mirror of https://github.com/wolfSSL/wolfssl.git
prepare for release version 4.1.0
parent
2befc9d68f
commit
77fda069a8
104
ChangeLog.md
104
ChangeLog.md
|
@ -1,3 +1,107 @@
|
||||||
|
# wolfSSL Release 4.1.0 (07/22/2019)
|
||||||
|
|
||||||
|
Release 4.1.0 of wolfSSL embedded TLS has bug fixes and new features including:
|
||||||
|
|
||||||
|
* A fix for the check on return value when verifying PKCS7 bundle signatures, all users with applications using the function wc_PKCS7_VerifySignedData should update
|
||||||
|
* Adding the function wc_PKCS7_GetSignerSID for PKCS7 firmware bundles as a getter function for the signers SID
|
||||||
|
* PKCS7 callback functions for unwrapping of CEK and for decryption
|
||||||
|
* Adding the error value PKCS7_SIGNEEDS_CHECK when no certificates are available in a PKCS7 bundle to verify the signature
|
||||||
|
* TLS 1.3 fixes including if major version is TLS Draft then it is now ignored and if version negotiation occurs but none were matched then an alert is now sent
|
||||||
|
* Addition of the WOLFSSL_PSK_ONE_ID macro for indicating that only one identity in TLS 1.3 PSK is available and will be cached
|
||||||
|
* Adding sanity checks on length of PSK identity from a TLS 1.3 pre-shared key extension
|
||||||
|
* Additional sanity checks and alert messages added for TLS 1.3
|
||||||
|
* Adding XTIME_MS macro to simplify the tls13.c time requirement
|
||||||
|
* Improvements and refactoring of code related to parsing and creating TLS 1.3 client hello packets
|
||||||
|
* TLS 1.3 version renegotiation now happens before interpreting ClientHello message
|
||||||
|
* Chacha20 algorithm optimizations on the ARM architecture for performance increase
|
||||||
|
* Poly1305 algorithm performance enhancements for the ARM architecture using the SIMD NEON extension
|
||||||
|
* Curve25519 and Ed25519 optimized for ARM architecture for performance increase
|
||||||
|
* SHA-512/384 optimizations for performance with ARM architecture using the SIMD NEON extension
|
||||||
|
* Sniffer updates including adding support for the null cipher and static ECDH key exchange and new SSLWatchCb callback
|
||||||
|
* Cipher suite TLS_RSA_WITH_NULL_MD5 for use with the sniffer (off by default)
|
||||||
|
* Sniffer statistic print outs with the macro WOLFSSL_SNIFFER_STATS defined
|
||||||
|
* A fix for wolfSSL_DH_generate_key when WOLFSSL_SMALL_STACK is defined
|
||||||
|
* wolfSSL_BN_Init implementation for opensslextra builds
|
||||||
|
* Updates to the function wolfSSL_i2d_RSAPrivateKey and additional automated tests
|
||||||
|
* Fixes for EVP_CipherFinal edge cases to match behavior desired
|
||||||
|
* Check for appropriate private vs public flag with ECC key decode in wolfSSL_EC_KEY_LoadDer_ex, thanks to Eric Miller for the report
|
||||||
|
* Implementation of the function wolfSSL_PEM_write_DHparams
|
||||||
|
* wolfSSL_RAND_seed is called in wolfSSL_Init now when opensslextra is enabled
|
||||||
|
* CryptoCell-310 support on nRF52840 added
|
||||||
|
* Fixes for atmel_ecc_create_pms to free the used slot.
|
||||||
|
* Fixes for building ATECC with ATCAPRINTF or WOLFSSL_PUBLIC_MP
|
||||||
|
* Cortex-M code changes to support IAR compiler
|
||||||
|
* Improvements to STM32 AES-GCM performance
|
||||||
|
* Fixes for 16-bit systems including PK callbacks, ATECC and LowResTimer function ptoto.
