Update to version 2.6.0 Changes:
* Issue #493: Upgrade to Botan 2.
* Issue #530: Update appveyor build.
* Issue #438: Detect crypto algorithms by default.
* Issue #455: Provide a new configuration option to allow enabling and disabling various mechanisms (slots.mechanisms in the softhsm2.conf).
* Issue #479: Increase SQLite busy timeout from 15 seconds to 3 minutes.
* Issue #513: Add configuration option to reset state on fork closing all sessions rather than keeping all sessions open in duplicate process.
* Issue #500: C_WaitForSlotEvent implementation.
* Issue #445: Add wrap support with CKM_AES_CBC. Bugfixes:
* Issue #418: Set fields to NULL to avoid double free.
* Issue #423: ENGINE_load_rdrand is not supported with older openssl.
* Issue #429: Updated prerequisite to build from repository.
* Issue #434: Fix build issues with CMake.
* Issue #435: Fix botan build without EDDSA.
* Issue #442: Release resources from OSSLEVPSymmetricAlgorithm.
* Issue #449/#502: Do not copy zero sized buffer avoid null pointer reference.
* Issue #464: Race condition with multiple threads closing last session and opening a newer sessions.
* Issue #452: Fixes to automake build fir undefined macros.
* Issue #462: User PIN count wrongly calculated.
* Issue #516: Fix memory leak in OSSLCryptoFactory.
* Issue #494: Allow null pointers as arguments when count is zero.
* Issue #518: Sporadic problem in closing sessions because of lookup of object without prior locking.
* Issue #506: Check key type for C_EncryptInit and C_DecryptInit.
* Issue #526: Adjust EDDSA code to return valid EC_PARAMS.
* Issue #452: Autogen failure on undefined macro AC_MSG_ERROR.
* Issue #527: Fixed some build errors for GCC 10.
* Issue #470: Null pointer arguments validation for C_EncryptFinal, etc.
* Mon May 20 2019 Christophe Giboudeaux - Add the missing zlib requirement.
* Mon Sep 24 2018 Michael Ströder - Update to version 2.5.0 Updates:
* Issue #323: Support for EDDSA with vendor defined mechanisms.
* Issue #362: CMake Build System Support for SoftHSM.
* Issue #368: Support migrating 32-bit SoftHSMv1 DB on 64-bit system (LP64).
* Issue #385: Default is not to build EDDSA since it has not been released in OpenSSL.
* Issue #387: Windows: Add VS2017 detection to Configure.py.
* Issue #412: Replace PKCS11 headers with a version from p11-kit. Bugfixes:
* Issue #366: Support cross-compilation.
* Issue #377: Duplicate symbol error with custom p11test.
* Issue #386: Use RDRAND in OpenSSL if that engine is available.
* Issue #388: Update DBTests.cpp to fix x86 test failure.
* Issue #393: Not setting CKA_PUBLIC_KEY_INFO correctly.
* Issue #401: Wrong key and keyserver mentioned in installation documentation.
* Issue #408: Remove mutex callbacks after C_Finalize().
* Tue Feb 27 2018 mardnhAATTgmx.de- Update to version 2.4.0
* Support PKCS#8 for GOST.
* Support for CKA_ALLOWED_MECHANISMS.
* Support CKA_ALWAYS_AUTHENTICATE for private key objects.
* Support for CKM_DES3_CMAC and CKM_AES_CMAC.
* Support for CKM_AES_GCM.
* Document that initialized tokens will be reassigned to another slot (based on the token serial number).
* Support for CKM_RSA_PKCS_PSS.
* Import AES keys with softhsm2-util.
* softhsm2-util will check the configuration and report any issues before loading the PKCS#11 library.
 
ICM