Skip to content

Releases: lsh123/xmlsec

XMLSec 1.3.10 (rc1)

18 Mar 18:07
4884e1c

Choose a tag to compare

XMLSec 1.3.10 (rc1) Pre-release
Pre-release

Please test the release candidate 1.3.10-rc1 (signature) and let me know if you see any issues:

  • The minimum supported versions for dependencies are now: LibXML2 >= 2.9.13 (February 19, 2022), LibXSLT >= 1.1.35 (February 16, 2022), OpenSSL >= 3.0.13 (January 30, 2024), LibreSSL >= 3.9.0 (March 9, 2024), NSS >= 3.91 (June 26, 2023), NSPR >= 4.34.1 (June 26, 2023), GnuTLS >= 3.8.3 (January 1, 2024).
  • (xmlsec-core) Disabled all key value data for all key types by default (use '--enabled-key-data' flag to re-enable if needed).
  • (xmlsec-core) Added '--enable-asn1-signatures-hack' option to allow generation / verification of ASN1 signature values.
  • (xmlsec-core) Added '--verify-crls' option to verify CRLs when loading from command line.
  • (xmlsec-openssl) Added support for EdDSA signature algorithm; XDH (X25519 and X448) key agreement algorithms; HKDF key derivation algorithm; Camellia block cipher and key wrap algorithms; ChaCha20 and ChaCha20-Poly1305 encryption algorithms; and experimental ML-DSA and SLH-DSA-SHA2 signature algorithms.
  • (xmlsec-gnutls) Added support for EdDSA signature algorithms; ECDH and XDH (X25519 and X448) key agreement algorithms; ConcatKDF, PBKDF2, and HKDF key derivation algorithms; ChaCha20 and ChaCha20-Poly1305 encryption algorithms; SHA2-224 and SHA3-224 digest algorithms; and experimental support for ML-DSA signature algorithms.
  • (xmlsec-nss) Added support for EdDSA (Ed25519) signature algorithms; ECDH and XDH (X25519) key agreement algorithms; ConcatKDF and HKDF key derivation algorithms; and ChaCha20-Poly1305 encryption algorithm. Camellia block cipher and key wrap algorithms.
  • (xmlsec-mscng) Added support for DSA-SHA256 signature algorithm; XDH (X25519) and DH (X9.42 DHX) key agreement algorithms; HKDF key derivation algorithm; and SHA3 digest algorithms.
  • (xmlsec-mscng) Added support for loading CRLs from command line.
  • (xmlsec-test) Created scripts to generate keys, regenerated all keys with standard names, and updated tests accordingly.
  • Several other small fixes (see more details).

XMLSec 1.3.9

10 Nov 00:43
10ff3e4

Choose a tag to compare

The XML Security Library 1.3.9 release includes the following changes:

  • (xmlsec-openssl) Fixed memory leak in X509 certs verification code.
  • (xmlsec-openssl) Added pub/priv key type check for EC and DH keys; improved non-memory EVP keys detection.
  • (xmlsec-openssl) Added octet parser in X509 names.
  • (xmlsec-msncg) Added support for non-persistent PKCS12 keys.
  • (xmlsec-windows) Simplified windows build and removed 'with-dl' option for 'configure.js'.
  • Several other small fixes (see more details).

Thanks everyone for submitting patches and bug reports!

XMLSec 1.3.9 (rc1)

01 Nov 21:47
10ff3e4

Choose a tag to compare

XMLSec 1.3.9 (rc1) Pre-release
Pre-release

The XML Security Library 1.3.9 release includes the following changes:

  • (xmlsec-openssl) Fixed memory leak in X509 certs verification code.
  • (xmlsec-openssl) Added pub/priv key type check for EC and DH keys; improved non-memory EVP keys detection.
  • (xmlsec-openssl) Added octet parser in X509 names.
  • (xmlsec-msncg) Added support for non-persistent PKCS12 keys.
  • (xmlsec-windows) Simplified windows build and removed 'with-dl' option for 'configure.js'.
  • Several other small fixes (see more details).

Thanks everyone for submitting patches and bug reports!

Please test the release candidate (signature) and let me know if you see any issues!

XMLSec 1.3.8

14 Oct 16:13
5c9285e

Choose a tag to compare

The XML Security Library 1.3.8 release includes the following changes:

  • (xmlsec-openssl) Deprecated support for OpenSSL 1.1.1 (reached its End of Life in September, 2023)
  • (xmlsec-openssl) Added AWS-LC support
  • (xmlsec-openssl, xmlsec-gnutls, xmlsec-mscng) Added support for longer than expected DSA and ECDSA sigantures to support broken Java implementations.
  • (xmlsec command line tool) Added option "--add-id-attr" to add ID attributes by name to all nodes in the document.
  • (xmlsec-core) Added RSA MGF1 and digest template API
  • (xmlsec-core) Added example of signing / verifying signature by ID attribute.
  • Several other small fixes (see more details).

Thanks everyone for submitting patches and bug reports!

Please test the release candidate (signature) and let me know if you see any issues!

