forked from wolfSSL/wolfssl
update version to 5.5.2
This commit is contained in:
@@ -28,16 +28,16 @@ if("${CMAKE_SOURCE_DIR}" STREQUAL "${CMAKE_BINARY_DIR}")
|
|||||||
You must delete them, or cmake will refuse to work.")
|
You must delete them, or cmake will refuse to work.")
|
||||||
endif()
|
endif()
|
||||||
|
|
||||||
project(wolfssl VERSION 5.5.1 LANGUAGES C ASM)
|
project(wolfssl VERSION 5.5.2 LANGUAGES C ASM)
|
||||||
|
|
||||||
# shared library versioning
|
# shared library versioning
|
||||||
# increment if interfaces have been added, removed or changed
|
# increment if interfaces have been added, removed or changed
|
||||||
set(LIBTOOL_CURRENT 36)
|
set(LIBTOOL_CURRENT 37)
|
||||||
# increment if source code has changed set to zero if current is incremented
|
# increment if source code has changed set to zero if current is incremented
|
||||||
set(LIBTOOL_REVISION 0)
|
set(LIBTOOL_REVISION 0)
|
||||||
# increment if interfaces have been added set to zero if interfaces have been
|
# increment if interfaces have been added set to zero if interfaces have been
|
||||||
# removed or changed
|
# removed or changed
|
||||||
set(LIBTOOL_AGE 1)
|
set(LIBTOOL_AGE 2)
|
||||||
|
|
||||||
math(EXPR LIBTOOL_SO_VERSION "${LIBTOOL_CURRENT} - ${LIBTOOL_AGE}")
|
math(EXPR LIBTOOL_SO_VERSION "${LIBTOOL_CURRENT} - ${LIBTOOL_AGE}")
|
||||||
set(LIBTOOL_FULL_VERSION ${LIBTOOL_SO_VERSION}.${LIBTOOL_AGE}.${LIBTOOL_REVISION})
|
set(LIBTOOL_FULL_VERSION ${LIBTOOL_SO_VERSION}.${LIBTOOL_AGE}.${LIBTOOL_REVISION})
|
||||||
|
54
ChangeLog.md
54
ChangeLog.md
@@ -1,3 +1,57 @@
|
|||||||
|
# wolfSSL Release 5.5.2 (Oct 28, 2022)
|
||||||
|
Release 5.5.2 of wolfSSL embedded TLS has bug fixes and new features including:
|
||||||
|
|
||||||
|
## Vulnerabilities
|
||||||
|
* [Med] In the case that the WOLFSSL_CALLBACKS macro is set when building wolfSSL, there is a potential heap over read of 5 bytes when handling TLS 1.3 client connections. This heap over read is limited to wolfSSL builds explicitly setting the macro WOLFSSL_CALLBACKS, the feature does not get turned on by any other build options. The macro WOLFSSL_CALLBACKS is intended for debug use only, but if having it enabled in production, users are recommended to disable WOLFSSL_CALLBACKS. Users enabling WOLFSSL_CALLBACKS are recommended to update their version of wolfSSL. Thanks to Lucca Hirschi and Steve Kremer from LORIA, Inria and Max Ammann from Trail of Bits for finding and reporting the bug with the tlspuffin tool developed partly at LORIA and Trail of Bits. CVE 2022-42905
|
||||||
|
|
||||||
|
Release 5.5.2 of wolfSSL embedded TLS has bug fixes and new features including:
|
||||||
|
|
||||||
|
## New Feature Additions
|
||||||
|
* Add function wolfSSL_CTX_load_system_CA_certs to load system CA certs into a WOLFSSL_CTX and --sys-ca-certs option to example client
|
||||||
|
* Add wolfSSL_set1_host to OpenSSL compatible API
|
||||||
|
* Added the function sk_X509_shift
|
||||||
|
* AES x86 ASM for AES-CBC and GCM performance enhancements
|
||||||
|
* Add assembly for AES for ARM32 without using crypto hardware instructions
|
||||||
|
* Xilinx Versal port and hardware acceleration tie in
|
||||||
|
* SP Cortex-M support for ICCARM
|
||||||
|
|
||||||
|
## Enhancements
|
||||||
|
* Add snifftest vcxproj file and documentation
|
||||||
|
* Nucleus Thread Types supported
|
||||||
|
* Handle certificates with RSA-PSS signature that have RSAk public keys
|
||||||
|
* Small stack build improvements
|
||||||
|
* DTLS 1.3 improvements for Alerts and unit tests
|
||||||
|
* Add a binary search for CRL
|
||||||
|
* Improvement of SSL/CTX_set_max_early_data() for client side
|
||||||
|
* Remove unused ASN1_GENERALIZEDTIME enum value from wolfssl/ssl.h
|
||||||
|
* Add user_settings.h for Intel/M1 FIPSv2 macOS C++ projects
|
||||||
|
* Add dtlscid.test to ‘make check’ unit testing
|
||||||
|
* Generate an assembler-safe user_settings.h in configure.ac and CMakeLists.txt
|
||||||
|
* ForceZero enabled with USE_FAST_MATH
|
||||||
|
* Add TLS 1.3 support of ticketNonce sizes bigger than MAX_TICKET_NONCE_SZ
|
||||||
|
* FIPSv2 builds on win10 adjust for new fastmath default in settings.h
|
||||||
|
* Add IRQ install for Aruix example
|
||||||
|
|
||||||
|
## Fixes
|
||||||
|
