forked from wolfSSL/wolfssl
prepare for release 5.6.2
This commit is contained in:
@@ -28,16 +28,16 @@ if("${CMAKE_SOURCE_DIR}" STREQUAL "${CMAKE_BINARY_DIR}")
|
||||
You must delete them, or cmake will refuse to work.")
|
||||
endif()
|
||||
|
||||
project(wolfssl VERSION 5.6.0 LANGUAGES C ASM)
|
||||
project(wolfssl VERSION 5.6.2 LANGUAGES C ASM)
|
||||
|
||||
# shared library versioning
|
||||
# increment if interfaces have been added, removed or changed
|
||||
set(LIBTOOL_CURRENT 39)
|
||||
set(LIBTOOL_CURRENT 40)
|
||||
# increment if source code has changed set to zero if current is incremented
|
||||
set(LIBTOOL_REVISION 0)
|
||||
# increment if interfaces have been added set to zero if interfaces have been
|
||||
# removed or changed
|
||||
set(LIBTOOL_AGE 4)
|
||||
set(LIBTOOL_AGE 5)
|
||||
|
||||
math(EXPR LIBTOOL_SO_VERSION "${LIBTOOL_CURRENT} - ${LIBTOOL_AGE}")
|
||||
set(LIBTOOL_FULL_VERSION ${LIBTOOL_SO_VERSION}.${LIBTOOL_AGE}.${LIBTOOL_REVISION})
|
||||
|
133
ChangeLog.md
133
ChangeLog.md
@@ -1,3 +1,136 @@
|
||||
# wolfSSL Release 5.6.2 (Jun 09, 2023)
|
||||
|
||||
Release 5.6.2 has been developed according to wolfSSL's development and QA process (see link below) and successfully passed the quality criteria.
|
||||
https://www.wolfssl.com/about/wolfssl-software-development-process-quality-assurance
|
||||
|
||||
NOTE: * --enable-heapmath is being deprecated and will be removed by 2024
|
||||
|
||||
Release 5.6.2 of wolfSSL embedded TLS has bug fixes and new features including:
|
||||
|
||||
## Vulnerabilities
|
||||
* [Low] In cases where a malicious agent could analyze cache timing at a very detailed level, information about the AES key used could be leaked during T/S Box lookups. One such case was shown on RISC-V hardware using the MicroWalk tool (https://github.com/microwalk-project/Microwalk). A hardened version of T/S Box lookups was added in wolfSSL to help mitigate this potential attack and is now on by default with RISC-V builds and can be enabled on other builds if desired by compiling wolfSSL with the macro WOLFSSL_AES_TOUCH_LINES. Thanks to Jan Wichelmann, Christopher Peredy, Florian Sieck, Anna Pätschke, Thomas Eisenbarth (University of Lübeck): MAMBO-V: Dynamic Side-Channel Leakage Analysis on RISC-V. Fixed in the following GitHub pull request https://github.com/wolfSSL/wolfssl/pull/6309
|
||||
* [High] In previous versions of wolfSSL if a TLS 1.3 client gets neither a PSK (pre shared key) extension nor a KSE (key share extension) when connecting to a malicious server, a default predictable buffer gets used for the IKM value when generating the session master secret. Using a potentially known IKM value when generating the session master secret key compromises the key generated, allowing an eavesdropper to reconstruct it and potentially allowing surreptitious access to or meddling with message contents in the session. This issue does not affect client validation of connected servers, nor expose private key information, but could result in an insecure TLS 1.3 session when not controlling both sides of the connection. We recommend that TLS 1.3 client side users update the version of wolfSSL used. Thanks to Johannes from Sectra Communications and Linköping University for the report. Fixed in the following GitHub pull request https://github.com/wolfSSL/wolfssl/pull/6412
|
||||
|
||||
## New Feature Additions
|
||||
|
||||
### New Ports and Expansions
|
||||
* Add support for STM32H5
|
||||
* Add support for Renesas TSIP v1.17
|
||||
* Add Renesas SCE RSA crypto-only support
|
||||
* STARCORE DSP port and example builds added
|
||||
* Add the function wc_PKCS7_SetDefaultSignedAttribs for setting PKCS7 signed attributes to use with PKCS7 bundle creation
|
||||
* NXP IMX6Q CAAM port with QNX and performance optimizations for AES-CTR
|
||||
|
||||
### New Build Options
|
||||
* ASN.1 print utility to decode ASN.1 syntax and print out human readable text --enable-asn-print. Utility app is located in the directory ./examples/asn1/
|
||||
* Add introspection for math build, wc_GetMathInfo() to get information about the math library compiled into the linked wolfSSL library
|
||||
* Implement TLS recommendations from RFC 9325 for hardening TLS/DTLS security. Enabled with the autoconf flag --enable-harden-tls.
|
||||
* Add option to support disabling thread local storage, --disable-threadlocal
|
||||
* Added wc_DsaSign_ex() and wc_DsaVerify_ex() for handling alternative digest algorithms with DSA Sign/Verify
|
||||
* Implement atomic operations interface. Macros auto-detect if atomic operations are expected to be available, can be turned off with the macro WOLFSSL_NO_ATOMICS
|
||||
* Added support for DTLS 1.3 Authentication and Integrity-Only Cipher Suites
|
||||
* Expand crypto callback to have a device ID find callback function with wc_CryptoCb_SetDeviceFindCb. Enabled with the macro WOLF_CRYPTO_CB_FIND
|
||||
|
||||
## Enhancements and Optimizations
|
||||
|
||||
### Optimizations
|
||||
* Increased performance with ChaCha20 C implementation and general XOR operations
|
||||
* Added integer type to the ASN.1 sequencing with ASN.1 Integer sequence
|
||||
* With wolfSSL_get_x509_next_altname reset alt name list to head once cycled through if compiling with the macro WOLFSSL_MULTICIRCULATE_ALTNAMELIST
|
||||
* Additional key validity sanity checks on input to wolfSSL_EC_KEY_set_private_key
|
||||
* adds support for TLSv1.3 stateful session tickets when using SSL_OP_NO_TICKET
|
||||
|
||||
### Memory Optimizations
|
||||
* Improvements to stack usage and management with SP int math library
|
||||
* Optimization to TLS 1.3 server to remove caching messages for Ed25519/Ed448
|
||||
* Added a HAVE_CURL macro build for building a subset of the wolfSSL library when linking with cURL
|
||||
* Memory usage improvement with reducing the size of alignment needed with AES
|
||||
* Reduce run time memory used with ECC operations and ALT_ECC_SIZE
|
||||
* Fixes and improvements for building edge cases such as crypto callback without hash-drbg with low footprint options
|
||||
* Support HAVE_SESSION_TICKET build option without depending on realloc
|
||||
|
||||
### Documentation
|
||||
* Instructions for GPDMA on STM32 configuration added
|
||||
* Add in instructions for compiling with zephyr on STM32
|
||||
* Documentation fixup for wolfSSL_get_chain_cert()
|
||||
* Fix the file pointed to in the TI RTOS documentation that we maintain
|
||||
* Documentation for wolfSSL_CertManagerFreeCRL
|
||||
* Updates made to AES and Chacha documentation
|
||||
* Update Japanese comments for Ed25519, AES, and other miscellaneous items
|
||||
|
||||
### Tests
|
||||
* Add in an option for easily testing malloc failures when building with WOLFSSL_MEM_FAIL_COUNT macro
|
||||
* Updated in process for using Expect vs Assert to facilitate more malloc failure tests
|
||||
* Enhance wolfCrypt test for builds that do not have ECC SECP curves enabled
|
||||
* ESP32 platform-specific VisualGDB test & benchmark projects
|
||||
* Update to dependencies in docker container file used for tests
|
||||
* Fix up for base 10 output with bundled benchmark application
|
||||
|
||||
### Port Updates
|
||||
* Zephyr port update, compile time warning fixes, misc. fixes when used with TLS and update of includes
|
||||
* Update RIOT-OS to not compile out use of writev by default
|
||||
* Update Micrium port to enable use of STM32_RNG
|
||||
* Micrium updates for XMEMOVE and XSTRTOK use
|
||||
* Various Espressif HW crypto, SHA2, AES, MP updates
|
||||
* Added in ASIO build option with CMake builds
|
||||
|
||||
### General Enhancements
|
||||
* Global codebase cleanup for C89 compliance and wolfCrypt -Wconversion hygiene
|
||||
* PKCS#11 enhancement adding a callback for RSA key size when using a hardware key, by default 2048 bit key is used
|
||||
* Allow for unknown OIDs in extensions in wolfSSL_X509_set_ext()
|
||||
* Allow user to override XSTAT by defining the macro XSTAT when compiling
|
||||
* Support UPN and SID with x509 certificate extensions and custom OID build
|
||||
* Write next IV in wolfSSL_DES_ede3_cbc_encrypt for better handling of inline encryption
|
||||
* Adding NO_ASN_TIME_CHECK build option for compiling out certificate before/after checks
|
||||
* Improve different peer recvfrom handling and error reporting with ipv4 vs ipv6
|
||||
|
||||
## Fixes
|
||||
* Fix for STM32 ECC sign and verify out of bounds buffer write when the hash length passed in is larger than the key size. Thanks to Maximilian for the report.
