

# AWS CloudHSM deprecated Client SDK releases
<a name="deprecated"></a>

Versions 5.8.0 and earlier are deprecated. We do not recommend using deprecated releases in production workloads. We do not provide backwards compatible updates for deprecated releases, nor do we host deprecated releases for download. If you experience production impact while using deprecated releases, you must upgrade to obtain software fixes. 

## Deprecated Client SDK 5 releases
<a name="client-history-v8"></a>

This section lists deprecated Client SDK 5 releases.

### Version 5.8.0
<a name="client-version-5-8-0"></a>

Version 5.8.0 introduces quorum authentication for CloudHSM CLI, SSL/TLS offload with JSSE, multi-slot support for PKCS \$111, multi-cluster/multi-user support for JCE, key extraction with JCE, supported keyFactory for JCE, new retry configurations for non-terminal return codes, and includes improved stability and bug fixes for all SDKs.

**PKCS \$111 library**
+ Added support for multi-slot configuration.

**JCE provider**
+ Added configuration based key extraction.
+ Added support for multi-cluster and multi-user configurations.
+ Added support for SSL and TLS offload with JSSE.
+ Added unwrap support for AES/CBC/NoPadding.
+ Added new types of key factories: SecretKeyFactory and KeyFactory.

**CloudHSM CLI**
+ Added support for quorum authentication

### Version 5.7.0
<a name="client-version-5-7-0"></a>

Version 5.7.0 introduces CloudHSM CLI and includes a new cipher-based message authentication code (CMAC) algorithm. This release adds ARM architecture on Amazon Linux 2. JCE provider Javadocs are now available for AWS CloudHSM.

**PKCS \$111 library**
+ Improved stability and bug fixes.
+ Now supported on ARM architecture with Amazon Linux 2.
+ Algorithms
  + CKM\$1AES\$1CMAC (sign and verify)

**OpenSSL Dynamic Engine**
+ Improved stability and bug fixes.
+ Now supported on ARM architecture with Amazon Linux 2.

**JCE provider**
+ Improved stability and bug fixes.
+ Algorithms
  + AESCMAC

### Version 5.6.0
<a name="client-version-5-6-0"></a>

Version 5.6.0 includes new mechanism support for PKCS \$111 library and JCE provider. Additionally, version 5.6 supports Ubuntu 20.04.

**PKCS \$111 library**
+ Improved stability and bug fixes.
+ Mechanisms
  + CKM\$1RSA\$1X\$1509, for encrypt, decrypt, sign, and verify modes

**OpenSSL Dynamic Engine**
+ Improved stability and bug fixes.

**JCE provider**
+ Improved stability and bug fixes.
+ Ciphers
  + RSA/ECB/NoPadding, for encrypt and decrypt modes

**Supported keys**
+ EC with curves secp224r1 and secp521r1

**Platform support**
+ Added support for Ubuntu 20.04.

### Version 5.5.0
<a name="client-version-5-5-0"></a>

Version 5.5.0 adds support for OpenJDK 11, Keytool and Jarsigner integration, and additional mechanisms to the JCE provider. Resolves a [known issue](https://docs.aws.amazon.com/cloudhsm/latest/userguide/ki-jce-sdk.html#ki-jce-6) regarding a KeyGenerator class incorrectly interpreting key size parameter as number of bytes instead of bits.