XMLSec 1.3.8 (rc1)

05 Oct 17:49
5c9285e

Choose a tag to compare

XMLSec 1.3.8 (rc1) Pre-release
Pre-release

The XML Security Library 1.3.8 release includes the following changes:

  • (xmlsec-openssl) Deprecated support for OpenSSL 1.1.1 (reached its End of Life in September, 2023)
  • (xmlsec-openssl) Added AWS-LC support
  • (xmlsec-openssl, xmlsec-gnutls, xmlsec-mscng) Added support for longer than expected DSA and ECDSA sigantures to support broken Java implementations.
  • (xmlsec command line tool) Added option "--add-id-attr" to add ID attributes by name to all nodes in the document.
  • (xmlsec-core) Added RSA MGF1 and digest template API
  • (xmlsec-core) Added example of signing / verifying signature by ID attribute.
  • Several other small fixes (see more details).

Thanks everyone for submitting patches and bug reports!

Please test the release candidate (signature) and let me know if you see any issues!

XMLSec 1.2.42 (legacy)

14 Jun 17:07
e9bfb97

Choose a tag to compare

XMLSec 1.2.x is in MAINTENANCE MODE ; PLEASE UPGRADE TO THE LATEST XMLSec 1.3.x

The legacy XML Security Library 1.2.42 release includes the following changes:

  • (xmlsec-openssl) Ensured that only certificates from XML file are returned after verification.
  • (xmlsec-core) Fixed includes to support latest LibXML2 / LibXSLT.
  • Several other small fixes (more details).

Thanks for bug reports!
Aleksey

XMLSec 1.3.7

11 Feb 15:16
344a375

Choose a tag to compare

The XML Security Library 1.3.7 release includes the following changes:

  • (xmlsec-core) Added XMLSEC_TRANSFORM_FLAGS_USER_SPECIFIED flag to the xmlSecTransform to differentiate transforms specified in the input XML file vs transforms automatically added by XMLSec library.
  • (xmlsec-core) Added signature result verification to the examples to demonstrate the need to ensure the correct data is actually signed.
  • (xmlsec-core) Disabled old crypto algorithms (MD5, RIPEMD160) and the old crypto engines (MSCrypto, GCrypt) by default (use "--with-legacy-features" option to reenable everything).
  • (xmlsec-openssl) Fixed excess padding in ECDSA signature generation.
  • (xmlsec-openssl) Fixed build warnings for BoringSSL / AWS-LC.
  • (xmlsec-nss) Fixed certificates search in NSS DB.
  • (xmlsec-openssl, xmlsec-gnutls, xmlsec-mscng) Added an option to skip timestamp checks for certificates and CLRs.
  • (xmlsec-windows) Disabled old crypto algorithms (MD5, RIPEMD160), made "mscng" the default crypto engine on Windows, and added support for "legacy-features" flag for "configure.js".
  • Several other small fixes (see more details).

Thanks for bug reports!

Aleksey

XMLSec 1.3.7 (rc1)

30 Jan 18:06
c788979

Choose a tag to compare

XMLSec 1.3.7 (rc1) Pre-release
Pre-release

The XML Security Library 1.3.7 release includes the following changes:

  • (xmlsec-core) Added XMLSEC_TRANSFORM_FLAGS_USER_SPECIFIED flag to the xmlSecTransform to differentiate transforms specified in the input XML file vs transforms automatically added by XMLSec library.
  • (xmlsec-core) Added signature result verification to the examples to demonstrate the need to ensure the correct data is actually signed.
  • (xmlsec-core) Disabled old crypto algorithms (MD5, RIPEMD160) and the old crypto engines (MSCrypto, GCrypt) by default (use "--with-legacy-features" option to reenable everything).
  • (xmlsec-openssl) Fixed excess padding in ECDSA signature generation.
  • (xmlsec-nss) Fixed certificates search in NSS DB.
  • (xmlsec-openssl, xmlsec-gnutls, xmlsec-mscng) Added an option to skip timestamp checks for certificates and CLRs.
  • (xmlsec-windows) Disabled old crypto algorithms (MD5, RIPEMD160), made "mscng" the default crypto engine on Windows, and added support for "legacy-features" flag for "configure.js".
  • Several other small fixes (see more details).

Please test the release candidate (signature) and let me know if you see any issues!

XMLSec 1.3.6

22 Oct 13:30
cff6a7f

Choose a tag to compare

The XML Security Library 1.3.6 release includes the following changes:

  • (xmlsec-openssl) Fixed build if OpenSSL 3.0 doesn't have engines support enabled.
  • (xmlsec-mscng, xmlsec-mscrypto) Added support for multiple trusted certs with the same subject.
  • (windows) Disabled iconv support by default (use 'iconv=yes' option for 'configure.js' to re-enable it).
  • Several other small fixes (see more details).

Thanks for bug reports!

Aleksey

XMLSec 1.3.6 (rc1)

07 Oct 19:11
abdda70

Choose a tag to compare

XMLSec 1.3.6 (rc1) Pre-release
Pre-release

The XML Security Library 1.3.6 release includes the following changes:

  • (xmlsec-openssl) Fixed build if OpenSSL 3.0 doesn't have engines support enabled.
  • (xmlsec-mscng, xmlsec-mscrypto) Added support for multiple trusted certs with the same subject.
  • (windows) Disabled iconv support by default (use 'iconv=yes' option for 'configure.js' to re-enable it).
  • Several other small fixes (see more details).

Please test the release candidate (signature) and let me know if you see any issues!