|
||||
* Fix to skip Async_DevCtxInit when using init rsa/ecc label/id api's
|
||||
* Revert WOLFSSL_NO_ASN_STRICT macro guard around alternate names directory list
|
||||
* In async mode, don't retry decrypting if a valid error is encountered on a packet parse attempt
|
||||
* Add additional sanity check on PKCS7 index value in wc_PKCS7_DecryptKekri
|
||||
* Fix for padding when using an AuthEnvelope PKCS7 type with GCM/CCM stream ciphers
|
||||
* Fix siphash assembly so that no register is left behind
|
||||
* Fix to not send a TLS 1.3 session ID resume response when resuming and downgrading to a protocol less than TLS 1.3
|
||||
* Fix overwriting serialNumber by favouriteDrink when generating a certificate using Cert struct
|
||||
* Fix for the default realloc used with EspressIf builds
|
||||
* Track SetDigest usage to avoid invalid free under error conditions
|
||||
* DTLS v1.3 fix for epoch 0 check on plaintext message
|
||||
* Fix for session ticket memory leak in wolfSSL_Cleanup
|
||||
* Fixes for propagating SendAlert errors when the peer disconnects
|
||||
* Replace XMEMCPY with XMEMMOVE to fix valgrind-3.15.0 reports "Source and destination overlap in memcpy" when using --enable-aesgcm-stream
|
||||
* Fix for potential out-of-bounds write edge case in fp_mod_2d with --enable-fastmath math library
|
||||
* Fix getting ECC key size in stm32_ecc_sign_hash_ex
|
||||
* Fix for case where wc_PeekErrorNodeLineData was not unlocking error queue on error
|
||||
* Fix for async ECC shared secret state
|
||||
* Fix for better error checking with sp_gcd with SP int math library
|
||||
* Fix memory leak in TLSX_KeyShare_Setup when handling an error case
|
||||
* Fix for double free edge case in InitOCSPRequest when handling a memory allocation failure
|
||||
* X509 NAME Entry fix for leaking memory on error case
|
||||
* Fix wolfssl_asn1_time_to_tm setting unexpected fields in tm struct
|
||||
* Fix for FIPS ECC integrity check with crypto callback set
|
||||
* BN_to_ASN1_INTEGER fix for handling leading zero byte padding when needed
|
||||
* Fix a typo in PP macro and add a ceiling to guard against implementation bugs
|
||||
* DTLS 1.3 fix for using the correct label when deriving the resumption key
|
||||
* OCSP fix for GetDateInfo edge case with non ASN template builds
|
||||
* Allow a user set certificate callback function to override the skipAddCA flag when parsing a certificate
|
||||
* SP int: sp_radix_size when radix 10 fix temp size for handling edge case
|
||||
* Fixes and improvements for handling failures with memory allocations
|
||||
* Fix for DecodeECC_DSA_Sig to handle r and s being initialized
|
||||
* Fix for wc_ecc_is_point to ensure that the x and y are in range [0, p-1] and z is one (affine ordinates)
|
||||
|
||||
### Build Fixes
|
||||
* Fix for building on Windows with CMake and using USER_SETTINGS and fix for options.h creation with CMake when using USER_SETTINGS
|
||||
* CMake fixes and improvements for use with mingw32
|
||||
* Fix for building with wpas and x509 small options
|
||||
* Check if colrm is available for options.h creation when using autoconf
|
||||
* Clean up NO_BIG_INT build, removing WOLFSSL_SP_MATH macro and heapmath compile
|
||||
* Fix PKCS#7 build with NO_PKCS7_STREAM
|
||||
* Fix compilation error in CC-RX and remove unnecessary public key import
|
||||
* SP Build fixes for ARM assembly with ARMv6 clz and ARM thumb debug build
|
||||
* For to not advertise support for RSA in TLS extensions when compiled with NO_RSA
|
||||
|
||||
# wolfSSL Release 5.6.0 (Mar 24, 2023)
|
||||
|
||||
Release 5.6.0 has been developed according to wolfSSL's development and QA process (see link below) and successfully passed the quality criteria.
|
||||
|
@@ -51,8 +51,8 @@ END
|
||||
//
|
||||
|
||||
VS_VERSION_INFO VERSIONINFO
|
||||
FILEVERSION 5,6,0,0
|
||||
PRODUCTVERSION 5,6,0,0
|
||||
FILEVERSION 5,6,2,0
|
||||
PRODUCTVERSION 5,6,2,0
|
||||
FILEFLAGSMASK 0x3fL
|
||||
#ifdef _DEBUG
|
||||
FILEFLAGS 0x1L
|
||||
@@ -69,12 +69,12 @@ BEGIN
|
||||
BEGIN
|
||||
VALUE "CompanyName", "wolfSSL Inc."
|
||||
VALUE "FileDescription", "The wolfSSL FIPS embedded SSL library is a lightweight, portable, C-language-based SSL/TLS library targeted at IoT, embedded, and RTOS environments primarily because of its size, speed, and feature set."
|
||||
VALUE "FileVersion", "5.6.0.0"
|
||||
VALUE "FileVersion", "5.6.2.0"
|
||||
VALUE "InternalName", "wolfssl-fips"
|
||||
VALUE "LegalCopyright", "Copyright (C) 2022"
|
||||
VALUE "OriginalFilename", "wolfssl-fips.dll"
|
||||
VALUE "ProductName", "wolfSSL FIPS"
|
||||
VALUE "ProductVersion", "5.6.0.0"
|
||||
VALUE "ProductVersion", "5.6.2.0"
|
||||
END
|
||||
END
|
||||
BLOCK "VarFileInfo"
|
||||
|
283
README
283
README
@@ -70,189 +70,138 @@ should be used for the enum name.
|
||||
|
||||
*** end Notes ***
|
||||
|
||||
# wolfSSL Release 5.6.0 (Mar 24, 2023)
|
||||
# wolfSSL Release 5.6.2 (Jun 09, 2023)
|
||||
|
||||
Release 5.6.0 has been developed according to wolfSSL's development and QA process (see link below) and successfully passed the quality criteria.
|
||||
Release 5.6.2 has been developed according to wolfSSL's development and QA process (see link below) and successfully passed the quality criteria.