|
||||||
|
* IAR-EWARM compiler warning fix
|
||||||
|
* Clean up of user_settings for CS+ port
|
||||||
|
* Updating Renesas example projects to the latest version
|
||||||
|
* Micrium updates adjusting STATIC macro name and added inline flag
|
||||||
|
* Fixes for building with WOLFSSL_CUSTOM_CURVES on Windows
|
||||||
|
* Updates and refactor to the default build settings with Arduino
|
||||||
|
* Fixes for visibility tags with Cygwin build
|
||||||
|
* STSAFE Improvements to support wolfSSL Crypto Callbacks
|
||||||
|
* Improvements to NetBSD builds and mutex use in test case
|
||||||
|
* Updating TI hardware offload with WOLFSSL_TI_CRYPT build
|
||||||
|
* Maintaining Xilinx FreeRTOS port by adjusting time.h include in wolfSSL
|
||||||
|
* SiFive HiFive E31 RISC‐V core family port
|
||||||
|
* Port for Telit IoT AppZone SDK
|
||||||
|
* OCSP Response signed by issuer with identical SKID fix
|
||||||
|
* Fix for sending revoked certificate with OCSP
|
||||||
|
* Honor the status sent over connection with peers and do not perform an internal OCSP lookup
|
||||||
|
* Adding the build flag `--enable-ecccustcurves=all` to enable all curve types
|
||||||
|
* Support add for Ed25519ctx and Ed25519ph sign/verify algorithms as per RFC 8032
|
||||||
|
* Addition of the macro WOLFSSL_NO_SIGALG to disable signature algorithms extension
|
||||||
|
* wc_AesCtrEncrypt in place addition, where input and output buffer can be the same buffer
|
||||||
|
* Single shot API added for SHA3; wc_Sha3_224Hash, wc_Sha3_256Hash, wc_Sha3_384Hash, wc_Sha3_512Hash
|
||||||
|
* Function additions for JSSE support some of which are wolfSSL_get_ciphers_iana and wolfSSL_X509_verify along with expansion of the --enable-jni option
|
||||||
|
* Macro guards for more modular SHA3 build (i.e. support for 384 size only)
|
||||||
|
* Benchmarking -thread <num> argument support for asynchronous crypto
|
||||||
|
* Blake2s support (--enable-blake2s), which provides 32-bit Blake2 support
|
||||||
|
* Macro SHA256_MANY_REGISTERS addition to potentially speed up SHA256 depending on architecture
|
||||||
|
* Additional TLS alert messages sent with the macro WOLFSSL_EXTRA_ALERTS defined
|
||||||
|
* Feature to fail resumption of a session if the session’s cipher suite is not in the client’s list, this can be overridden by defining the macro NO_RESUME_SUITE_CHECK
|
||||||
|
* Fallback SCSV (Signaling Cipher Suite Value) support on Server only (--enable-fallback-scsv)
|
||||||
|
* DTLS export state only (wolfSSL_dtls_export_state_only) which is a subset of the information exported from previous DTLS export function
|
||||||
|
* Function wc_DhCheckPubValue added to perform simple validity checks on DH keys
|
||||||
|
* Support for RSA SHA-224 signatures with TLS added
|
||||||
|
* Additional option “-print” to the benchmark app for printing out a brief summary after benchmarks are complete
|
||||||
|
* Adding (--disable-pkcs12) option and improvements for disabled sections in pwdbased.c, asn.c, rsa.c, pkcs12.c and wc_encrypt
|
||||||
|
* Added DES3 support to the wolfSSL crypto callbacks
|
||||||
|
* Compile time fixes for build case with SP math and RSA only
|
||||||
|
* Fixes for Coverity static analysis report including explicit initialization of reported stack variables some additional Coverity fixes added thanks to Martin
|
||||||
|
* Fixes for scan build warnings (i.e possible null dereference in ecc.c)
|
||||||
|
* Resetting verify send value with a call to wolfSSL_clear function
|
||||||
|
* Fix for extern with sp_ModExp_2048 when building with --cpp option
|
||||||
|
* Fix for typo issue with --enable-sp=cortexm
|
||||||
|
* Adding #pragma warning disable 4127 for tfm.c when building with Visual Studio
|
||||||
|
* Improvements to the maximum ECC signature calculations
|
||||||
|
* Improvements to TLS write handling in error cases which helps user application not go through with a wolfSSL_write attempt after a wolfSSL_read failure
|
||||||
|
* Fix for read directory functions with Windows (wc_ReadDirFirst and wc_ReadDirNext)
|
||||||
|
* Sanity check on index before accessing domain component buffer in call to wolfSSL_X509_NAME_get_entry
|
||||||
|
* Sending fatal alert from client side on version error
|
||||||
|
* Fix for static RSA cipher suite with PK callback and no loaded private key
|
||||||
|
* Fix for potential memory leak in error case with the function wc_DsaKeyToDer, thanks to Chris H. for the report
|
||||||
|
* Adjusting STRING_USER macro to remove includes of standard lib <string.h> or <stdio.h>
|
||||||
|
* Bug fix for checking wrong allocation assignment in the function wc_PBKDF2 and handling potential leak on allocation failure. This case is only hit when the specific call to malloc fails in the function wc_PBKDF2. Thanks to Robert Altnoeder (Linbit) for the report
|
||||||
|
* Improved length checks when parsing ASN.1 certificates
|
||||||
|
* extern "C" additions to header files that were missing them
|
||||||
|
* Improved checking of return values with TLS extension functions and error codes
|
||||||
|
* Removing redundant calls to the generate function when instantiating and reseeding DRBG
|
||||||
|
* Refactoring and improvements to autoconf code with consolidating AM_CONDITIONAL statements
|
||||||
|
* Improvements for handling error return codes when reading input from transport layer
|
||||||
|
* Improvements to efficiency of SNI extension parsing and error checking with ALPN parsing
|
||||||
|
* Macro WOLFSSL_DEBUG_TLS addition for printing out extension data being parsed during a TLS connection
|
||||||
|
* Adjustment of prime testing with --disable-fastmath builds
|
||||||
|
|
||||||
|
|
||||||
|
This release of wolfSSL includes a fix for 2 security vulnerabilities.
|
||||||
|
|
||||||
|
There is a fix for a potential buffer overflow case with the TLSv1.3 PSK extension parsing. This affects users that are enabling TLSv1.3 (--enable-tls13). Thanks to Robert Hoerr for the report. The CVE associated with the report is CVE-2019-11873.
