summaryrefslogtreecommitdiffstats
path: root/SoftHSMv2/NEWS
diff options
context:
space:
mode:
Diffstat (limited to 'SoftHSMv2/NEWS')
-rw-r--r--SoftHSMv2/NEWS292
1 files changed, 292 insertions, 0 deletions
diff --git a/SoftHSMv2/NEWS b/SoftHSMv2/NEWS
new file mode 100644
index 0000000..5d209ec
--- /dev/null
+++ b/SoftHSMv2/NEWS
@@ -0,0 +1,292 @@
+NEWS for SoftHSM -- History of user visible changes
+
+SoftHSM develop
+
+* Issue #140: Support for CKA_ALLOWED_MECHANISMS.
+ (Patch from Brad Hess)
+* Issue #141: Support CKA_ALWAYS_AUTHENTICATE for private key objects.
+* Issue #220: Support for CKM_DES3_CMAC and CKM_AES_CMAC.
+* Issue #226: Configuration option for Windows build to enable build with
+ static CRT (/MT).
+* Issue #325: Support for CKM_AES_GCM.
+* Issue #334: Document that initialized tokens will be reassigned to another
+ slot (based on the token serial number).
+* Issue #335: Support for CKM_RSA_PKCS_PSS.
+ (Patch from Nikos Mavrogiannopoulos)
+* Issue #341: Import AES keys with softhsm2-util.
+ (Patch from Pavel Cherezov)
+* Issue #348: Document that OSX needs pkg-config to detect cppunit.
+* Issue #349: softhsm2-util will check the configuration and report any
+ issues before loading the PKCS#11 library.
+* Issue #351: Upgrade Botan in Jenkins build.
+
+Bugfixes:
+* Issue #345: Private objects are presented to security officer in search
+ results.
+* Issue #358: Race condition when multiple applications are creating and
+ reading object files.
+
+
+SoftHSM 2.3.0 - 2017-07-03
+
+* Issue #130: Upgraded to PKCS#11 v2.40.
+ * Minor changes to some return values.
+ * Added CKA_DESTROYABLE to all objects. Used by C_DestroyObject().
+ * Added CKA_PUBLIC_KEY_INFO to certificates, private, and public key
+ objects. Will be accepted from application, but SoftHSM will
+ currently not calculate it.
+* Issue #142: Support for CKM_AES_CTR.
+* Issue #155: Add unit tests for SessionManager.
+* Issue #189: C_DigestKey returns CKR_KEY_INDIGESTIBLE when key
+ attribute CKA_EXTRACTABLE = false. Whitelist SHA algorithms to allow
+ C_DigestKey in this case.
+* Issue #225: Show slot id after initialization.
+* Issue #247: Run AppVeyor (Windows CI) for each PR and merge.
+* Issue #257: Set CKA_DECRYPT/CKA_ENCRYPT flags on key import to true.
+ (Patch from Martin Domke)
+* Issue #261: Add support for libeaycompat lib for FIPS on Windows.
+ (Patch from Matt Hauck)
+* Issue #262: Support importing ECDSA P-521 in softhsm-util.
+* Issue #276: Support for Botan 2.0.
+* Issue #279: Editorial changes from Mountain Lion to Sierra.
+ (Patch from Mike Neumann)
+* Issue #283: More detailed error messages when initializing SoftHSM.
+* Issue #285: Support for LibreSSL.
+ (Patch from Alon Bar-Lev)
+* Issue #286: Update .gitignore.
+ (Patch from Alon Bar-Lev)
+* Issue #291: Change to enable builds and reports on new Jenkinks
+ environment.
+* Issue #293: Detect cppunit in autoconf.
+ (Patch from Alon Bar-Lev)
+* Issue #309: CKO_CERTIFICATE and CKO_PUBLIC_KEY now defaults to
+ CKA_PRIVATE=false.
+* Issue #314: Update README with information about logging.
+* Issue #330: Adjust log levels for failing to enumerate object store.
+ (Patch from Nikos Mavrogiannopoulos)
+
+Bugfixes:
+* Issue #216: Better handling of CRYPTO_set_locking_callback() for OpenSSL.
+* Issue #265: Fix deriving shared secret with ECC.
+* Issue #280: HMAC with sizes less than L bytes is strongly discouraged.
+ Set a lower bound equal to L bytes in ulMinKeySize and check it when
+ initializing the operation.
+* Issue #281: Fix test of p11 shared library.
+ (Patch from Lars Silvén)
+* Issue #289: Minor fix of 'EVP_CipherFinal_ex'.
+ (Patch from Viktor Tarasov)
+* Issue #297: Fix build with cppunit.
+ (Patch from Ludovic Rousseau)
+* Issue #302: Export PKCS#11 symbols from the library.
+ (Patch from Ludovic Rousseau)
+* Issue #305: Zero pad key to fit the block in CKM_AES_KEY_WRAP.
+* Issue #313: Detecting CppUnit when using Macports.
+ (Patch from mouse07410)
+
+
+SoftHSM 2.2.0 - 2016-12-05
+
+* Issue #143: Delete a token using softhsm2-util.