|
||||
https://www.wolfssl.com/about/wolfssl-software-development-process-quality-assurance
|
||||
|
||||
NOTE: * --enable-heapmath is being deprecated and will be removed by 2024
|
||||
* This release makes ASN Template the default with ./configure, the previous ASN parsing can be built with --enable-asn=original
|
||||
|
||||
Release 5.6.0 of wolfSSL embedded TLS has bug fixes and new features including:
|
||||
Release 5.6.2 of wolfSSL embedded TLS has bug fixes and new features including:
|
||||
|
||||
## Vulnerabilities
|
||||
* [Low] In cases where a malicious agent could analyze cache timing at a very detailed level, information about the AES key used could be leaked during T/S Box lookups. One such case was shown on RISC-V hardware using the MicroWalk tool (https://github.com/microwalk-project/Microwalk). A hardened version of T/S Box lookups was added in wolfSSL to help mitigate this potential attack and is now on by default with RISC-V builds and can be enabled on other builds if desired by compiling wolfSSL with the macro WOLFSSL_AES_TOUCH_LINES. Thanks to Jan Wichelmann, Christopher Peredy, Florian Sieck, Anna Pätschke, Thomas Eisenbarth (University of Lübeck): MAMBO-V: Dynamic Side-Channel Leakage Analysis on RISC-V. Fixed in the following GitHub pull request https://github.com/wolfSSL/wolfssl/pull/6309
|
||||
* [High] In previous versions of wolfSSL if a TLS 1.3 client gets neither a PSK (pre shared key) extension nor a KSE (key share extension) when connecting to a malicious server, a default predictable buffer gets used for the IKM value when generating the session master secret. Using a potentially known IKM value when generating the session master secret key compromises the key generated, allowing an eavesdropper to reconstruct it and potentially allowing surreptitious access to or meddling with message contents in the session. This issue does not affect client validation of connected servers, nor expose private key information, but could result in an insecure TLS 1.3 session when not controlling both sides of the connection. We recommend that TLS 1.3 client side users update the version of wolfSSL used. Thanks to Johannes from Sectra Communications and Linköping University for the report. Fixed in the following GitHub pull request https://github.com/wolfSSL/wolfssl/pull/6412
|
||||
|
||||
## New Feature Additions
|
||||
|
||||
* ASN template is now the default ASN parsing implementation when compiling with configure
|
||||
* Added in support for TLS v1.3 Encrypted Client Hello (ECH) and HPKE (Hybrid Public Key Encryption)
|
||||
* DTLS 1.3 stateless server ClientHello parsing support added
|
||||
### New Ports and Expansions
|
||||
* Add support for STM32H5
|
||||
* Add support for Renesas TSIP v1.17
|
||||
* Add Renesas SCE RSA crypto-only support
|
||||
* STARCORE DSP port and example builds added
|
||||
* Add the function wc_PKCS7_SetDefaultSignedAttribs for setting PKCS7 signed attributes to use with PKCS7 bundle creation
|
||||
* NXP IMX6Q CAAM port with QNX and performance optimizations for AES-CTR
|
||||
|
||||
### Ports
|
||||
* Add RX64/RX71 SHA hardware support
|
||||
* Port to RT1170 and expand NXP CAAM driver support
|
||||
* Add NuttX integration files for ease of use
|
||||
* Updated Stunnel support for version 5.67
|
||||
Compatibility Layer
|
||||
* Add in support for AES-CCM with EVP
|
||||
* BN compatibility API refactoring and separate API created
|
||||
* Expanding public key type cipher suite list strings support
|
||||
### New Build Options
|
||||
* ASN.1 print utility to decode ASN.1 syntax and print out human readable text --enable-asn-print. Utility app is located in the directory ./examples/asn1/
|
||||
* Add introspection for math build, wc_GetMathInfo() to get information about the math library compiled into the linked wolfSSL library
|
||||
* Implement TLS recommendations from RFC 9325 for hardening TLS/DTLS security. Enabled with the autoconf flag --enable-harden-tls.
|
||||
* Add option to support disabling thread local storage, --disable-threadlocal
|
||||
* Added wc_DsaSign_ex() and wc_DsaVerify_ex() for handling alternative digest algorithms with DSA Sign/Verify
|
||||
* Implement atomic operations interface. Macros auto-detect if atomic operations are expected to be available, can be turned off with the macro WOLFSSL_NO_ATOMICS
|
||||
* Added support for DTLS 1.3 Authentication and Integrity-Only Cipher Suites
|
||||
* Expand crypto callback to have a device ID find callback function with wc_CryptoCb_SetDeviceFindCb. Enabled with the macro WOLF_CRYPTO_CB_FIND
|
||||
|
||||
### Misc.
|
||||
* Support pthread_rwlock and add enable option
|
||||
* Add wolfSSL_CertManagerLoadCABuffer_ex() that takes a user certificate chain flag and additional verify flag options
|
||||
* Docker build additions for wolfSSL library and wolfCLU application
|
||||
* Add favorite drink pilot attribute type to get it from the encoding
|
||||
* Added in support for indefinite length BER parsing with PKCS12
|
||||
* Add dynamic session cache which allocates sessions from the heap with macro SESSION_CACHE_DYNAMIC_MEM
|
||||
|
||||
|
||||
## Improvements / Optimizations
|
||||
|
||||
### Tests
|
||||
* Additional CI (continuous integration) testing and leveraging of GitHub workflows
|
||||
* Add CI testing for wpa_supplicant, OpenWrt and OpenVPN using GitHub workflows
|
||||
* Add compilation of Espressif to GitHub workflows tests
|
||||
* Refactoring and improving error results with wolfCrypt unit test application
|
||||
* Minor warning fixes from Coverity static analysis scan
|
||||
* Add new SHA-512/224 and SHA-512/256 tests
|
||||
* Used codespell and fixed some minor typos
|
||||
|
||||
### Ports
|
||||
* Improve TLS1.2 client authentication to use TSIP
|
||||
* Updated Kyber macro to be WOLFSSL_HAVE_KYBER and made changes that make Kyber work on STM32
|
||||
* AES-GCM Windows assembly additions
|
||||
* CRLF line endings, trailing spaces for C# Wrapper Projects
|
||||
Compatibility Layer
|
||||
* Update `PubKey` and `Key` PEM-to-DER APIs to support return of needed DER size
|
||||
* Allow reading ENC EC PRIVATE KEY as well via wolfSSL_PEM_read_bio_ECPrivateKey
|
||||
* Improve wolfSSL_EC_POINT_cmp to handle Jacobian ordinates
|
||||
* Fix issue with BIO_reset() and add BIO_FLAGS_MEM_RDONLY flag support for read only BIOs
|
||||
|
||||
### SP
|
||||
* In SP math library rework mod 3 and use count leading zero instruction
|
||||
* Fix with SP ECC sign to reject the random k generated when r is 0
|
||||
* With SP math add better detection of when add won't work and double is needed with point_add_qz1 internal function
|
||||
* With SP int fail when buffer writing to is too small for number rather than discarding the extra values
|
||||
|
||||
### Builds
|
||||
* Define WOLFSSL_SP_SMALL_STACK if wolfSSL is build with --enable-smallstack
|
||||
* Fix CMake to exclude libm when DH is not enabled
|
||||
* Allow building of SAKKE as external non-FIPS algorithm with wolfmikey product
|
||||
* Add option to add library suffix, --with-libsuffix
|
||||
* ASN template compile option WOLFSSL_ASN_INT_LEAD_0_ANY to allow leading zeros
|
||||
* Add user_settings.h template for wolfTPM to examples/configs/user_settings_wolftpm.h
|
||||
* Purge the AES variant of Dilithium
|
||||
* Expand WOLFSSL_NO_ASN_STRICT to allow parsing of explicit ECC public key
|
||||
* Remove relocatable text in ARMv7a AES assembly for use with FIPS builds
|
||||
* Expand checking for hardware that supports ARMv7a neon with autotools configure
|
||||