**PKCS \$111 library**
+ Improved stability and bug fixes.

**OpenSSL Dynamic Engine**
+ Improved stability and bug fixes.

**JCE provider**
+ Support for the Keytool and Jarsigner utilities
+ Support for OpenJDK 11 on all platforms
+ Ciphers
  + AES/CBC/NoPadding Encrypt and Decrypt mode
  + AES/ECB/PKCS5Padding Encrypt and Decrypt mode
  + AES/CTR/NoPadding Encrypt and Decrypt mode
  + AES/GCM/NoPadding Wrap and Unwrap mode
  + DESede/ECB/PKCS5Padding Encrypt and Decrypt mode
  + DESede/CBC/NoPadding Encrypt and Decrypt mode
  + AESWrap/ECB/NoPadding Wrap and Unwrap mode
  + AESWrap/ECB/PKCS5Padding Wrap and Unwrap mode
  + AESWrap/ECB/ZeroPadding Wrap and Unwrap mode
  + RSA/ECB/PKCS1Padding Wrap and Unwrap mode
  + RSA/ECB/OAEPPadding Wrap and Unwrap mode
  + RSA/ECB/OAEPWithSHA-1ANDMGF1Padding Wrap and Unwrap mode
  + RSA/ECB/OAEPWithSHA-224ANDMGF1Padding Wrap and Unwrap mode
  + RSA/ECB/OAEPWithSHA-256ANDMGF1Padding Wrap and Unwrap mode
  + RSA/ECB/OAEPWithSHA-384ANDMGF1Padding Wrap and Unwrap mode
  + RSA/ECB/OAEPWithSHA-512ANDMGF1Padding Wrap and Unwrap mode
  + RSAAESWrap/ECB/OAEPPadding Wrap and Unwrap mode
  + RSAAESWrap/ECB/OAEPWithSHA-1ANDMGF1Padding Wrap and Unwrap mode
  + RSAAESWrap/ECB/OAEPWithSHA-224ANDMGF1Padding Wrap and Unwrap mode
  + RSAAESWrap/ECB/OAEPWithSHA-256ANDMGF1Padding Wrap and Unwrap mode
  + RSAAESWrap/ECB/OAEPWithSHA-384ANDMGF1Padding Wrap and Unwrap mode
  + RSAAESWrap/ECB/OAEPWithSHA-512ANDMGF1Padding Wrap and Unwrap mode
+ KeyFactory and SecretKeyFactory
  + RSA – 2048-bit to 4096-bit RSA keys, in increments of 256 bits
  + AES – 128, 192, and 256-bit AES keys
  + EC key pairs for NIST curves secp256r1 (P-256), secp384r1 (P-384), and secp256k1
  + DESede (3DES)
  + GenericSecret
  + HMAC – with SHA1, SHA224, SHA256, SHA384, SHA512 hash support
+ Sign/Verify
  + RSASSA-PSS
  + SHA1withRSA/PSS
  + SHA224withRSA/PSS
  + SHA256withRSA/PSS
  + SHA384withRSA/PSS
  + SHA512withRSA/PSS
  + SHA1withRSAandMGF1
  + SHA224withRSAandMGF1
  + SHA256withRSAandMGF1
  + SHA384withRSAandMGF1
  + SHA512withRSAandMGF1

### Version 5.4.2
<a name="client-version-5-4-2"></a>

Version 5.4.2 includes improved stability and bug fixes for all SDKs. This is also the last release for the CentOS 8 platform. For more information, see the [CentOS website](https://www.centos.org/centos-linux-eol/) .

**PKCS \$111 library**
+ Improved stability and bug fixes.

**OpenSSL Dynamic Engine**
+ Improved stability and bug fixes.

**JCE provider**
+ Improved stability and bug fixes.

### Version 5.4.1
<a name="client-version-5-4-1"></a>

Version 5.4.1 resolves a [known issue](ki-pkcs11-sdk.md#ki-pkcs11-14) with the PKCS \$111 library. This is also the last release for the CentOS 8 platform. For more information, see the [CentOS website](https://www.centos.org/centos-linux-eol/).

**PKCS \$111 library**
+ Improved stability and bug fixes.

**OpenSSL Dynamic Engine**
+ Improved stability and bug fixes.

**JCE provider**
+ Improved stability and bug fixes.

### Version 5.4.0
<a name="client-version-5-4-0"></a>

Version 5.4.0 adds initial support for the JCE provider for all platforms. The JCE provider is compatible with OpenJDK 8.