+* Issue #185: Change access mode bits for /var/lib/softhsm/tokens/
+ to 1777. All users can now create tokens, but only access their own.
+ (Patch from Rick van Rein)
+* Issue #186: Reinitializing a token will now keep the token, but all
+ token objects are deleted, the user PIN is removed and the token
+ label is updated.
+* Issue #190: Support for OpenSSL 1.1.0.
+* Issue #198: Calling C_GetSlotList with NULL_PTR will make sure that
+ there is always a slot with an uninitialized token available.
+* Issue #199: The token serial number will be used when setting the slot
+ number. The serial number is set after the token has been initialized.
+ (Patch from Lars Silvén)
+* Issue #203: Update the command utils to use the token label or serial
+ to find the token and its slot number.
+* Issue #209: Possibility to test other PKCS#11 implementations with the
+ CppUnit test.
+ (Patch from Lars Silvén)
+* Issue #223: Mark public key as non private by default.
+ (Patch from Nikos Mavrogiannopoulos)
+* Issue #230: Install p11-kit module, to disable use --disable-p11-kit.
+ (Patch from David Woodhouse)
+* Issue #237: Add windows continuous integration build.
+ (Patch from Peter Polačko)
+
+Bugfixes:
+* Issue #201: Missing new source file and test configuration in the
+ Windows build project.
+* Issue #205: ECDSA P-521 support for OpenSSL and better test coverage.
+* Issue #207: Fix segmentation faults in loadLibrary function.
+ (Patch from Jaroslav Imrich)
+* Issue #215: Update the Homebrew install notes for OSX.
+* Issue #218: Fix build warnings.
+* Issue #235: Add the libtool install command for OSX.
+ (Patch from Mark Wylde)
+* Issue #236: Use GetEnvironmentVariable instead of getenv on Windows.
+ (Patch from Jaroslav Imrich)
+* Issue #239: Crash on module unload with OpenSSL.
+ (Patch from David Woodhouse)
+* Issue #241: Added EXTRALIBS to Windows utils project.
+ (Patch from Peter Polačko)
+* Issue #250: C++11 not detected.
+* Issue #255: API changes in Botan 1.11.27.
+* Issue #260: Fix include guard to check WITH_FIPS.
+ (Patch from Matt Hauck)
+* Issue #268: p11test fails on 32-bit systems.
+* Issue #270: Build warning about "converting a string constant".
+* Issue #272: Fix C++11 check to look for unique_ptr.
+ (Patch from Matt Hauck)
+
+
+SoftHSM 2.1.0 - 2016-03-14
+
+* Issue #136: Improved guide and build scripts for Windows.
+ (Thanks to Jaroslav Imrich)
+* Issue #144: The password prompt in softhsm2-util can now be
+ interrupted (ctrl-c).
+* Issue #166: Add slots.removable config option.
+ (Patch from Sumit Bose)
+* Issue #180: Windows configure script improvements.
+ (Patch from Arnaud Grandville)
+
+Bugfixes:
+* Issue #128: Prioritize the return values in C_GetAttributeValue.
+ (Patch from Nicholas Wilson)
+* Issue #129: Fix errors reported by Visual Studio 2015.
+ (Patch from Jaroslav Imrich)
+* Issue #132: Handle the CKA_CHECK_VALUE correctly for certificates
+ and symmetric key objects.
+* Issue #154: Fix the Windows build and destruction order of objects.
+ (Patch from Arnaud Grandville)
+* Issue #162: Not possible to create certificate objects containing
+ CKA_CERTIFICATE_CATEGORY, CKA_NAME_HASH_ALGORITHM, or
+ CKA_JAVA_MIDP_SECURITY_DOMAIN.
+* Issue #163: Do not attempt decryption of empty byte strings.
+ (Patch from Michal Kepien)
+* Issue #165: Minor changes after a PVS-Studio code analysis, and
+ C_EncryptUpdate crash if no ciphered data is produced.
+ (Patch from Arnaud Grandville)
+* Issue #169: One-byte buffer overflow in call to EVP_DecryptUpdate.
+* Issue #171: Problem while closing library that is initialized but
+ improperly finalized.
+* Issue #173: Adjust return values for the template parsing.
+* Issue #174: C_DeriveKey() error with leading zero bytes.
+* Issue #177: CKA_NEVER_EXTRACTABLE set to CK_FALSE on objects
+ created with C_CreateObject.
+* Issue #182: Resolve compiler warning.
+ (Patch from Josh Datko)
+* Issue #184: Stop discarding the global OpenSSL libcrypto state.
+ (Patch from Michal Trojnara)
+* SOFTHSM-123: Fix library cleanup on BSD.
+
+
+SoftHSM 2.0.0 - 2015-07-17
+
+* SOFTHSM-121: Test cases for C_DecryptUpdate/C_DecryptFinal.
+* Support C_DecryptUpdate/C_DecryptFinal for symmetric algorithms.
+ (Patch from Thomas Calderon)
+
+Bugfixes:
+* SOFTHSM-120: Segfault after renaming variables.