|
||||||
|
|
||||||
|
There is a fix for the potential leak of nonce sizes when performing ECDSA signing operations. The leak is considered to be difficult to exploit but it could potentially be used maliciously to perform a lattice based timing attack against previous wolfSSL versions. ECC operations with --enable-sp and --enable-sp-asm are not affected, users with private ECC keys in other builds that are performing ECDSA signing operations should update versions of wolfSSL along with private ECC keys. Thanks to Ján Jančár from Masaryk University for the report.
|
||||||
|
|
||||||
|
|
||||||
# wolfSSL Release 4.0.0 (03/20/2019)
|
# wolfSSL Release 4.0.0 (03/20/2019)
|
||||||
|
|
||||||
Release 4.0.0 of wolfSSL embedded TLS has bug fixes and new features including:
|
Release 4.0.0 of wolfSSL embedded TLS has bug fixes and new features including:
|
||||||
|
|
150
README
150
README
|
@ -73,62 +73,108 @@ should be used for the enum name.
|
||||||
*** end Notes ***
|
*** end Notes ***
|
||||||
|
|
||||||
|
|
||||||
********* wolfSSL Release 4.0.0 (03/20/2019)
|
********* wolfSSL Release 4.1.0 (07/22/2019)
|
||||||
|
|
||||||
Release 4.0.0 of wolfSSL embedded TLS has bug fixes and new features including:
|
Release 4.1.0 of wolfSSL embedded TLS has bug fixes and new features including:
|
||||||
|
|
||||||
* Support for wolfCrypt FIPS v4.0.0, certificate #3389
|
* A fix for the check on return value when verifying PKCS7 bundle signatures, all users with applications using the function wc_PKCS7_VerifySignedData should update
|
||||||
* FIPS Ready Initiative
|
* Adding the function wc_PKCS7_GetSignerSID for PKCS7 firmware bundles as a getter function for the signers SID
|
||||||
* Compatibility fixes for secure renegotiation with Chrome
|
* PKCS7 callback functions for unwrapping of CEK and for decryption
|
||||||
* Better size check for TLS record fragment reassembly
|
* Adding the error value PKCS7_SIGNEEDS_CHECK when no certificates are available in a PKCS7 bundle to verify the signature
|
||||||
* Improvements to non-blocking and handshake message retry support for DTLS
|
* TLS 1.3 fixes including if major version is TLS Draft then it is now ignored and if version negotiation occurs but none were matched then an alert is now sent
|
||||||
* Improvements to OCSP with ECDSA signers
|
* Addition of the WOLFSSL_PSK_ONE_ID macro for indicating that only one identity in TLS 1.3 PSK is available and will be cached
|
||||||
* Added TLS server side secure renegotiation
|
* Adding sanity checks on length of PSK identity from a TLS 1.3 pre-shared key extension
|
||||||
* Added TLS Trusted CA extension
|
* Additional sanity checks and alert messages added for TLS 1.3
|
||||||
* Add support for the Deos Safety Critical RTOS
|
* Adding XTIME_MS macro to simplify the tls13.c time requirement
|
||||||
* OCSP fixes for memory management and initializations
|
* Improvements and refactoring of code related to parsing and creating TLS 1.3 client hello packets
|
||||||
* Fixes for EVP Cipher decryption padding checks
|
* TLS 1.3 version renegotiation now happens before interpreting ClientHello message
|
||||||
* Removal of null terminators on `wolfSSL_X509_print` substrings
|
* Chacha20 algorithm optimizations on the ARM architecture for performance increase
|
||||||
* `wolfSSL_sk_ASN1_OBJCET_pop` function renamed to `wolfSSL_sk_ASN1_OBJECT_pop`
|
* Poly1305 algorithm performance enhancements for the ARM architecture using the SIMD NEON extension
|
||||||
* Adjustment to include path in compatibility layer for evp.h and objects.h
|
* Curve25519 and Ed25519 optimized for ARM architecture for performance increase
|
||||||
* Fixes for decoding BER encoded PKCS7 contents
|
* SHA-512/384 optimizations for performance with ARM architecture using the SIMD NEON extension
|
||||||
* TLS handshake now supports using PKCS #11 for private keys
|
* Sniffer updates including adding support for the null cipher and static ECDH key exchange and new SSLWatchCb callback
|
||||||
* PKCS #11 support of HMAC, AES-CBC and random seeding/generation
|
* Cipher suite TLS_RSA_WITH_NULL_MD5 for use with the sniffer (off by default)
|
||||||
* Support for named FFDHE parameters in TLS 1.2 (RFC 7919)
|
* Sniffer statistic print outs with the macro WOLFSSL_SNIFFER_STATS defined
|
||||||
* Port to Zephyr Project
|
* A fix for wolfSSL_DH_generate_key when WOLFSSL_SMALL_STACK is defined
|
||||||
* Move the TLS PRF to wolfCrypt.