**PKCS \$111 library**
+ Improved stability and bug fixes.

**OpenSSL Dynamic Engine**
+ Improved stability and bug fixes.

**JCE provider**
+ 

**Key types**
  + RSA – 2048-bit to 4096-bit RSA keys, in increments of 256 bits.
  + AES – 128, 192, and 256-bit AES keys.
  + ECC key pairs for NIST curves secp256r1 (P-256), secp384r1 (P-384), and secp256k1.
  + DESede (3DES)
  + HMAC – with SHA1, SHA224, SHA256, SHA384, SHA512 hash support.
+ 

**Ciphers (encrypt and decrypt only)**
  + AES/GCM/NoPadding
  + AES/ECB/NoPadding
  + AES/CBC/PKCS5Padding
  + DESede/ECB/NoPadding
  + DESede/CBC/PKCS5Padding
  + AES/CTR/NoPadding
  + RSA/ECB/PKCS1Padding
  + RSA/ECB/OAEPPadding
  + RSA/ECB/OAEPWithSHA-1ANDMGF1Padding
  + RSA/ECB/OAEPWithSHA-224ANDMGF1Padding
  + RSA/ECB/OAEPWithSHA-256ANDMGF1Padding
  + RSA/ECB/OAEPWithSHA-384ANDMGF1Padding
  + RSA/ECB/OAEPWithSHA-512ANDMGF1Padding
+ 

**Digests**
  + SHA-1
  + SHA-224
  + SHA-256
  + SHA-384
  + SHA-512
+ 

**Sign/Verify**
  + NONEwithRSA
  + SHA1withRSA
  + SHA224withRSA
  + SHA256withRSA
  + SHA384withRSA
  + SHA512withRSA
  + NONEwithECDSA
  + SHA1withECDSA
  + SHA224withECDSA
  + SHA256withECDSA
  + SHA384withECDSA
  + SHA512withECDSA
+ Integration with the Java KeyStore

### Version 5.3.0
<a name="client-version-5-3-0"></a>

 **PKCS \$111 library** 
+ Improved stability and bug fixes.

 **OpenSSL Dynamic Engine** 
+ Add support for ECDSA sign/verify with curves P-256, P-384, and secp256k1.
+ Add support for the platforms: Amazon Linux, Amazon Linux 2, CentOS 7.8\$1, RHEL 7 (7.8\$1).
+ Add support for OpenSSL version 1.0.2.
+ Improved stability and bug fixes.

**JCE provider**
+ 

**Key types**
  + RSA – 2048-bit to 4096-bit RSA keys, in increments of 256 bits.
  + AES – 128, 192, and 256-bit AES keys.
  + EC key pairs for NIST curves secp256r1 (P-256), secp384r1 (P-384), and secp256k1.
  + DESede (3DES)
  + HMAC – with SHA1, SHA224, SHA256, SHA384, SHA512 hash support.
+ 

**Ciphers (encrypt and decrypt only)**
  + AES/GCM/NoPadding
  + AES/ECB/NoPadding
  + AES/CBC/PKCS5Padding
  + DESede/ECB/NoPadding
  + DESede/CBC/PKCS5Padding
  + AES/CTR/NoPadding
  + RSA/ECB/PKCS1Padding
  + RSA/ECB/OAEPPadding
  + RSA/ECB/OAEPWithSHA-1ANDMGF1Padding
  + RSA/ECB/OAEPWithSHA-224ANDMGF1Padding
  + RSA/ECB/OAEPWithSHA-256ANDMGF1Padding
  + RSA/ECB/OAEPWithSHA-384ANDMGF1Padding
  + RSA/ECB/OAEPWithSHA-512ANDMGF1Padding
+ 

**Digests**
  + SHA-1
  + SHA-224
  + SHA-256
  + SHA-384
  + SHA-512
+ 

**Sign/Verify**
  + NONEwithRSA
  + SHA1withRSA
  + SHA224withRSA
  + SHA256withRSA
  + SHA384withRSA
  + SHA512withRSA
  + NONEwithECDSA
  + SHA1withECDSA
  + SHA224withECDSA
  + SHA256withECDSA
  + SHA384withECDSA
  + SHA512withECDSA
+ Integration with the Java KeyStore

### Version 5.2.1
<a name="client-version-5-2-1"></a>

 **PKCS \$111 library** 
+ Improved stability and bug fixes.

 **OpenSSL Dynamic Engine** 
+ Improved stability and bug fixes.

### Version 5.2.0
<a name="client-version-5-2-0"></a>

Version 5.2.0 adds support additional key types and mechanisms to the PKCS \$111 library.