+
+
+SoftHSM 2.0.0b3 - 2015-04-17
+
+* SOFTHSM-113: Support for Botan 1.11.15
+* SOFTHSM-119: softhsm2-util: Support ECDSA key import
+ (Patch from Magnus Ahltorp)
+* SUPPORT-139: Support deriving generic secrets, DES, DES2, DES3, and AES.
+ Using DH, ECDH or symmetric encryption.
+
+Bugfixes:
+* SOFTHSM-108: A marked as trusted certificate cannot be imported.
+* SOFTHSM-109: Unused parameter and variable warnings.
+* SOFTHSM-110: subdir-objects warnings from autoreconf.
+* SOFTHSM-111: Include FIPS-NOTES.md in dist.
+* SOFTHSM-112: CKM_AES_KEY_WRAP* conflict in pkcs11.h.
+* SOFTHSM-114: Fix memory leak in a test script.
+* SOFTHSM-115: Fix static analysis warnings.
+* SUPPORT-154: A marked as non-modifiable object cannot be generated.
+* SUPPORT-155: auto_ptr is deprecated in C++11, use unique_ptr.
+* SUPPORT-157: Derived secrets were truncated after encryption and
+ could thus not be decrypted.
+* Mutex should call MutexFactory wrapper functions.
+ (Patch from Jerry Lundström)
+* Return detailed error message to loadLibrary().
+ (Patch from Petr Spacek)
+
+
+SoftHSM 2.0.0b2 - 2014-12-28
+
+* SOFTHSM-50: OpenSSL FIPS support.
+* SOFTHSM-64: Updated build script for Windows.
+* SOFTHSM-100: Use --free with softhsm2-util to initialize the first
+ free token.
+* SOFTHSM-103: Allow runtime configuration of log level.
+* SOFTHSM-107: Support for CKM_<symcipher>_CBC_PAD.
+* Add support for CKM_RSA_PKCS_OAEP key un/wrapping.
+ (Patch from Petr Spacek)
+* Use OpenSSL EVP interface for AES key wrapping.
+ (Patch from Petr Spacek)
+* Allow reading configuration file from user's home directory.
+ (Patch from Nikos Mavrogiannopoulos)
+
+Bugfixes:
+* SOFTHSM-102: C_DeriveKey() uses OBJECT_OP_GENERATE.
+* Coverity found a number of issues.
+
+
+SoftHSM 2.0.0b1 - 2014-09-10
+
+* SOFTHSM-84: Check that all mandatory attributes are given during
+ the creation process.
+* SOFTHSM-92: Enable -fvisibility=hidden on per default
+* SUPPORT-137: Implement C_EncryptUpdate and C_EncryptFinal
+ (Patch from Martin Paljak)
+* Add support for CKM_RSA_PKCS key un/wrapping
+ (Patch from Petr Spacek)
+
+Bugfixes:
+* SOFTHSM-66: Attribute handling when using multiple threads
+* SOFTHSM-93: Invalid C++ object recycling.
+* SOFTHSM-95: umask affecting the calling application.
+* SOFTHSM-97: Check if Botan has already been initialized.
+* SOFTHSM-98: Handle mandatory attributes for DSA, DH, and ECDSA
+ correctly.
+* SOFTHSM-99: Binary encoding of GOST values.
+* SUPPORT-136: softhsm2-keyconv creates files with sensitive material
+ in insecure way.
+
+
+SoftHSM 2.0.0a2 - 2014-03-25
+
+* SOFTHSM-68: Display a better configure message when there is a
+ version of Botan with a broken ECC/GOST/OID implementation.
+* SOFTHSM-70: Improved handling of the database backend.
+* SOFTHSM-71: Supporting Botan 1.11.
+* SOFTHSM-76: Do not generate RSA keys smaller than 1024 bit when
+ using the Botan crypto backend.
+* SOFTHSM-83: Support CKA_VALUE_BITS for CKK_DH private key object.
+* SOFTHSM-85: Rename libsofthsm.so to libsofthsm2.so and prefix the
+ command line utilties with softhsm2-.
+* SOFTHSM-89: Use constants and not strings for signaling algorithms.
+* SUPPORT-129: Possible to use an empty template in C_GenerateKey.
+ The class and key type are inherited from the generation mechanism.
+ Some mechanisms do however require a length attribute. [SOFTHSM-88]
+* SUPPORT-131: Support RSA-PSS using SHA1, SHA224, SHA256, SHA384,
+ or SHA512. [SOFTHSM-87]
+
+Bugfixes:
+* SOFTHSM-39: Fix 64 bit build on sparc sun4v.
+* SOFTHSM-69: GOST did not work when you disabled ECC.
+* SOFTHSM-78: Correct the attribute checks for a number of objects.
+* SOFTHSM-80: Prevent segfault in OpenSSL GOST HMAC code.
+* SOFTHSM-91: Fix a warning from static code analysis.
+* Fixed a number of memory leaks.
+
+
+SoftHSM 2.0.0a1 - 2014-02-10
+
+This is the first alpha release of SoftHSMv2. It focuses on a higher
+level of security by encrypting sensitive information and using
+unswappable memory. There is also a more generalized crypto backend,
+where you can use Botan or OpenSSL.