|
* wolfSSL_BN_Init implementation for opensslextra builds
|
||||||
* Update to CMS KARI support
|
* Updates to the function wolfSSL_i2d_RSAPrivateKey and additional automated tests
|
||||||
* Added ESP32 WROOM support
|
* Fixes for EVP_CipherFinal edge cases to match behavior desired
|
||||||
* Fixes and additions to the OpenSSL compatibility layer
|
* Check for appropriate private vs public flag with ECC key decode in wolfSSL_EC_KEY_LoadDer_ex, thanks to Eric Miller for the report
|
||||||
* Added WICED Studio Support
|
* Implementation of the function wolfSSL_PEM_write_DHparams
|
||||||
* MDK CMSIS RTOS v2
|
* wolfSSL_RAND_seed is called in wolfSSL_Init now when opensslextra is enabled
|
||||||
* Xcode project file update
|
* CryptoCell-310 support on nRF52840 added
|
||||||
* Fixes for ATECC508A/ATECC608A
|
* Fixes for atmel_ecc_create_pms to free the used slot.
|
||||||
* Fixes issue with CA path length for self signed root CA's
|
* Fixes for building ATECC with ATCAPRINTF or WOLFSSL_PUBLIC_MP
|
||||||
* Fixes for Single Precision (SP) ASM when building sources directly
|
* Cortex-M code changes to support IAR compiler
|
||||||
* Fixes for STM32 AES GCM
|
* Improvements to STM32 AES-GCM performance
|
||||||
* Fixes for ECC sign with hardware to ensure the input is truncated
|
* Fixes for 16-bit systems including PK callbacks, ATECC and LowResTimer function ptoto.
|
||||||
* Fixes for proper detection of PKCS7 buffer overflow case
|
* IAR-EWARM compiler warning fix
|
||||||
* Fixes to handle degenerate PKCS 7 with BER encoding
|
* Clean up of user_settings for CS+ port
|
||||||
* Fixes for TLS v1.3 handling of 6144 and 8192 bit keys
|
* Updating Renesas example projects to the latest version
|
||||||
* Fixes for possible build issues with SafeRTOS
|
* Micrium updates adjusting STATIC macro name and added inline flag
|
||||||
* Added `ECC_PUBLICKEY_TYPE` to the support PEM header types
|
* Fixes for building with WOLFSSL_CUSTOM_CURVES on Windows
|
||||||
* Added strict checking of the ECDSA signature DER encoding length
|
* Updates and refactor to the default build settings with Arduino
|
||||||
* Added ECDSA option to limit sig/algos in client_hello to key size with
|
* Fixes for visibility tags with Cygwin build
|
||||||
`USE_ECDSA_KEYSZ_HASH_ALGO`
|
* STSAFE Improvements to support wolfSSL Crypto Callbacks
|
||||||
* Added Cortex-M support for Single Precision (SP) math
|
* Improvements to NetBSD builds and mutex use in test case
|
||||||
* Added wolfCrypt RSA non-blocking time support
|
* Updating TI hardware offload with WOLFSSL_TI_CRYPT build
|
||||||
* Added 16-bit compiler support using --enable-16bit option
|
* Maintaining Xilinx FreeRTOS port by adjusting time.h include in wolfSSL
|
||||||
* Improved Arduino sketch example
|
* SiFive HiFive E31 RISC‐V core family port
|
||||||
* Improved crypto callback features
|
* Port for Telit IoT AppZone SDK
|
||||||
* Improved TLS benchmark tool
|
* OCSP Response signed by issuer with identical SKID fix
|
||||||
* Added new wrapper for snprintf for use with certain Visual Studio builds,
|
* Fix for sending revoked certificate with OCSP
|
||||||
thanks to David Parnell (Cambridge Consultants)
|
* Honor the status sent over connection with peers and do not perform an internal OCSP lookup
|
||||||
|
* Adding the build flag `--enable-ecccustcurves=all` to enable all curve types
|
||||||
|
* Support add for Ed25519ctx and Ed25519ph sign/verify algorithms as per RFC 8032
|
||||||
|
* Addition of the macro WOLFSSL_NO_SIGALG to disable signature algorithms extension
|
||||||
|
* wc_AesCtrEncrypt in place addition, where input and output buffer can be the same buffer
|
||||||
|
* Single shot API added for SHA3; wc_Sha3_224Hash, wc_Sha3_256Hash, wc_Sha3_384Hash, wc_Sha3_512Hash
|
||||||
|
* Function additions for JSSE support some of which are wolfSSL_get_ciphers_iana and wolfSSL_X509_verify along with expansion of the --enable-jni option
|
||||||
|
* Macro guards for more modular SHA3 build (i.e. support for 384 size only)
|
||||||
|
* Benchmarking -thread <num> argument support for asynchronous crypto
|
||||||
|
* Blake2s support (--enable-blake2s), which provides 32-bit Blake2 support
|
||||||
|
* Macro SHA256_MANY_REGISTERS addition to potentially speed up SHA256 depending on architecture
|
||||||
|
* Additional TLS alert messages sent with the macro WOLFSSL_EXTRA_ALERTS defined
|
||||||
|
* Feature to fail resumption of a session if the session’s cipher suite is not in the client’s list, this can be overridden by defining the macro NO_RESUME_SUITE_CHECK
|
||||||
|