 **PKCS \$111 library** 

Key Types
+ ECDSA– P-224, P-256, P-384, P-521 and secp256k1 curves
+ Triple DES (3DES)

Mechanisms
+ CKM\$1EC\$1KEY\$1PAIR\$1GEN
+ CKM\$1DES3\$1KEY\$1GEN
+ CKM\$1DES3\$1CBC
+ CKM\$1DES3\$1CBC\$1PAD
+ CKM\$1DES3\$1ECB
+ CKM\$1ECDSA
+ CKM\$1ECDSA\$1SHA1
+ CKM\$1ECDSA\$1SHA224
+ CKM\$1ECDSA\$1SHA256
+ CKM\$1ECDSA\$1SHA384
+ CKM\$1ECDSA\$1SHA512
+ CKM\$1RSA\$1PKCS for Encrypt/Decrypt

 **OpenSSL Dynamic Engine** 
+ Improved stability and bug fixes.

### Version 5.1.0
<a name="client-version-5-1-0"></a>

Version 5.1.0 adds support for additional mechanisms to the PKCS \$111 library.

 **PKCS \$111 library** 

Mechanisms
+ CKM\$1RSA\$1PKCS for Wrap/Unwrap
+ CKM\$1RSA\$1PKCS\$1PSS
+ CKM\$1SHA1\$1RSA\$1PKCS\$1PSS
+ CKM\$1SHA224\$1RSA\$1PKCS\$1PSS
+ CKM\$1SHA256\$1RSA\$1PKCS\$1PSS
+ CKM\$1SHA384\$1RSA\$1PKCS\$1PSS
+ CKM\$1SHA512\$1RSA\$1PKCS\$1PSS
+ CKM\$1AES\$1ECB
+ CKM\$1AES\$1CTR
+ CKM\$1AES\$1CBC
+ CKM\$1AES\$1CBC\$1PAD
+ CKM\$1SP800\$1108\$1COUNTER\$1KDF
+ CKM\$1GENERIC\$1SECRET\$1KEY\$1GEN
+ CKM\$1SHA\$11\$1HMAC
+ CKM\$1SHA224\$1HMAC
+ CKM\$1SHA256\$1HMAC
+ CKM\$1SHA384\$1HMAC
+ CKM\$1SHA512\$1HMAC
+ CKM\$1RSA\$1PKCS\$1OAEP Wrap/Unwrap only
+ CKM\$1RSA\$1AES\$1KEY\$1WRAP
+ CKM\$1CLOUDHSM\$1AES\$1KEY\$1WRAP\$1NO\$1PAD
+ CKM\$1CLOUDHSM\$1AES\$1KEY\$1WRAP\$1PKCS5\$1PAD
+ CKM\$1CLOUDHSM\$1AES\$1KEY\$1WRAP\$1ZERO\$1PAD

API Operations
+ C\$1CreateObject
+ C\$1DeriveKey
+ C\$1WrapKey
+ C\$1UnWrapKey

 **OpenSSL Dynamic Engine** 
+ Improved stability and bug fixes.

### Version 5.0.1
<a name="client-version-5-0-1"></a>

Version 5.0.1 adds initial support for OpenSSL Dynamic Engine.

 **PKCS \$111 library** 
+ Improved stability and bug fixes.

 **OpenSSL Dynamic Engine** 
+ Initial release of OpenSSL Dynamic Engine. 
+ This release offers introductory support for key types and OpenSSL APIs: 
  + RSA key generation for 2048, 3072, and 4096-bit keys
  + OpenSSL APIs: 
    + [RSA Sign](https://www.openssl.org/docs/man1.1.1/man3/EVP_DigestSignInit.html) using RSA PKCS with SHA1/224/256/384/512 & RSA PSS
    +  [RSA Key Generation](https://www.openssl.org/docs/man1.1.1/man1/genrsa.html) 

  For more information, see [OpenSSL Dynamic Engine](openssl-library.md) .
+ Platforms supported: CentOS 8.3\$1, Red Hat Enterprise Linux (RHEL) 8.3\$1, and Ubuntu 18.04 LTS
  + Requires: OpenSSL 1.1.1

  For more information, see [Supported Platforms](client-supported-platforms.md).
+ Support for SSL/TLS Offload on CentOS 8.3\$1, Red Hat Enterprise Linux (RHEL) 8.3, and Ubuntu 18.04 LTS, including NGINX 1.19 (for select cipher suites).