* Sanity check on allocation fails with DSA and FP_ECC build when zeroizing internal buffer
|
||||
* Additional TLS alerts sent when compiling with WOLFSSL_EXTRA_ALERTS macro defined
|
||||
|
||||
### Benchmarking
|
||||
* Update wolfCrypt benchmark Windows build files to support x64 Platform
|
||||
* Add SHA512/224 and SHA512/256 benchmarks, fixed CVS macro and display sizes
|
||||
* Separate AES-GCM streaming runs when benchmarked
|
||||
* No longer call external implementation of Kyber from benchmark
|
||||
* Fix for benchmarking shake with custom block size
|
||||
* Fixes for benchmark help `-alg` list and block format
|
||||
Documentation/Examples
|
||||
* Document use of wc_AesFree() and update documentation of Ed25519 with Doxygen
|
||||
* Move the wolfSSL Configuration section higher in QUIC.md
|
||||
* Add Japanese Doxygen documentation for cmac.h, quic.h and remove incomplete Japanese doxygen in asn_public.h
|
||||
* Espressif examples run with local wolfSSL now with no additional setup needed
|
||||
* Added a fix for StartTLS use In the example client
|
||||
* Add a base-line user_settings.h for use with FIPS 140-3 in XCode example app
|
||||
## Enhancements and Optimizations
|
||||
|
||||
### Optimizations
|
||||
* AES-NI usage added for AES modes ECB/CTR/XTS
|
||||
* Increased performance with ChaCha20 C implementation and general XOR operations
|
||||
* Added integer type to the ASN.1 sequencing with ASN.1 Integer sequence
|
||||
* With wolfSSL_get_x509_next_altname reset alt name list to head once cycled through if compiling with the macro WOLFSSL_MULTICIRCULATE_ALTNAMELIST
|
||||
* Additional key validity sanity checks on input to wolfSSL_EC_KEY_set_private_key
|
||||
* adds support for TLSv1.3 stateful session tickets when using SSL_OP_NO_TICKET
|
||||
|
||||
### Misc
|
||||
* Update AES-GCM stream decryption to allow long IVs
|
||||
* Internal refactor to use wolfSSL_Ref functions when incrementing or decrementing the structures reference count and fixes for static analysis reports
|
||||
* Cleanup function logging making adjustments to the debug log print outs
|
||||
* Remove realloc dependency in DtlsMsgCombineFragBuckets function
|
||||
* Refactor to use WOLFSSL_CTX’s cipher suite list when possible
|
||||
* Update internal padding of 0’s with DSA sign and additional tests with mp_to_unsigned_bin_len function
|
||||
* With DTLS SRTP use wolfSSL_export_keying_material instead of wc_PRF_TLS
|
||||
* Updated macro naming from HAVE_KYBER to be WOLFSSL_HAVE_KYBER
|
||||
* Update AES XTS encrypt to handle in-place encryption properly
|
||||
* With TLS 1.3 add option to require only PSK with DHE
|
||||
### Memory Optimizations
|
||||
* Improvements to stack usage and management with SP int math library
|
||||
* Optimization to TLS 1.3 server to remove caching messages for Ed25519/Ed448
|
||||
* Added a HAVE_CURL macro build for building a subset of the wolfSSL library when linking with cURL
|
||||
* Memory usage improvement with reducing the size of alignment needed with AES
|
||||
* Reduce run time memory used with ECC operations and ALT_ECC_SIZE
|
||||
* Fixes and improvements for building edge cases such as crypto callback without hash-drbg with low footprint options
|
||||
* Support HAVE_SESSION_TICKET build option without depending on realloc
|
||||
|
||||
### Documentation
|
||||
* Instructions for GPDMA on STM32 configuration added
|
||||
* Add in instructions for compiling with zephyr on STM32
|
||||
* Documentation fixup for wolfSSL_get_chain_cert()
|
||||
* Fix the file pointed to in the TI RTOS documentation that we maintain
|
||||
* Documentation for wolfSSL_CertManagerFreeCRL
|
||||
* Updates made to AES and Chacha documentation
|
||||
* Update Japanese comments for Ed25519, AES, and other miscellaneous items
|
||||
|
||||
### Tests
|
||||
* Add in an option for easily testing malloc failures when building with WOLFSSL_MEM_FAIL_COUNT macro
|
||||
* Updated in process for using Expect vs Assert to facilitate more malloc failure tests
|
||||
* Enhance wolfCrypt test for builds that do not have ECC SECP curves enabled
|
||||
* ESP32 platform-specific VisualGDB test & benchmark projects
|
||||
* Update to dependencies in docker container file used for tests
|
||||
* Fix up for base 10 output with bundled benchmark application
|
||||
|
||||
### Port Updates
|
||||
* Zephyr port update, compile time warning fixes, misc. fixes when used with TLS and update of includes
|
||||
* Update RIOT-OS to not compile out use of writev by default
|
||||
* Update Micrium port to enable use of STM32_RNG
|
||||
* Micrium updates for XMEMOVE and XSTRTOK use
|
||||
* Various Espressif HW crypto, SHA2, AES, MP updates
|
||||
* Added in ASIO build option with CMake builds
|
||||
|
||||
### General Enhancements
|
||||
* Global codebase cleanup for C89 compliance and wolfCrypt -Wconversion hygiene
|
||||
* PKCS#11 enhancement adding a callback for RSA key size when using a hardware key, by default 2048 bit key is used
|
||||
* Allow for unknown OIDs in extensions in wolfSSL_X509_set_ext()
|
||||
* Allow user to override XSTAT by defining the macro XSTAT when compiling
|
||||
* Support UPN and SID with x509 certificate extensions and custom OID build
|
||||
* Write next IV in wolfSSL_DES_ede3_cbc_encrypt for better handling of inline encryption
|
||||
* Adding NO_ASN_TIME_CHECK build option for compiling out certificate before/after checks
|
||||
* Improve different peer recvfrom handling and error reporting with ipv4 vs ipv6
|
||||
|
||||
## Fixes
|
||||
* Fix for STM32 ECC sign and verify out of bounds buffer write when the hash length passed in is larger than the key size. Thanks to Maximilian for the report.
|
||||
* Fix to skip Async_DevCtxInit when using init rsa/ecc label/id api's
|
||||
* Revert WOLFSSL_NO_ASN_STRICT macro guard around alternate names directory list
|
||||
* In async mode, don't retry decrypting if a valid error is encountered on a packet parse attempt
|
||||
* Add additional sanity check on PKCS7 index value in wc_PKCS7_DecryptKekri
|
||||
* Fix for padding when using an AuthEnvelope PKCS7 type with GCM/CCM stream ciphers
|
||||
* Fix siphash assembly so that no register is left behind
|
||||
* Fix to not send a TLS 1.3 session ID resume response when resuming and downgrading to a protocol less than TLS 1.3
|
||||
* Fix overwriting serialNumber by favouriteDrink when generating a certificate using Cert struct
|
||||
* Fix for the default realloc used with EspressIf builds
|
||||
* Track SetDigest usage to avoid invalid free under error conditions
|
||||
* DTLS v1.3 fix for epoch 0 check on plaintext message
|
||||
* Fix for session ticket memory leak in wolfSSL_Cleanup
|
||||
* Fixes for propagating SendAlert errors when the peer disconnects
|
||||
* Replace XMEMCPY with XMEMMOVE to fix valgrind-3.15.0 reports "Source and destination overlap in memcpy" when using --enable-aesgcm-stream
|
||||
* Fix for potential out-of-bounds write edge case in fp_mod_2d with --enable-fastmath math library
|
||||
* Fix getting ECC key size in stm32_ecc_sign_hash_ex
|
||||
* Fix for case where wc_PeekErrorNodeLineData was not unlocking error queue on error
|
||||
* Fix for async ECC shared secret state
|
||||
* Fix for better error checking with sp_gcd with SP int math library
|
||||
* Fix memory leak in TLSX_KeyShare_Setup when handling an error case
|
||||
* Fix for double free edge case in InitOCSPRequest when handling a memory allocation failure
|
||||
* X509 NAME Entry fix for leaking memory on error case
|
||||