* Fallback SCSV (Signaling Cipher Suite Value) support on Server only (--enable-fallback-scsv)
|
||||||
|
* DTLS export state only (wolfSSL_dtls_export_state_only) which is a subset of the information exported from previous DTLS export function
|
||||||
|
* Function wc_DhCheckPubValue added to perform simple validity checks on DH keys
|
||||||
|
* Support for RSA SHA-224 signatures with TLS added
|
||||||
|
* Additional option “-print” to the benchmark app for printing out a brief summary after benchmarks are complete
|
||||||
|
* Adding (--disable-pkcs12) option and improvements for disabled sections in pwdbased.c, asn.c, rsa.c, pkcs12.c and wc_encrypt
|
||||||
|
* Added DES3 support to the wolfSSL crypto callbacks
|
||||||
|
* Compile time fixes for build case with SP math and RSA only
|
||||||
|
* Fixes for Coverity static analysis report including explicit initialization of reported stack variables some additional Coverity fixes added thanks to Martin
|
||||||
|
* Fixes for scan build warnings (i.e possible null dereference in ecc.c)
|
||||||
|
* Resetting verify send value with a call to wolfSSL_clear function
|
||||||
|
* Fix for extern with sp_ModExp_2048 when building with --cpp option
|
||||||
|
* Fix for typo issue with --enable-sp=cortexm
|
||||||
|
* Adding #pragma warning disable 4127 for tfm.c when building with Visual Studio
|
||||||
|
* Improvements to the maximum ECC signature calculations
|
||||||
|
* Improvements to TLS write handling in error cases which helps user application not go through with a wolfSSL_write attempt after a wolfSSL_read failure
|
||||||
|
* Fix for read directory functions with Windows (wc_ReadDirFirst and wc_ReadDirNext)
|
||||||
|
* Sanity check on index before accessing domain component buffer in call to wolfSSL_X509_NAME_get_entry
|
||||||
|
* Sending fatal alert from client side on version error
|
||||||
|
* Fix for static RSA cipher suite with PK callback and no loaded private key
|
||||||
|
* Fix for potential memory leak in error case with the function wc_DsaKeyToDer, thanks to Chris H. for the report
|
||||||
|
* Adjusting STRING_USER macro to remove includes of standard lib <string.h> or <stdio.h>
|
||||||
|
* Bug fix for checking wrong allocation assignment in the function wc_PBKDF2 and handling potential leak on allocation failure. This case is only hit when the specific call to malloc fails in the function wc_PBKDF2. Thanks to Robert Altnoeder (Linbit) for the report
|
||||||
|
* Improved length checks when parsing ASN.1 certificates
|
||||||
|
* extern "C" additions to header files that were missing them
|
||||||
|
* Improved checking of return values with TLS extension functions and error codes
|
||||||
|
* Removing redundant calls to the generate function when instantiating and reseeding DRBG
|
||||||
|
* Refactoring and improvements to autoconf code with consolidating AM_CONDITIONAL statements
|
||||||
|
* Improvements for handling error return codes when reading input from transport layer
|
||||||
|
* Improvements to efficiency of SNI extension parsing and error checking with ALPN parsing
|
||||||
|
* Macro WOLFSSL_DEBUG_TLS addition for printing out extension data being parsed during a TLS connection
|
||||||
|
* Adjustment of prime testing with --disable-fastmath builds
|
||||||
|
|
||||||
This release of wolfSSL includes a fix for 1 security vulnerability.
|
|
||||||
|
|
||||||
* Fixed a bug in tls_bench.c example test application unrelated to the crypto
|
This release of wolfSSL includes a fix for 2 security vulnerabilities.
|
||||||
or TLS portions of the library. (CVE-2019-6439)
|
|
||||||
|
There is a fix for a potential buffer overflow case with the TLSv1.3 PSK extension parsing. This affects users that are enabling TLSv1.3 (--enable-tls13). Thanks to Robert Hoerr for the report. The CVE associated with the report is CVE-2019-11873.
|
||||||
|
|
||||||
|
There is a fix for the potential leak of nonce sizes when performing ECDSA signing operations. The leak is considered to be difficult to exploit but it could potentially be used maliciously to perform a lattice based timing attack against previous wolfSSL versions. ECC operations with --enable-sp and --enable-sp-asm are not affected, users with private ECC keys in other builds that are performing ECDSA signing operations should update versions of wolfSSL along with private ECC keys. Thanks to Ján Jančár from Masaryk University for the report.
|
||||||
|
|
||||||
|
|
||||||
*** Resources ***
|
*** Resources ***
|
||||||
|
|
150
README.md
150
README.md
|
@ -73,62 +73,108 @@ should be used for the enum name.