  For more information, see [SSL/TLS Offload on Linux using Tomcat](third-offload-linux-jsse.md) or [SSL/TLS Offload on Linux using NGINX or Apache](third-offload-linux-openssl.md).

### Version 5.0.0
<a name="client-version-5-0-0"></a>

Version 5.0.0 is the first release.

 **PKCS \$111 library** 
+ This is the initial release.

#### Introductory PKCS \$111 library support in client SDK version 5.0.0
<a name="pkcs11-sdk5-partial-support"></a>

This section details support for key types, mechanisms, API operations and attributes Client SDK version 5.0.0.

**Key Types**: 
+ **AES**– 128, 192, and 256-bit AES keys
+ **RSA**– 2048-bit to 4096-bit RSA keys, in increments of 256 bits

**Mechanisms**: 
+ CKM\$1AES\$1GCM
+ CKM\$1AES\$1KEY\$1GEN
+ CKM\$1CLOUDHSM\$1AES\$1GCM
+ CKM\$1RSA\$1PKCS
+ CKM\$1RSA\$1X9\$131\$1KEY\$1PAIR\$1GEN
+ CKM\$1SHA1
+ CKM\$1SHA1\$1RSA\$1PKCS
+ CKM\$1SHA224
+ CKM\$1SHA224\$1RSA\$1PKCS
+ CKM\$1SHA256
+ CKM\$1SHA256\$1RSA\$1PKCS
+ CKM\$1SHA384
+ CKM\$1SHA384\$1RSA\$1PKCS
+ CKM\$1SHA512
+ CKM\$1SHA512\$1RSA\$1PKCS

**API Operations**:
+ C\$1CloseAllSessions
+ C\$1CloseSession
+ C\$1Decrypt
+ C\$1DecryptFinal
+ C\$1DecryptInit
+ C\$1DecryptUpdate
+ C\$1DestroyObject
+ C\$1Digest
+ C\$1DigestFinal
+ C\$1DigestInit
+ C\$1DigestUpdate
+ C\$1Encrypt
+ C\$1EncryptFinal
+ C\$1EncryptInit
+ C\$1EncryptUpdate
+ C\$1Finalize
+ C\$1FindObjects
+ C\$1FindObjectsFinal
+ C\$1FindObjectsInit
+ C\$1GenerateKey
+ C\$1GenerateKeyPair
+ C\$1GenerateRandom
+ C\$1GetAttributeValue
+ C\$1GetFunctionList
+ C\$1GetInfo
+ C\$1GetMechanismInfo
+ C\$1GetMechanismList
+ C\$1GetSessionInfo
+ C\$1GetSlotInfo
+ C\$1GetSlotList
+ C\$1GetTokenInfo
+ C\$1Initialize
+ C\$1Login
+ C\$1Logout
+ C\$1OpenSession
+ C\$1Sign
+ C\$1SignFinal
+ C\$1SignInit
+ C\$1SignUpdate
+ C\$1Verify
+ C\$1VerifyFinal
+ C\$1VerifyInit
+ C\$1VerifyUpdate

**Attributes**:
+ GenerateKeyPair
  + All RSA Key attributes
+ GenerateKey
  + All AES Key attributes
+ GetAttributeValue
  + All RSA Key attributes
  + All AES Key attributes

**Samples**:
+  [Generate keys (AES, RSA, EC)](https://github.com/aws-samples/aws-cloudhsm-pkcs11-examples/blob/master/src/generate) 
+  [List key attributes](https://github.com/aws-samples/aws-cloudhsm-pkcs11-examples/blob/master/src/attributes/) 
+  [Encrypt and decrypt data with AES GCM](https://github.com/aws-samples/aws-cloudhsm-pkcs11-examples/blob/master/src/encrypt/aes_gcm.c) 
+  [Sign and verify data with RSA](https://github.com/aws-samples/aws-cloudhsm-pkcs11-examples/blob/master/src/sign/rsa_sign.c) 

## Deprecated Client SDK 3 releases
<a name="client-history-v3"></a>

This section lists deprecated Client SDK 3 releases.