* Fix wolfssl_asn1_time_to_tm setting unexpected fields in tm struct
|
||||
* Fix for FIPS ECC integrity check with crypto callback set
|
||||
* BN_to_ASN1_INTEGER fix for handling leading zero byte padding when needed
|
||||
* Fix a typo in PP macro and add a ceiling to guard against implementation bugs
|
||||
* DTLS 1.3 fix for using the correct label when deriving the resumption key
|
||||
* OCSP fix for GetDateInfo edge case with non ASN template builds
|
||||
* Allow a user set certificate callback function to override the skipAddCA flag when parsing a certificate
|
||||
* SP int: sp_radix_size when radix 10 fix temp size for handling edge case
|
||||
* Fixes and improvements for handling failures with memory allocations
|
||||
* Fix for DecodeECC_DSA_Sig to handle r and s being initialized
|
||||
* Fix for wc_ecc_is_point to ensure that the x and y are in range [0, p-1] and z is one (affine ordinates)
|
||||
|
||||
### Ports
|
||||
* Fix for AES use with CAAM on imx8qxp with SECO builds
|
||||
* Fix for PIC32 crypto HW and unused `TLSX_SetResponse`
|
||||
* Fix warning if ltime is unsigned seen with QNX build
|
||||
* Updates and fix for Zephyr project support
|
||||
* Include sys/time.h for WOLFSSL_RIOT_OS
|
||||
* Move X509_V errors from enums to defines for use with HAProxy CLI
|
||||
* Fix IAR compiler warnings resolved
|
||||
* Fix for STM32 Hash peripherals (like on F437) with FIFO depth = 1
|
||||
* ESP32 fix for SHA384 init with hardware acceleration
|
||||
|
||||
### Builds
|
||||
* Add WOLFSSL_IP_ALT_NAME macro define to --enable-curl
|
||||
* Fixes for building with C++17 and avoiding clashing with byte naming
|
||||
* Fixes SP math all build issue with small-stack and no hardening
|
||||
* Fix for building with ASN template with `NO_ASN_TIME` defined
|
||||
* Fix building FIPSv2 with WOLFSSL_ECDSA_SET_K defined
|
||||
* Don't allow aesgcm-stream option with kcapi
|
||||
* Fix DTLS test case for when able to read peers close notify alert on FreeBSD systems
|
||||
* Fix for "expression must have a constant value" in tls13.c with Green Hills compiler
|
||||
* Fixes for building KCAPI with opensslextra enabled
|
||||
* Fix warnings of shadows min and subscript with i486-netbsd-gcc compiler
|
||||
* Fix issue with async and `WOLFSSL_CHECK_ALERT_ON_ERR`
|
||||
* Fix for PKCS7 with asynchronous crypto enabled
|
||||
|
||||
### Math Library
|
||||
* SP Aarch64 fix for conditional changed in asm needing "cc" and fix for ECC P256 mont reduce
|
||||
* In SP builds add sanity check with DH exp. to check the output length for minimum size
|
||||
* In SP math fix scalar length check with EC scalar multiply
|
||||
* With SP int fix handling negative character properly with read radix
|
||||
* Add error checks before setting variable err in SP int with the function sp_invmod_mont_ct
|
||||
* Fix to add sanity check for malloc of zero size in fastmath builds
|
||||
* In fastmath fix a possible overflow in fp_to_unsigned_bin_len length check
|
||||
* Heapmath fast mod. reduce fix
|
||||
|
||||
### Compatibility Layer
|
||||
* Fixes for encoding/decoding ecc public keys and ensure i2d public key functions do not include any private key information
|
||||
* Fix for EVP_EncryptUpdate to update outl on empty input
|
||||
* Fix SE050 RSA public key loading and RSA/ECC SE050 TLS Compatibility
|
||||
* Rework EC API and validate point after setting it
|
||||
* Fix for X509 RSA PSS with compatibility layer functions
|
||||
* Fix size of structures used with SHA operations when built with opensslextra for Espressif hardware accelerated hashing
|
||||
* Added sanity check on key length with wolfSSL_CMAC_Init function
|
||||
* Fix for return value type conversion of bad mutex error in logging function
|
||||
* Fix NID conflict NID_givenName and NID_md5WithRSAEncryption
|
||||
* Fix unguarded XFPRINTF calls with opensslextra build
|
||||
* Fix wolfSSL_ASN1_INTEGER_to_BN for negative values
|
||||
* Fix for potential ASN1_STRING leak in wolfSSL_X509_NAME_ENTRY_create_by_txt and wolfSSL_X509_NAME_ENTRY_create_by_NID when memory allocation fails
|
||||
|
||||
### Misc.
|
||||
* Add sanity check to prevent an out of bounds read with OCSP response decoding
|
||||
* Sanity check to not allow 0 length with bit string and integer when parsing ASN1 syntax
|
||||
* Adjust RNG sanity checks and remove error prone first byte comparison
|
||||
* With PKCS7 add a fix for GetAsnTimeString() to correctly increment internal data pointer
|
||||
* PKCS7 addition of sequence around algo parameters with authenvelop
|
||||
* DSA fixes for clearing mp_int before re-reading data and avoid mp_clear without first calling mp_init
|
||||
* Fix for SRTP setting bitfield when it is encoded for the TLS extension
|
||||
* Fix for handling small http headers when doing CRL verification
|
||||
* Fix for ECCSI hash function to validate the output size and curve size
|
||||
* Fix for value of givenName and name being reversed with CSR generation
|
||||
* Fix for error type returned (OCSP_CERT_UNKNOWN) with OCSP verification
|
||||
* Fix for a potential memory leak with ProcessCSR when handling OCSP responses
|
||||
* Fix for VERIFY_SKIP_DATE flag not ignoring date errors when set
|
||||
* Fix for zlib decompression buffer issue with PKCS7
|
||||
* Fix for DTLS message pool send size used and DTLS server saving of the handshake sequence
|
||||
* Fix to propagate WOLFSSL_TICKET_RET_CREATE error return value from DoDecryptTicket()
|
||||
* Fix for handling long session IDs with TLS 1.3 session tickets
|
||||
* Fix for AES-GCM streaming when caching an IV
|
||||
* Fix for test case with older selftest that returns bad padding instead of salt len error
|
||||
* Add fix for siphash cache and added in additional tests
|
||||
* Fix potential out of bounds memset to 0 in error case with session export function used with --enable-sessionexport builds
|
||||
* Fix possible NULL dereference in TLSX_CSR_Parse with TLS 1.3
|
||||
* Fix for sanity check on RSA pad length with no padding using the build macro WC_RSA_NO_PADDING
|
||||
|
||||
### Build Fixes
|
||||
* Fix for building on Windows with CMake and using USER_SETTINGS and fix for options.h creation with CMake when using USER_SETTINGS
|
||||
* CMake fixes and improvements for use with mingw32
|
||||
* Fix for building with wpas and x509 small options
|
||||
* Check if colrm is available for options.h creation when using autoconf
|
||||
* Clean up NO_BIG_INT build, removing WOLFSSL_SP_MATH macro and heapmath compile
|
||||
* Fix PKCS#7 build with NO_PKCS7_STREAM
|
||||
* Fix compilation error in CC-RX and remove unnecessary public key import
|
||||
* SP Build fixes for ARM assembly with ARMv6 clz and ARM thumb debug build
|
||||
* For to not advertise support for RSA in TLS extensions when compiled with NO_RSA
|
||||
|
||||
For additional vulnerability information visit the vulnerability page at:
|
||||
https://www.wolfssl.com/docs/security-vulnerabilities/
|
||||
|
282
README.md
282
README.md
@@ -79,188 +79,138 @@ single call hash function. Instead the name `WC_SHA`, `WC_SHA256`, `WC_SHA384` a
|
||||
`WC_SHA512` should be used for the enum name.
|
||||
|
||||
|
||||
# wolfSSL Release 5.6.0 (Mar 24, 2023)
|
||||
# wolfSSL Release 5.6.2 (Jun 09, 2023)
|
||||
|
||||
Release 5.6.0 has been developed according to wolfSSL's development and QA process (see link below) and successfully passed the quality criteria.
|
||||
Release 5.6.2 has been developed according to wolfSSL's development and QA process (see link below) and successfully passed the quality criteria.