|
||||||
*** end Notes ***
|
*** end Notes ***
|
||||||
|
|
||||||
|
|
||||||
********* wolfSSL Release 4.0.0 (03/20/2019)
|
********* wolfSSL Release 4.1.0 (07/22/2019)
|
||||||
|
|
||||||
Release 4.0.0 of wolfSSL embedded TLS has bug fixes and new features including:
|
Release 4.1.0 of wolfSSL embedded TLS has bug fixes and new features including:
|
||||||
|
|
||||||
* Support for wolfCrypt FIPS v4.0.0, certificate #3389
|
* A fix for the check on return value when verifying PKCS7 bundle signatures, all users with applications using the function wc_PKCS7_VerifySignedData should update
|
||||||
* FIPS Ready Initiative
|
* Adding the function wc_PKCS7_GetSignerSID for PKCS7 firmware bundles as a getter function for the signers SID
|
||||||
* Compatibility fixes for secure renegotiation with Chrome
|
* PKCS7 callback functions for unwrapping of CEK and for decryption
|
||||||
* Better size check for TLS record fragment reassembly
|
* Adding the error value PKCS7_SIGNEEDS_CHECK when no certificates are available in a PKCS7 bundle to verify the signature
|
||||||
* Improvements to non-blocking and handshake message retry support for DTLS
|
* TLS 1.3 fixes including if major version is TLS Draft then it is now ignored and if version negotiation occurs but none were matched then an alert is now sent
|
||||||
* Improvements to OCSP with ECDSA signers
|
* Addition of the WOLFSSL_PSK_ONE_ID macro for indicating that only one identity in TLS 1.3 PSK is available and will be cached
|
||||||
* Added TLS server side secure renegotiation
|
* Adding sanity checks on length of PSK identity from a TLS 1.3 pre-shared key extension
|
||||||
* Added TLS Trusted CA extension
|
* Additional sanity checks and alert messages added for TLS 1.3
|
||||||
* Add support for the Deos Safety Critical RTOS
|
* Adding XTIME_MS macro to simplify the tls13.c time requirement
|
||||||
* OCSP fixes for memory management and initializations
|
* Improvements and refactoring of code related to parsing and creating TLS 1.3 client hello packets
|
||||||
* Fixes for EVP Cipher decryption padding checks
|
* TLS 1.3 version renegotiation now happens before interpreting ClientHello message
|
||||||
* Removal of null terminators on `wolfSSL_X509_print` substrings
|
* Chacha20 algorithm optimizations on the ARM architecture for performance increase
|
||||||
* `wolfSSL_sk_ASN1_OBJCET_pop` function renamed to `wolfSSL_sk_ASN1_OBJECT_pop`
|
* Poly1305 algorithm performance enhancements for the ARM architecture using the SIMD NEON extension
|
||||||
* Adjustment to include path in compatibility layer for evp.h and objects.h
|
* Curve25519 and Ed25519 optimized for ARM architecture for performance increase
|
||||||
* Fixes for decoding BER encoded PKCS7 contents
|
* SHA-512/384 optimizations for performance with ARM architecture using the SIMD NEON extension
|
||||||
* TLS handshake now supports using PKCS #11 for private keys
|
* Sniffer updates including adding support for the null cipher and static ECDH key exchange and new SSLWatchCb callback
|
||||||
* PKCS #11 support of HMAC, AES-CBC and random seeding/generation
|
* Cipher suite TLS_RSA_WITH_NULL_MD5 for use with the sniffer (off by default)
|
||||||
* Support for named FFDHE parameters in TLS 1.2 (RFC 7919)
|
* Sniffer statistic print outs with the macro WOLFSSL_SNIFFER_STATS defined
|
||||||
* Port to Zephyr Project
|
* A fix for wolfSSL_DH_generate_key when WOLFSSL_SMALL_STACK is defined
|
||||||
* Move the TLS PRF to wolfCrypt.
|
* wolfSSL_BN_Init implementation for opensslextra builds
|
||||||
* Update to CMS KARI support
|
* Updates to the function wolfSSL_i2d_RSAPrivateKey and additional automated tests
|
||||||
* Added ESP32 WROOM support
|
* Fixes for EVP_CipherFinal edge cases to match behavior desired
|
||||||
* Fixes and additions to the OpenSSL compatibility layer
|
* Check for appropriate private vs public flag with ECC key decode in wolfSSL_EC_KEY_LoadDer_ex, thanks to Eric Miller for the report
|
||||||
* Added WICED Studio Support
|
* Implementation of the function wolfSSL_PEM_write_DHparams
|
||||||
* MDK CMSIS RTOS v2
|
* wolfSSL_RAND_seed is called in wolfSSL_Init now when opensslextra is enabled
|
||||||
* Xcode project file update
|
* CryptoCell-310 support on nRF52840 added
|
||||||
* Fixes for ATECC508A/ATECC608A
|
* Fixes for atmel_ecc_create_pms to free the used slot.
|
||||||
* Fixes issue with CA path length for self signed root CA's
|
* Fixes for building ATECC with ATCAPRINTF or WOLFSSL_PUBLIC_MP
|
||||||
* Fixes for Single Precision (SP) ASM when building sources directly
|
* Cortex-M code changes to support IAR compiler
|
||||||
* Fixes for STM32 AES GCM
|
* Improvements to STM32 AES-GCM performance
|
||||||
* Fixes for ECC sign with hardware to ensure the input is truncated
|
* Fixes for 16-bit systems including PK callbacks, ATECC and LowResTimer function ptoto.