### Version 3.4.4
<a name="client-version-3-4-4"></a>

 Version 3.4.4 adds updates to JCE provider.

 **AWS CloudHSM Client Software** 
+ Updated the version for consistency.

 **PKCS \$111 library** 
+ Updated the version for consistency.

 **OpenSSL Dynamic Engine** 
+ Updated the version for consistency.

 **JCE provider** 
+ Update log4j to version 2.17.1.

 **Windows (CNG and KSP providers)** 
+ Updated the version for consistency.

### Version 3.4.3
<a name="client-version-3-4-3"></a>

 Version 3.4.3 adds updates to JCE provider.

 **AWS CloudHSM Client Software** 
+ Updated the version for consistency.

 **PKCS \$111 library** 
+ Updated the version for consistency.

 **OpenSSL Dynamic Engine** 
+ Updated the version for consistency.

 **JCE provider** 
+ Update log4j to version 2.17.0.

 **Windows (CNG and KSP providers)** 
+ Updated the version for consistency.

### Version 3.4.2
<a name="client-version-3-4-2"></a>

 Version 3.4.2 adds updates to JCE provider.

 **AWS CloudHSM Client Software** 
+ Updated the version for consistency.

 **PKCS \$111 library** 
+ Updated the version for consistency.

 **OpenSSL Dynamic Engine** 
+ Updated the version for consistency.

 **JCE provider** 
+ Update log4j to version 2.16.0.

 **Windows (CNG and KSP providers)** 
+ Updated the version for consistency.

### Version 3.4.1
<a name="client-version-3-4-1"></a>

 Version 3.4.1 adds updates to JCE provider.

 **AWS CloudHSM Client Software** 
+ Updated the version for consistency.

 **PKCS \$111 library** 
+ Updated the version for consistency.

 **OpenSSL Dynamic Engine** 
+ Updated the version for consistency.

 **JCE provider** 
+ Update log4j to version 2.15.0.

 **Windows (CNG and KSP providers)** 
+ Updated the version for consistency.

### Version 3.4.0
<a name="client-version-3-4-0"></a>

Version 3.4.0 adds updates to all components.

 **AWS CloudHSM Client Software** 
+ Improved stability and bug fixes.

 **PKCS \$111 library** 
+ Improved stability and bug fixes.

 **OpenSSL Dynamic Engine** 
+ Improved stability and bug fixes.

 **JCE provider** 
+ Improved stability and bug fixes.

 **Windows (CNG and KSP providers)** 
+ Improved stability and bug fixes.

### Version 3.3.2
<a name="client-version-3-3-2"></a>

Version 3.3.2 resolves an [ issue](https://docs.aws.amazon.com/cloudhsm/latest/userguide/ki-all.html#ki-all-9) with the client\$1info script.

 **AWS CloudHSM Client Software** 
+ Updated the version for consistency.

 **PKCS \$111 library** 
+ Updated the version for consistency.

 **OpenSSL Dynamic Engine** 
+ Updated the version for consistency.

 **JCE provider** 
+ Updated the version for consistency.

 **Windows (CNG and KSP providers)** 
+ Updated the version for consistency.

### Version 3.3.1
<a name="client-version-3-3-1"></a>

Version 3.3.1 adds updates to all components.

 **AWS CloudHSM Client Software** 
+ Improved stability and bug fixes.

 **PKCS \$111 library** 
+ Improved stability and bug fixes.

 **OpenSSL Dynamic Engine** 
+ Improved stability and bug fixes.

 **JCE provider** 
+ Improved stability and bug fixes.

 **Windows (CNG and KSP providers)** 
+ Improved stability and bug fixes.

### Version 3.3.0
<a name="client-version-3-3-0"></a>

 Version 3.3.0 adds two-factor authentication (2FA) and other improvements.