|
||||
https://www.wolfssl.com/about/wolfssl-software-development-process-quality-assurance
|
||||
|
||||
NOTE: * --enable-heapmath is being deprecated and will be removed by 2024
|
||||
* This release makes ASN Template the default with ./configure, the previous ASN parsing can be built with --enable-asn=original
|
||||
|
||||
Release 5.6.0 of wolfSSL embedded TLS has bug fixes and new features including:
|
||||
Release 5.6.2 of wolfSSL embedded TLS has bug fixes and new features including:
|
||||
|
||||
## Vulnerabilities
|
||||
* [Low] In cases where a malicious agent could analyze cache timing at a very detailed level, information about the AES key used could be leaked during T/S Box lookups. One such case was shown on RISC-V hardware using the MicroWalk tool (https://github.com/microwalk-project/Microwalk). A hardened version of T/S Box lookups was added in wolfSSL to help mitigate this potential attack and is now on by default with RISC-V builds and can be enabled on other builds if desired by compiling wolfSSL with the macro WOLFSSL_AES_TOUCH_LINES. Thanks to Jan Wichelmann, Christopher Peredy, Florian Sieck, Anna Pätschke, Thomas Eisenbarth (University of Lübeck): MAMBO-V: Dynamic Side-Channel Leakage Analysis on RISC-V. Fixed in the following GitHub pull request https://github.com/wolfSSL/wolfssl/pull/6309
|
||||
* [High] In previous versions of wolfSSL if a TLS 1.3 client gets neither a PSK (pre shared key) extension nor a KSE (key share extension) when connecting to a malicious server, a default predictable buffer gets used for the IKM value when generating the session master secret. Using a potentially known IKM value when generating the session master secret key compromises the key generated, allowing an eavesdropper to reconstruct it and potentially allowing surreptitious access to or meddling with message contents in the session. This issue does not affect client validation of connected servers, nor expose private key information, but could result in an insecure TLS 1.3 session when not controlling both sides of the connection. We recommend that TLS 1.3 client side users update the version of wolfSSL used. Thanks to Johannes from Sectra Communications and Linköping University for the report. Fixed in the following GitHub pull request https://github.com/wolfSSL/wolfssl/pull/6412
|
||||
|
||||
## New Feature Additions
|
||||
|
||||
* ASN template is now the default ASN parsing implementation when compiling with configure
|
||||
* Added in support for TLS v1.3 Encrypted Client Hello (ECH) and HPKE (Hybrid Public Key Encryption)
|
||||
* DTLS 1.3 stateless server ClientHello parsing support added
|
||||
### New Ports and Expansions
|
||||
* Add support for STM32H5
|
||||
* Add support for Renesas TSIP v1.17
|
||||
* Add Renesas SCE RSA crypto-only support
|
||||
* STARCORE DSP port and example builds added
|
||||
* Add the function wc_PKCS7_SetDefaultSignedAttribs for setting PKCS7 signed attributes to use with PKCS7 bundle creation
|
||||
* NXP IMX6Q CAAM port with QNX and performance optimizations for AES-CTR
|
||||
|
||||
### Ports
|
||||
* Add RX64/RX71 SHA hardware support
|
||||
* Port to RT1170 and expand NXP CAAM driver support
|
||||
* Add NuttX integration files for ease of use
|
||||
* Updated Stunnel support for version 5.67
|
||||
Compatibility Layer
|
||||
* Add in support for AES-CCM with EVP
|
||||
* BN compatibility API refactoring and separate API created
|
||||
* Expanding public key type cipher suite list strings support
|
||||
### New Build Options
|
||||
* ASN.1 print utility to decode ASN.1 syntax and print out human readable text --enable-asn-print. Utility app is located in the directory ./examples/asn1/
|
||||
* Add introspection for math build, wc_GetMathInfo() to get information about the math library compiled into the linked wolfSSL library
|
||||
* Implement TLS recommendations from RFC 9325 for hardening TLS/DTLS security. Enabled with the autoconf flag --enable-harden-tls.
|
||||
* Add option to support disabling thread local storage, --disable-threadlocal
|
||||
* Added wc_DsaSign_ex() and wc_DsaVerify_ex() for handling alternative digest algorithms with DSA Sign/Verify
|
||||
* Implement atomic operations interface. Macros auto-detect if atomic operations are expected to be available, can be turned off with the macro WOLFSSL_NO_ATOMICS
|
||||
* Added support for DTLS 1.3 Authentication and Integrity-Only Cipher Suites
|
||||
* Expand crypto callback to have a device ID find callback function with wc_CryptoCb_SetDeviceFindCb. Enabled with the macro WOLF_CRYPTO_CB_FIND
|
||||
|
||||
### Misc.
|
||||
* Support pthread_rwlock and add enable option
|
||||
* Add wolfSSL_CertManagerLoadCABuffer_ex() that takes a user certificate chain flag and additional verify flag options
|
||||
* Docker build additions for wolfSSL library and wolfCLU application
|
||||
* Add favorite drink pilot attribute type to get it from the encoding
|
||||
* Added in support for indefinite length BER parsing with PKCS12
|
||||
* Add dynamic session cache which allocates sessions from the heap with macro SESSION_CACHE_DYNAMIC_MEM
|
||||
|
||||
|
||||
## Improvements / Optimizations
|
||||
|
||||
### Tests
|
||||
* Additional CI (continuous integration) testing and leveraging of GitHub workflows
|
||||
* Add CI testing for wpa_supplicant, OpenWrt and OpenVPN using GitHub workflows
|
||||
* Add compilation of Espressif to GitHub workflows tests
|
||||
* Refactoring and improving error results with wolfCrypt unit test application
|
||||
* Minor warning fixes from Coverity static analysis scan
|
||||
* Add new SHA-512/224 and SHA-512/256 tests
|
||||
* Used codespell and fixed some minor typos
|
||||
|
||||
### Ports
|
||||
* Improve TLS1.2 client authentication to use TSIP
|
||||
* Updated Kyber macro to be WOLFSSL_HAVE_KYBER and made changes that make Kyber work on STM32
|
||||
* AES-GCM Windows assembly additions
|
||||
* CRLF line endings, trailing spaces for C# Wrapper Projects
|
||||
Compatibility Layer
|
||||
* Update `PubKey` and `Key` PEM-to-DER APIs to support return of needed DER size
|
||||
* Allow reading ENC EC PRIVATE KEY as well via wolfSSL_PEM_read_bio_ECPrivateKey
|
||||
* Improve wolfSSL_EC_POINT_cmp to handle Jacobian ordinates
|
||||
* Fix issue with BIO_reset() and add BIO_FLAGS_MEM_RDONLY flag support for read only BIOs
|
||||
|
||||
### SP
|
||||
* In SP math library rework mod 3 and use count leading zero instruction
|
||||
* Fix with SP ECC sign to reject the random k generated when r is 0
|
||||
* With SP math add better detection of when add won't work and double is needed with point_add_qz1 internal function
|
||||
* With SP int fail when buffer writing to is too small for number rather than discarding the extra values
|
||||
|
||||
### Builds
|
||||
* Define WOLFSSL_SP_SMALL_STACK if wolfSSL is build with --enable-smallstack
|
||||
* Fix CMake to exclude libm when DH is not enabled
|
||||
* Allow building of SAKKE as external non-FIPS algorithm with wolfmikey product
|
||||
* Add option to add library suffix, --with-libsuffix
|
||||
* ASN template compile option WOLFSSL_ASN_INT_LEAD_0_ANY to allow leading zeros
|
||||
* Add user_settings.h template for wolfTPM to examples/configs/user_settings_wolftpm.h
|
||||
* Purge the AES variant of Dilithium
|
||||
* Expand WOLFSSL_NO_ASN_STRICT to allow parsing of explicit ECC public key
|
||||
* Remove relocatable text in ARMv7a AES assembly for use with FIPS builds
|
||||
* Expand checking for hardware that supports ARMv7a neon with autotools configure
|
||||
* Sanity check on allocation fails with DSA and FP_ECC build when zeroizing internal buffer
|
||||
* Additional TLS alerts sent when compiling with WOLFSSL_EXTRA_ALERTS macro defined
|
||||
|
||||
### Benchmarking
|
||||
