Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Update libp11 to 0.4.4 so that we can build with NetBSD-9.0 newer Ope…
…nSSL Changes since libp11-0.2.8 from the NEWS file: New in 0.4.4; 2017-01-26; Michal Trojnara * Fixed a state reset caused by re-login on LOAD_CERT_CTRL engine ctrl; fixes #141 (Michal Trojnara) * "?" and "&" allowed as URI separators; fixes #142 (Michal Trojnara) * engine: Unified private/public key and certificate enumeration to be performed without login if possible (Michal Trojnara) New in 0.4.3; 2016-12-04; Michal Trojnara * Use UI to get CKU_CONTEXT_SPECIFIC PINs (Michal Trojnara) * Added graceful handling of alien (non-PKCS#11) keys (Michal Trojnara) * Added symbol versioning (Nikos Mavrogiannopoulos) * Soname tied with with the OpenSSL soname (Nikos Mavrogiannopoulos) * Added MSYS2, Cygwin, and MinGW/MSYS support (Pawel Witas) * Workaround implemented for a deadlock in PKCS#11 modules that internally use OpenSSL engines (Michal Trojnara, Pawel Witas) * Fixed an EVP_PKEY reference count leak (David Woodhouse) * Fixed OpenSSL 1.1.x crash in public RSA methods (Doug Engert, Michal Trojnara) * Fixed OpenSSL 1.1.x builds (Nikos Mavrogiannopoulos, Michal Trojnara) * Fixed retrieving PIN values from certificate URIs (Andrei Korikov) * Fixed symlink installation (Alon Bar-Lev) New in 0.4.2; 2016-09-25; Michal Trojnara * Fixed a 0.4.0 regression bug causing the engine finish function to remove any configured engine parameters; fixes #104 (Michal Trojnara) New in 0.4.1; 2016-09-17; Michal Trojnara * Use enginesdir provided by libcrypto.pc if available (David Woodhouse) * Certificate cache destroyed on login/logout (David Woodhouse) * Fixed accessing certificates marked as CKA_PRIVATE (David Woodhouse) * Directly included libp11 code into the engine (Matt Hauck) * Fixed handling simultaneous make jobs (Derek Straka) * Reverted an old hack that broke engine initialization (Michal Trojnara) * Fixed loading of multiple keys due to unneeded re-logging (Matt Hauck) * Makefile fixes and improvements (Nikos Mavrogiannopoulos) * Fixed several certificate selection bugs (Michal Trojnara) * The signed message digest is truncated if it is too long for the signing curve (David von Oheimb) * Workaround for broken PKCS#11 modules not returning CKA_EC_POINT in the ASN1_OCTET_STRING format (Michal Trojnara) * OpenSSL 1.1.0 build fixes (Michal Trojnara) New in 0.4.0; 2016-03-28; Michal Trojnara * Merged engine_pkcs11 (Michal Trojnara) * Added ECDSA support for OpenSSL < 1.0.2 (Michal Trojnara) * Added ECDH key derivation support (Doug Engert and Michal Trojnara) * Added support for RSA_NO_PADDING RSA private key decryption, used by OpenSSL for various features including OAEP (Michal Trojnara) * Added support for the ANSI X9.31 (RSA_X931_PADDING) RSA padding (Michal Trojnara) * Added support for RSA encryption (not only signing) (Michal Trojnara) * Added CKA_ALWAYS_AUTHENTICATE support (Michal Trojnara) * Fixed double locking the global engine lock (Michal Trojnara) * Fixed incorrect errors reported on signing/encryption/decryption (Michal Trojnara) * Fixed deadlocks in keys and certificates listing (Brian Hinz) * Use PKCS11_MODULE_PATH environment variable (Doug Engert) * Added support for building against OpenSSL 1.1.0-dev (Doug Engert) * Returned EVP_PKEY objects are no longer "const" (Michal Trojnara) * Fixed building against OpenSSL 0.9.8 (Michal Trojnara) * Removed support for OpenSSL 0.9.7 (Michal Trojnara) New in 0.3.1; 2016-01-22; Michal Trojnara * Added PKCS11_is_logged_in to the API (Mikhail Denisenko) * Added PKCS11_enumerate_public_keys to the API (Michal Trojnara) * Fixed EVP_PKEY handling of public keys (Michal Trojnara) * Added thread safety based on OpenSSL dynamic locks (Michal Trojnara) * A private index is allocated for ex_data access (RSA and ECDSA classes) instead of using the reserved index zero (app_data) (Michal Trojnara) * Fixes in reinitialization after fork; addresses #39 (Michal Trojnara) * Improved searching for dlopen() (Christoph Moench-Tegeder) * MSVC build fixes (Michal Trojnara) * Fixed memory leaks in pkcs11_get_evp_key_rsa() (Michal Trojnara) New in 0.3.0; 2015-10-09; Nikos Mavrogiannopoulos * Added small test suite based on softhsm (run on make check) * Memory leak fixes (Christian Heimes) * On module initialization tell the module to that the OS locking primitives are OK to use (Mike Gerow) * Transparently handle applications that fork. That is call C_Initialize() and reopen any handles if a fork is detected. * Eliminated any hard coded limits for certificate size (Doug Engert) * Added support for ECDSA (Doug Engert) * Allow RSA_NO_PADDING padding mode in PKCS11_private_encrypt (Stephane Adenot) * Eliminated several hard-coded limits in parameter sizes.
- Loading branch information