|
||||||
* Fixes for proper detection of PKCS7 buffer overflow case
|
* IAR-EWARM compiler warning fix
|
||||||
* Fixes to handle degenerate PKCS 7 with BER encoding
|
* Clean up of user_settings for CS+ port
|
||||||
* Fixes for TLS v1.3 handling of 6144 and 8192 bit keys
|
* Updating Renesas example projects to the latest version
|
||||||
* Fixes for possible build issues with SafeRTOS
|
* Micrium updates adjusting STATIC macro name and added inline flag
|
||||||
* Added `ECC_PUBLICKEY_TYPE` to the support PEM header types
|
* Fixes for building with WOLFSSL_CUSTOM_CURVES on Windows
|
||||||
* Added strict checking of the ECDSA signature DER encoding length
|
* Updates and refactor to the default build settings with Arduino
|
||||||
* Added ECDSA option to limit sig/algos in client_hello to key size with
|
* Fixes for visibility tags with Cygwin build
|
||||||
`USE_ECDSA_KEYSZ_HASH_ALGO`
|
* STSAFE Improvements to support wolfSSL Crypto Callbacks
|
||||||
* Added Cortex-M support for Single Precision (SP) math
|
* Improvements to NetBSD builds and mutex use in test case
|
||||||
* Added wolfCrypt RSA non-blocking time support
|
* Updating TI hardware offload with WOLFSSL_TI_CRYPT build
|
||||||
* Added 16-bit compiler support using --enable-16bit option
|
* Maintaining Xilinx FreeRTOS port by adjusting time.h include in wolfSSL
|
||||||
* Improved Arduino sketch example
|
* SiFive HiFive E31 RISC‐V core family port
|
||||||
* Improved crypto callback features
|
* Port for Telit IoT AppZone SDK
|
||||||
* Improved TLS benchmark tool
|
* OCSP Response signed by issuer with identical SKID fix
|
||||||
* Added new wrapper for snprintf for use with certain Visual Studio builds,
|
* Fix for sending revoked certificate with OCSP
|
||||||
thanks to David Parnell (Cambridge Consultants)
|
* Honor the status sent over connection with peers and do not perform an internal OCSP lookup
|
||||||
|
* Adding the build flag `--enable-ecccustcurves=all` to enable all curve types
|
||||||
|
* Support add for Ed25519ctx and Ed25519ph sign/verify algorithms as per RFC 8032
|
||||||
|
* Addition of the macro WOLFSSL_NO_SIGALG to disable signature algorithms extension
|
||||||
|
* wc_AesCtrEncrypt in place addition, where input and output buffer can be the same buffer
|
||||||
|
* Single shot API added for SHA3; wc_Sha3_224Hash, wc_Sha3_256Hash, wc_Sha3_384Hash, wc_Sha3_512Hash
|
||||||
|
* Function additions for JSSE support some of which are wolfSSL_get_ciphers_iana and wolfSSL_X509_verify along with expansion of the --enable-jni option
|
||||||
|
* Macro guards for more modular SHA3 build (i.e. support for 384 size only)
|
||||||
|
* Benchmarking -thread <num> argument support for asynchronous crypto
|
||||||
|
* Blake2s support (--enable-blake2s), which provides 32-bit Blake2 support
|
||||||
|
* Macro SHA256_MANY_REGISTERS addition to potentially speed up SHA256 depending on architecture
|
||||||
|
* Additional TLS alert messages sent with the macro WOLFSSL_EXTRA_ALERTS defined
|
||||||
|
* Feature to fail resumption of a session if the session’s cipher suite is not in the client’s list, this can be overridden by defining the macro NO_RESUME_SUITE_CHECK
|
||||||
|
* Fallback SCSV (Signaling Cipher Suite Value) support on Server only (--enable-fallback-scsv)
|
||||||
|
* DTLS export state only (wolfSSL_dtls_export_state_only) which is a subset of the information exported from previous DTLS export function
|
||||||
|
* Function wc_DhCheckPubValue added to perform simple validity checks on DH keys
|
||||||
|
* Support for RSA SHA-224 signatures with TLS added
|
||||||
|
* Additional option “-print” to the benchmark app for printing out a brief summary after benchmarks are complete
|
||||||
|
* Adding (--disable-pkcs12) option and improvements for disabled sections in pwdbased.c, asn.c, rsa.c, pkcs12.c and wc_encrypt
|
||||||
|
* Added DES3 support to the wolfSSL crypto callbacks
|
||||||
|
* Compile time fixes for build case with SP math and RSA only
|
||||||
|
* Fixes for Coverity static analysis report including explicit initialization of reported stack variables some additional Coverity fixes added thanks to Martin
|
||||||
|
* Fixes for scan build warnings (i.e possible null dereference in ecc.c)
|
||||||
|
* Resetting verify send value with a call to wolfSSL_clear function
|
||||||
|
* Fix for extern with sp_ModExp_2048 when building with --cpp option
|
||||||
|
* Fix for typo issue with --enable-sp=cortexm
|
||||||
|
* Adding #pragma warning disable 4127 for tfm.c when building with Visual Studio
|
||||||
|
* Improvements to the maximum ECC signature calculations
|
||||||
|
* Improvements to TLS write handling in error cases which helps user application not go through with a wolfSSL_write attempt after a wolfSSL_read failure
|
||||||
|
* Fix for read directory functions with Windows (wc_ReadDirFirst and wc_ReadDirNext)
|
||||||
|
* Sanity check on index before accessing domain component buffer in call to wolfSSL_X509_NAME_get_entry
|
||||||
|
* Sending fatal alert from client side on version error
|
||||||
|
* Fix for static RSA cipher suite with PK callback and no loaded private key
|
||||||
|
* Fix for potential memory leak in error case with the function wc_DsaKeyToDer, thanks to Chris H. for the report
|
||||||
|
* Adjusting STRING_USER macro to remove includes of standard lib <string.h> or <stdio.h>
|
||||||
|
* Bug fix for checking wrong allocation assignment in the function wc_PBKDF2 and handling potential leak on allocation failure. This case is only hit when the specific call to malloc fails in the function wc_PBKDF2. Thanks to Robert Altnoeder (Linbit) for the report
|
||||||
|
* Improved length checks when parsing ASN.1 certificates
|
||||||
|
* extern "C" additions to header files that were missing them
|
||||||
|
* Improved checking of return values with TLS extension functions and error codes
|
||||||
|
* Removing redundant calls to the generate function when instantiating and reseeding DRBG
|
||||||
|
* Refactoring and improvements to autoconf code with consolidating AM_CONDITIONAL statements
|
||||||
|
* Improvements for handling error return codes when reading input from transport layer
|
||||||
|
* Improvements to efficiency of SNI extension parsing and error checking with ALPN parsing
|
||||||
|
* Macro WOLFSSL_DEBUG_TLS addition for printing out extension data being parsed during a TLS connection
|
||||||
|
* Adjustment of prime testing with --disable-fastmath builds
|
||||||
|
|
||||||
This release of wolfSSL includes a fix for 1 security vulnerability.