* Update wolfCrypt benchmark Windows build files to support x64 Platform
|
||||
* Add SHA512/224 and SHA512/256 benchmarks, fixed CVS macro and display sizes
|
||||
* Separate AES-GCM streaming runs when benchmarked
|
||||
* No longer call external implementation of Kyber from benchmark
|
||||
* Fix for benchmarking shake with custom block size
|
||||
* Fixes for benchmark help `-alg` list and block format
|
||||
Documentation/Examples
|
||||
* Document use of wc_AesFree() and update documentation of Ed25519 with Doxygen
|
||||
* Move the wolfSSL Configuration section higher in QUIC.md
|
||||
* Add Japanese Doxygen documentation for cmac.h, quic.h and remove incomplete Japanese doxygen in asn_public.h
|
||||
* Espressif examples run with local wolfSSL now with no additional setup needed
|
||||
* Added a fix for StartTLS use In the example client
|
||||
* Add a base-line user_settings.h for use with FIPS 140-3 in XCode example app
|
||||
## Enhancements and Optimizations
|
||||
|
||||
### Optimizations
|
||||
* AES-NI usage added for AES modes ECB/CTR/XTS
|
||||
* Increased performance with ChaCha20 C implementation and general XOR operations
|
||||
* Added integer type to the ASN.1 sequencing with ASN.1 Integer sequence
|
||||
* With wolfSSL_get_x509_next_altname reset alt name list to head once cycled through if compiling with the macro WOLFSSL_MULTICIRCULATE_ALTNAMELIST
|
||||
* Additional key validity sanity checks on input to wolfSSL_EC_KEY_set_private_key
|
||||
* adds support for TLSv1.3 stateful session tickets when using SSL_OP_NO_TICKET
|
||||
|
||||
### Misc
|
||||
* Update AES-GCM stream decryption to allow long IVs
|
||||
* Internal refactor to use wolfSSL_Ref functions when incrementing or decrementing the structures reference count and fixes for static analysis reports
|
||||
* Cleanup function logging making adjustments to the debug log print outs
|
||||
* Remove realloc dependency in DtlsMsgCombineFragBuckets function
|
||||
* Refactor to use WOLFSSL_CTX’s cipher suite list when possible
|
||||
* Update internal padding of 0’s with DSA sign and additional tests with mp_to_unsigned_bin_len function
|
||||
* With DTLS SRTP use wolfSSL_export_keying_material instead of wc_PRF_TLS
|
||||
* Updated macro naming from HAVE_KYBER to be WOLFSSL_HAVE_KYBER
|
||||
* Update AES XTS encrypt to handle in-place encryption properly
|
||||
* With TLS 1.3 add option to require only PSK with DHE
|
||||
### Memory Optimizations
|
||||
* Improvements to stack usage and management with SP int math library
|
||||
* Optimization to TLS 1.3 server to remove caching messages for Ed25519/Ed448
|
||||
* Added a HAVE_CURL macro build for building a subset of the wolfSSL library when linking with cURL
|
||||
* Memory usage improvement with reducing the size of alignment needed with AES
|
||||
* Reduce run time memory used with ECC operations and ALT_ECC_SIZE
|
||||
* Fixes and improvements for building edge cases such as crypto callback without hash-drbg with low footprint options
|
||||
* Support HAVE_SESSION_TICKET build option without depending on realloc
|
||||
|
||||
### Documentation
|
||||
* Instructions for GPDMA on STM32 configuration added
|
||||
* Add in instructions for compiling with zephyr on STM32
|
||||
* Documentation fixup for wolfSSL_get_chain_cert()
|
||||
* Fix the file pointed to in the TI RTOS documentation that we maintain
|
||||
* Documentation for wolfSSL_CertManagerFreeCRL
|
||||
* Updates made to AES and Chacha documentation
|
||||
* Update Japanese comments for Ed25519, AES, and other miscellaneous items
|
||||
|
||||
### Tests
|
||||
* Add in an option for easily testing malloc failures when building with WOLFSSL_MEM_FAIL_COUNT macro
|
||||
* Updated in process for using Expect vs Assert to facilitate more malloc failure tests
|
||||
* Enhance wolfCrypt test for builds that do not have ECC SECP curves enabled
|
||||
* ESP32 platform-specific VisualGDB test & benchmark projects
|
||||
* Update to dependencies in docker container file used for tests
|
||||
* Fix up for base 10 output with bundled benchmark application
|
||||
|
||||
### Port Updates
|
||||
* Zephyr port update, compile time warning fixes, misc. fixes when used with TLS and update of includes
|
||||
* Update RIOT-OS to not compile out use of writev by default
|
||||
* Update Micrium port to enable use of STM32_RNG
|
||||
* Micrium updates for XMEMOVE and XSTRTOK use
|
||||
* Various Espressif HW crypto, SHA2, AES, MP updates
|
||||
* Added in ASIO build option with CMake builds
|
||||
|
||||
### General Enhancements
|
||||
* Global codebase cleanup for C89 compliance and wolfCrypt -Wconversion hygiene
|
||||
* PKCS#11 enhancement adding a callback for RSA key size when using a hardware key, by default 2048 bit key is used
|
||||
* Allow for unknown OIDs in extensions in wolfSSL_X509_set_ext()
|
||||
* Allow user to override XSTAT by defining the macro XSTAT when compiling
|
||||
* Support UPN and SID with x509 certificate extensions and custom OID build
|
||||
* Write next IV in wolfSSL_DES_ede3_cbc_encrypt for better handling of inline encryption
|
||||
* Adding NO_ASN_TIME_CHECK build option for compiling out certificate before/after checks
|
||||
* Improve different peer recvfrom handling and error reporting with ipv4 vs ipv6
|
||||
|
||||
## Fixes
|
||||
* Fix for STM32 ECC sign and verify out of bounds buffer write when the hash length passed in is larger than the key size. Thanks to Maximilian for the report.
|
||||
* Fix to skip Async_DevCtxInit when using init rsa/ecc label/id api's
|
||||
* Revert WOLFSSL_NO_ASN_STRICT macro guard around alternate names directory list
|
||||
* In async mode, don't retry decrypting if a valid error is encountered on a packet parse attempt
|
||||
* Add additional sanity check on PKCS7 index value in wc_PKCS7_DecryptKekri
|
||||
* Fix for padding when using an AuthEnvelope PKCS7 type with GCM/CCM stream ciphers
|
||||
* Fix siphash assembly so that no register is left behind
|
||||
* Fix to not send a TLS 1.3 session ID resume response when resuming and downgrading to a protocol less than TLS 1.3
|
||||
* Fix overwriting serialNumber by favouriteDrink when generating a certificate using Cert struct
|
||||
* Fix for the default realloc used with EspressIf builds
|
||||
* Track SetDigest usage to avoid invalid free under error conditions
|
||||
* DTLS v1.3 fix for epoch 0 check on plaintext message
|
||||
* Fix for session ticket memory leak in wolfSSL_Cleanup
|
||||
* Fixes for propagating SendAlert errors when the peer disconnects
|
||||
* Replace XMEMCPY with XMEMMOVE to fix valgrind-3.15.0 reports "Source and destination overlap in memcpy" when using --enable-aesgcm-stream
|
||||
* Fix for potential out-of-bounds write edge case in fp_mod_2d with --enable-fastmath math library
|
||||
* Fix getting ECC key size in stm32_ecc_sign_hash_ex
|
||||
* Fix for case where wc_PeekErrorNodeLineData was not unlocking error queue on error
|
||||
* Fix for async ECC shared secret state
|
||||
* Fix for better error checking with sp_gcd with SP int math library
|
||||
* Fix memory leak in TLSX_KeyShare_Setup when handling an error case
|
||||
* Fix for double free edge case in InitOCSPRequest when handling a memory allocation failure
|
||||
* X509 NAME Entry fix for leaking memory on error case
|
||||
* Fix wolfssl_asn1_time_to_tm setting unexpected fields in tm struct
|
||||
* Fix for FIPS ECC integrity check with crypto callback set
|
||||
* BN_to_ASN1_INTEGER fix for handling leading zero byte padding when needed
|
||||
* Fix a typo in PP macro and add a ceiling to guard against implementation bugs
|
||||
* DTLS 1.3 fix for using the correct label when deriving the resumption key
|
||||
* OCSP fix for GetDateInfo edge case with non ASN template builds
|
||||