 **AWS CloudHSM Client Software** 
+ Added 2FA authentication for crypto officers (CO). For more information, see [Managing Two-Factor Authentication for Crypto Officers](manage-2fa.md). 
+ Removed platform support for RedHat Enterprise Linux 6 and CentOS 6. For more information, see [Linux Support](sdk3-linux.md).
+ Added a standalone version of CMU for use with Client SDK 5 or Client SDK 3. This is the same version of CMU included with the client daemon of version 3.3.0, and now you can download CMU without downloading the client daemon.

 **PKCS \$111 library** 
+ Improved stability and bug fixes.
+ Removed platform support for RedHat Enterprise Linux 6 and CentOS 6. For more information, see [Linux Support](sdk3-linux.md).

 **OpenSSL Dynamic Engine** 
+ Updated the version for consistency
+ Removed platform support for RedHat Enterprise Linux 6 and CentOS 6. For more information, see [Linux Support](sdk3-linux.md).

 **JCE provider** 
+ Improved stability and bug fixes.
+ Removed platform support for RedHat Enterprise Linux 6 and CentOS 6. For more information, see [Linux Support](sdk3-linux.md).

 **Windows (CNG and KSP providers)** 
+ Updated the version for consistency

### Version 3.2.1
<a name="client-version-3-2-1"></a>

Version 3.2.1 adds a compliance analysis between the AWS CloudHSM implementation of the PKCS \$111 library and the PKCS \$111 standard, new platforms, and other improvements.

 **AWS CloudHSM Client Software** 
+ Add platform support for CentOS 8, RHEL 8, and Ubuntu 18.04 LTS. For more information, see [AWS CloudHSM Client SDK 5 supported platforms](client-supported-platforms.md) .

 **PKCS \$111 library** 
+  [PKCS \$111 library compliance report for client SDK 3.2.1](https://s3.amazonaws.com/cloudhsmv2-software/CloudHsmClient/Docs/PKCS11ComplianceReportSDK3-2-1.pdf) 
+ Add platform support for CentOS 8, RHEL 8, and Ubuntu 18.04 LTS. For more information, see [AWS CloudHSM Client SDK 5 supported platforms](client-supported-platforms.md) .

 **OpenSSL Dynamic Engine** 
+ No support for CentOS 8, RHEL 8, and Ubuntu 18.04 LTS. For more information, see [Known issues for the OpenSSL Dynamic Engine for AWS CloudHSM](ki-openssl-sdk.md).

 **JCE provider** 
+ Add platform support for CentOS 8, RHEL 8, and Ubuntu 18.04 LTS. For more information, see [AWS CloudHSM Client SDK 5 supported platforms](client-supported-platforms.md) .

 **Windows (CNG and KSP providers)** 
+ Improved stability and bug fixes.

### Version 3.2.0
<a name="client-version-3-2-0"></a>

Version 3.2.0 adds support for masking passwords and other improvements.

 **AWS CloudHSM Client Software** 
+ Adds support for hiding your password when using command-line tools. For more information, see [loginHSM and logoutHSM ](cloudhsm_mgmt_util-loginLogout.md) (cloudhsm\$1mgmt\$1util) and [loginHSM and logoutHSM](key_mgmt_util-loginHSM.md) (key\$1mgmt\$1util). 

 **PKCS \$111 library** 
+ Adds support for hashing large data in software for some PKCS \$111 mechanisms that were previously unsupported. For more information, see [Supported Mechanisms](pkcs11-mechanisms.md).

 **OpenSSL Dynamic Engine** 
+ Improved stability and bug fixes.

 **JCE provider** 
+ Updated the version for consistency.

 **Windows (CNG and KSP providers)** 
+ Improved stability and bug fixes.

### Version 3.1.2
<a name="client-version-3-1-2"></a>

 Version 3.1.2 adds updates to JCE provider.