|
|
||||||
|
|
||||||
* Fixed a bug in tls_bench.c example test application unrelated to the crypto
|
This release of wolfSSL includes a fix for 2 security vulnerabilities.
|
||||||
or TLS portions of the library. (CVE-2019-6439)
|
|
||||||
|
There is a fix for a potential buffer overflow case with the TLSv1.3 PSK extension parsing. This affects users that are enabling TLSv1.3 (--enable-tls13). Thanks to Robert Hoerr for the report. The CVE associated with the report is CVE-2019-11873.
|
||||||
|
|
||||||
|
There is a fix for the potential leak of nonce sizes when performing ECDSA signing operations. The leak is considered to be difficult to exploit but it could potentially be used maliciously to perform a lattice based timing attack against previous wolfSSL versions. ECC operations with --enable-sp and --enable-sp-asm are not affected, users with private ECC keys in other builds that are performing ECDSA signing operations should update versions of wolfSSL along with private ECC keys. Thanks to Ján Jančár from Masaryk University for the report.
|
||||||
|
|
||||||
|
|
||||||
*** Resources ***
|
*** Resources ***
|
||||||
|
|
|
@ -7,7 +7,7 @@
|
||||||
#
|
#
|
||||||
AC_COPYRIGHT([Copyright (C) 2006-2019 wolfSSL Inc.])
|
AC_COPYRIGHT([Copyright (C) 2006-2019 wolfSSL Inc.])
|
||||||
AC_PREREQ([2.63])
|
AC_PREREQ([2.63])
|
||||||
AC_INIT([wolfssl],[4.0.0],[https://github.com/wolfssl/wolfssl/issues],[wolfssl],[https://www.wolfssl.com])
|
AC_INIT([wolfssl],[4.1.0],[https://github.com/wolfssl/wolfssl/issues],[wolfssl],[https://www.wolfssl.com])
|
||||||
AC_CONFIG_AUX_DIR([build-aux])
|
AC_CONFIG_AUX_DIR([build-aux])
|
||||||
|
|
||||||
# The following sets CFLAGS and CXXFLAGS to empty if unset on command line.
|
# The following sets CFLAGS and CXXFLAGS to empty if unset on command line.
|
||||||
|
@ -34,7 +34,7 @@ LT_PREREQ([2.2])
|
||||||
LT_INIT([disable-static win32-dll])
|
LT_INIT([disable-static win32-dll])
|
||||||
|
|
||||||
#shared library versioning
|
#shared library versioning
|
||||||
WOLFSSL_LIBRARY_VERSION=21:0:2
|
WOLFSSL_LIBRARY_VERSION=22:0:3
|
||||||
# | | |
|
# | | |
|
||||||
# +------+ | +---+
|
# +------+ | +---+
|
||||||
# | | |
|
# | | |
|
||||||
|
|
|
@ -74,7 +74,7 @@ mkdir -p $RPM_BUILD_ROOT/
|
||||||
%{_libdir}/libwolfssl.la
|
%{_libdir}/libwolfssl.la
|
||||||
%{_libdir}/libwolfssl.so
|
%{_libdir}/libwolfssl.so
|
||||||
%{_libdir}/libwolfssl.so.19
|
%{_libdir}/libwolfssl.so.19
|
||||||
%{_libdir}/libwolfssl.so.19.2.0
|
%{_libdir}/libwolfssl.so.19.3.0
|
||||||
|
|
||||||
%files devel
|
%files devel
|
||||||
%defattr(-,root,root,-)
|
%defattr(-,root,root,-)
|
||||||
|
|
BIN
wolfssl.rc
BIN
wolfssl.rc
Binary file not shown.
|
@ -28,8 +28,8 @@
|
||||||
extern "C" {
|
extern "C" {
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#define LIBWOLFSSL_VERSION_STRING "4.0.0"
|
#define LIBWOLFSSL_VERSION_STRING "4.1.0"
|
||||||
#define LIBWOLFSSL_VERSION_HEX 0x04000000
|
#define LIBWOLFSSL_VERSION_HEX 0x04001000
|
||||||
|
|
||||||
#ifdef __cplusplus
|
#ifdef __cplusplus
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in New Issue