* Allow a user set certificate callback function to override the skipAddCA flag when parsing a certificate
|
||||
* SP int: sp_radix_size when radix 10 fix temp size for handling edge case
|
||||
* Fixes and improvements for handling failures with memory allocations
|
||||
* Fix for DecodeECC_DSA_Sig to handle r and s being initialized
|
||||
* Fix for wc_ecc_is_point to ensure that the x and y are in range [0, p-1] and z is one (affine ordinates)
|
||||
|
||||
### Ports
|
||||
* Fix for AES use with CAAM on imx8qxp with SECO builds
|
||||
* Fix for PIC32 crypto HW and unused `TLSX_SetResponse`
|
||||
* Fix warning if ltime is unsigned seen with QNX build
|
||||
* Updates and fix for Zephyr project support
|
||||
* Include sys/time.h for WOLFSSL_RIOT_OS
|
||||
* Move X509_V errors from enums to defines for use with HAProxy CLI
|
||||
* Fix IAR compiler warnings resolved
|
||||
* Fix for STM32 Hash peripherals (like on F437) with FIFO depth = 1
|
||||
* ESP32 fix for SHA384 init with hardware acceleration
|
||||
|
||||
### Builds
|
||||
* Add WOLFSSL_IP_ALT_NAME macro define to --enable-curl
|
||||
* Fixes for building with C++17 and avoiding clashing with byte naming
|
||||
* Fixes SP math all build issue with small-stack and no hardening
|
||||
* Fix for building with ASN template with `NO_ASN_TIME` defined
|
||||
* Fix building FIPSv2 with WOLFSSL_ECDSA_SET_K defined
|
||||
* Don't allow aesgcm-stream option with kcapi
|
||||
* Fix DTLS test case for when able to read peers close notify alert on FreeBSD systems
|
||||
* Fix for "expression must have a constant value" in tls13.c with Green Hills compiler
|
||||
* Fixes for building KCAPI with opensslextra enabled
|
||||
* Fix warnings of shadows min and subscript with i486-netbsd-gcc compiler
|
||||
* Fix issue with async and `WOLFSSL_CHECK_ALERT_ON_ERR`
|
||||
* Fix for PKCS7 with asynchronous crypto enabled
|
||||
|
||||
### Math Library
|
||||
* SP Aarch64 fix for conditional changed in asm needing "cc" and fix for ECC P256 mont reduce
|
||||
* In SP builds add sanity check with DH exp. to check the output length for minimum size
|
||||
* In SP math fix scalar length check with EC scalar multiply
|
||||
* With SP int fix handling negative character properly with read radix
|
||||
* Add error checks before setting variable err in SP int with the function sp_invmod_mont_ct
|
||||
* Fix to add sanity check for malloc of zero size in fastmath builds
|
||||
* In fastmath fix a possible overflow in fp_to_unsigned_bin_len length check
|
||||
* Heapmath fast mod. reduce fix
|
||||
|
||||
### Compatibility Layer
|
||||
* Fixes for encoding/decoding ecc public keys and ensure i2d public key functions do not include any private key information
|
||||
* Fix for EVP_EncryptUpdate to update outl on empty input
|
||||
* Fix SE050 RSA public key loading and RSA/ECC SE050 TLS Compatibility
|
||||
* Rework EC API and validate point after setting it
|
||||
* Fix for X509 RSA PSS with compatibility layer functions
|
||||
* Fix size of structures used with SHA operations when built with opensslextra for Espressif hardware accelerated hashing
|
||||
* Added sanity check on key length with wolfSSL_CMAC_Init function
|
||||
* Fix for return value type conversion of bad mutex error in logging function
|
||||
* Fix NID conflict NID_givenName and NID_md5WithRSAEncryption
|
||||
* Fix unguarded XFPRINTF calls with opensslextra build
|
||||
* Fix wolfSSL_ASN1_INTEGER_to_BN for negative values
|
||||
* Fix for potential ASN1_STRING leak in wolfSSL_X509_NAME_ENTRY_create_by_txt and wolfSSL_X509_NAME_ENTRY_create_by_NID when memory allocation fails
|
||||
|
||||
### Misc.
|
||||
* Add sanity check to prevent an out of bounds read with OCSP response decoding
|
||||
* Sanity check to not allow 0 length with bit string and integer when parsing ASN1 syntax
|
||||
* Adjust RNG sanity checks and remove error prone first byte comparison
|
||||
* With PKCS7 add a fix for GetAsnTimeString() to correctly increment internal data pointer
|
||||
* PKCS7 addition of sequence around algo parameters with authenvelop
|
||||
* DSA fixes for clearing mp_int before re-reading data and avoid mp_clear without first calling mp_init
|
||||
* Fix for SRTP setting bitfield when it is encoded for the TLS extension
|
||||
* Fix for handling small http headers when doing CRL verification
|
||||
* Fix for ECCSI hash function to validate the output size and curve size
|
||||
* Fix for value of givenName and name being reversed with CSR generation
|
||||
* Fix for error type returned (OCSP_CERT_UNKNOWN) with OCSP verification
|
||||
* Fix for a potential memory leak with ProcessCSR when handling OCSP responses
|
||||
* Fix for VERIFY_SKIP_DATE flag not ignoring date errors when set
|
||||
* Fix for zlib decompression buffer issue with PKCS7
|
||||
* Fix for DTLS message pool send size used and DTLS server saving of the handshake sequence
|
||||
* Fix to propagate WOLFSSL_TICKET_RET_CREATE error return value from DoDecryptTicket()
|
||||
* Fix for handling long session IDs with TLS 1.3 session tickets
|
||||
* Fix for AES-GCM streaming when caching an IV
|
||||
* Fix for test case with older selftest that returns bad padding instead of salt len error
|
||||
* Add fix for siphash cache and added in additional tests
|
||||
* Fix potential out of bounds memset to 0 in error case with session export function used with --enable-sessionexport builds
|
||||
* Fix possible NULL dereference in TLSX_CSR_Parse with TLS 1.3
|
||||
* Fix for sanity check on RSA pad length with no padding using the build macro WC_RSA_NO_PADDING
|
||||
### Build Fixes
|
||||
* Fix for building on Windows with CMake and using USER_SETTINGS and fix for options.h creation with CMake when using USER_SETTINGS
|
||||
* CMake fixes and improvements for use with mingw32
|
||||
* Fix for building with wpas and x509 small options
|
||||
* Check if colrm is available for options.h creation when using autoconf
|
||||
* Clean up NO_BIG_INT build, removing WOLFSSL_SP_MATH macro and heapmath compile
|
||||
* Fix PKCS#7 build with NO_PKCS7_STREAM
|
||||
* Fix compilation error in CC-RX and remove unnecessary public key import
|
||||
* SP Build fixes for ARM assembly with ARMv6 clz and ARM thumb debug build
|
||||
* For to not advertise support for RSA in TLS extensions when compiled with NO_RSA
|
||||
|
||||
For additional vulnerability information visit the vulnerability page at:
|
||||
https://www.wolfssl.com/docs/security-vulnerabilities/
|
||||
|
@@ -7,7 +7,7 @@
|
||||
#
|
||||
AC_COPYRIGHT([Copyright (C) 2006-2020 wolfSSL Inc.])
|
||||
AC_PREREQ([2.69])
|
||||
AC_INIT([wolfssl],[5.6.0],[https://github.com/wolfssl/wolfssl/issues],[wolfssl],[https://www.wolfssl.com])
|
||||
AC_INIT([wolfssl],[5.6.2],[https://github.com/wolfssl/wolfssl/issues],[wolfssl],[https://www.wolfssl.com])
|
||||
AC_CONFIG_AUX_DIR([build-aux])
|
||||
|
||||
# The following sets CFLAGS to empty if unset on command line. We do not
|
||||
@@ -47,9 +47,9 @@ AC_SUBST([WOLFSSL_CONFIG_ARGS])
|
||||
# The three numbers in the libwolfssl.so.*.*.* file name. Unfortunately
|
||||
# these numbers don't always line up nicely with the library version.
|
||||
WOLFSSL_LIBRARY_VERSION_FIRST=35
|
||||
WOLFSSL_LIBRARY_VERSION_SECOND=4
|
||||
WOLFSSL_LIBRARY_VERSION_SECOND=5
|
||||
WOLFSSL_LIBRARY_VERSION_THIRD=0
|
||||
WOLFSSL_LIBRARY_VERSION=39:0:4
|
||||
WOLFSSL_LIBRARY_VERSION=40:0:5
|
||||
# | | |
|
||||
# +------+ | +---+
|
||||
# | | |
|
||||
|
BIN
wolfssl.rc
BIN
wolfssl.rc
Binary file not shown.
@@ -28,8 +28,8 @@
|
||||
extern "C" {
|
||||
#endif
|
||||
|
||||
#define LIBWOLFSSL_VERSION_STRING "5.6.0"
|
||||
#define LIBWOLFSSL_VERSION_HEX 0x05006000
|
||||
#define LIBWOLFSSL_VERSION_STRING "5.6.2"
|
||||
#define LIBWOLFSSL_VERSION_HEX 0x05006002
|
||||
|
||||
#ifdef __cplusplus
|
||||
}
|
||||
|
Reference in New Issue
Block a user