 **AWS CloudHSM Client Software** 
+ Updated the version for consistency

 **PKCS \$111 library** 
+ Updated the version for consistency

 **OpenSSL Dynamic Engine** 
+ Updated the version for consistency

 **JCE provider** 
+ Update log4j to version 2.13.3

 **Windows (CNG and KSP providers)** 
+ Updated the version for consistency

### Version 3.1.1
<a name="client-version-3-1-1"></a>

 **AWS CloudHSM Client Software** 
+ Updated the version for consistency.

 **PKCS \$111 Library** 
+ Updated the version for consistency.

 **OpenSSL Dynamic Engine** 
+ Updated the version for consistency.

 **JCE provider** 
+ Bug fixes and performance improvements.

 **Windows (CNG, KSP)** 
+ Updated the version for consistency.

### Version 3.1.0
<a name="client-version-3-1"></a>

 Version 3.1.0 adds [standards-compliant AES key wrapping](manage-aes-key-wrapping.md).

 **AWS CloudHSM Client Software** 
+ A new requirement for upgrade: the version of your client must match the version of any software libraries you are using. To upgrade, you must use a batch command that upgrades the client and all the libraries at the same time. For more information, see [Client SDK 3 Upgrade](client-upgrade.md). 
+ Key\$1mgmt\$1util (KMU) includes the following updates:
  + Added two new AES key wrap methods – standards-compliant AES key wrap with zero padding and AES key wrap with no padding. For more information, see [wrapKey](key_mgmt_util-wrapKey.md) and [unwrapKey](key_mgmt_util-unwrapKey.md). 
  + Disabled ability to specify custom IV when wrapping a key using AES\$1KEY\$1WRAP\$1PAD\$1PKCS5. For more information, see [AES Key Wrapping](manage-aes-key-wrapping.md).

 **PKCS \$111 Library** 
+ Added two new AES key wrap methods – standards-compliant AES key wrap with zero padding and AES key wrap with no padding. For more information, see [AES Key Wrapping](manage-aes-key-wrapping.md). 
+ You can configure salt length for RSA-PSS signatures. To learn how to use this feature, see [Configurable salt length for RSA-PSS signatures](https://github.com/aws-samples/aws-cloudhsm-pkcs11-examples) on GitHub.

 **OpenSSL Dynamic Engine** 
+ **BREAKING CHANGE**: TLS 1.0 and 1.2 cipher suites with SHA1 are not available in OpenSSL Engine 3.1.0. This issue will be resolved shortly.
+ If you intend to install the OpenSSL Dynamic Engine library on RHEL 6 or CentOS 6, see a [known issue](ki-openssl-sdk.md#openssl-default-version) about the default OpenSSL version installed on those operating systems. 
+ Improved stability and bug fixes

 **JCE provider** 
+ **BREAKING CHANGE**: To address an issue with Java Cryptography Extension (JCE) compliance, AES wrap and unwrap now properly use the AESWrap algorithm instead of the AES algorithm. This means `Cipher.WRAP_MODE` and ` Cipher.UNWRAP_MODE` no longer succeed for AES/ECB and AES/CBC mechanisms. 

  To upgrade to client version 3.1.0, you must update your code. If you have existing wrapped keys, you must pay particular attention to the mechanism you use to unwrap and how IV defaults have changed. If you wrapped keys with client version 3.0.0 or earlier, then in 3.1.1 you must use AESWrap/ECB/PKCS5Padding to unwrap your existing keys. For more information, see [AES Key Wrapping](manage-aes-key-wrapping.md). 
+ You can list multiple keys with the same label from the JCE provider. To learn how to iterate through all available keys, see [Find all keys](https://github.com/aws-samples/aws-cloudhsm-jce-examples/blob/master/src/main/java/com/amazonaws/cloudhsm/examples/KeyUtilitiesRunner.java) on GitHub. 
+ You can set more restrictive values for attributes during key creation, including specifying different labels for public and private keys. For more information, see [Supported Java Attributes](java-lib-attributes.md). 

 **Windows (CNG, KSP)** 
+ Improved stability and bug fixes.