* When looking up the session by ID on the server, check that the protocol version of the SSL and session match on TLS 1.3 or not
|
||||||
|
* Fix for potential EVP_PKEY_DH memory leak with OPENSSL_EXTRA
|
||||||
|
* Curve448 32-bit C code: handle corner case
|
||||||
|
* Fixup builds using WOLFSSL_LOG_PRINTF
|
||||||
|
* Correct DIST_POINT_NAME type value
|
||||||
|
* Do not perform IV Wrap test when using cert3389 inlined armasm
|
||||||
|
* Fix for Linux kernel module and stdio.h
|
||||||
|
* (D)TLS: send alert on version mismatch
|
||||||
|
* Fix PKCS#7 SignedData verification when signer cert is not first in SET
|
||||||
|
* Fix bug with wolfIO_TcpConnect not working with timeout on Windows
|
||||||
|
* Fix output length bug in SP non-blocking ECC shared secret gen
|
||||||
|
* Fix build with enable-fastmath and disable-rsa
|
||||||
|
* Correct wolfSSL_sk_X509_new in OpenSSL compatible API
|
||||||
|
* Fixes for SP and x86_64 with MSVC
|
||||||
|
* Fix wrong size using DTLSv1.3 in RestartHandshakeHashWithCookie
|
||||||
|
* Fix redundant file include with TI RTOS build
|
||||||
|
* Fix wolfCrypt only build with wincrypt.h
|
||||||
|
* DTLS 1.2: Reset state when sending HelloVerifyRequest
|
||||||
|
|
||||||
# wolfSSL Release 5.5.1 (Sep 28, 2022)
|
# wolfSSL Release 5.5.1 (Sep 28, 2022)
|
||||||
Release 5.5.1 of wolfSSL embedded TLS has bug fixes and new features including:
|
Release 5.5.1 of wolfSSL embedded TLS has bug fixes and new features including:
|
||||||
|
|
||||||
|
@@ -51,8 +51,8 @@ END
|
|||||||
//
|
//
|
||||||
|
|
||||||
VS_VERSION_INFO VERSIONINFO
|
VS_VERSION_INFO VERSIONINFO
|
||||||
FILEVERSION 5,5,1,0
|
FILEVERSION 5,5,2,0
|
||||||
PRODUCTVERSION 5,5,1,0
|
PRODUCTVERSION 5,5,2,0
|
||||||
FILEFLAGSMASK 0x3fL
|
FILEFLAGSMASK 0x3fL
|
||||||
#ifdef _DEBUG
|
#ifdef _DEBUG
|
||||||
FILEFLAGS 0x1L
|
FILEFLAGS 0x1L
|
||||||
@@ -69,12 +69,12 @@ BEGIN
|
|||||||
BEGIN
|
BEGIN
|
||||||
VALUE "CompanyName", "wolfSSL Inc."
|
VALUE "CompanyName", "wolfSSL Inc."
|
||||||
VALUE "FileDescription", "The wolfSSL FIPS embedded SSL library is a lightweight, portable, C-language-based SSL/TLS library targeted at IoT, embedded, and RTOS environments primarily because of its size, speed, and feature set."
|
VALUE "FileDescription", "The wolfSSL FIPS embedded SSL library is a lightweight, portable, C-language-based SSL/TLS library targeted at IoT, embedded, and RTOS environments primarily because of its size, speed, and feature set."
|
||||||
VALUE "FileVersion", "5.5.1.0"
|
VALUE "FileVersion", "5.5.2.0"
|
||||||
VALUE "InternalName", "wolfssl-fips"
|
VALUE "InternalName", "wolfssl-fips"
|
||||||
VALUE "LegalCopyright", "Copyright (C) 2022"
|
VALUE "LegalCopyright", "Copyright (C) 2022"
|
||||||
VALUE "OriginalFilename", "wolfssl-fips.dll"
|
VALUE "OriginalFilename", "wolfssl-fips.dll"
|
||||||
VALUE "ProductName", "wolfSSL FIPS"
|
VALUE "ProductName", "wolfSSL FIPS"
|
||||||
VALUE "ProductVersion", "5.5.1.0"
|
VALUE "ProductVersion", "5.5.2.0"
|
||||||
END
|
END
|
||||||
END
|
END
|
||||||
BLOCK "VarFileInfo"
|
BLOCK "VarFileInfo"
|
||||||
|
94
README
94
README
@@ -70,63 +70,59 @@ should be used for the enum name.
|
|||||||
|
|
||||||
*** end Notes ***
|
*** end Notes ***
|
||||||
|
|
||||||
# wolfSSL Release 5.5.1 (Sep 28, 2022)
|
# wolfSSL Release 5.5.2 (Oct 28, 2022)
|
||||||
Release 5.5.1 of wolfSSL embedded TLS has bug fixes and new features including:
|
Release 5.5.2 of wolfSSL embedded TLS has bug fixes and new features including:
|
||||||
|
|
||||||
## Vulnerabilities
|
## Vulnerabilities
|
||||||
* [Med] Denial of service attack and buffer overflow against TLS 1.3 servers using session ticket resumption. When built with --enable-session-ticket and making use of TLS 1.3 server code in wolfSSL, there is the possibility of a malicious client to craft a malformed second ClientHello packet that causes the server to crash. This issue is limited to when using both --enable-session-ticket and TLS 1.3 on the server side. Users with TLS 1.3 servers, and having --enable-session-ticket, should update to the latest version of wolfSSL. Thanks to Max at Trail of Bits for the report, found by Lucca Hirschi from LORIA, Inria, France with the tlspuffin tool developed partly at LORIA and Trail of Bits. CVE-2022-39173
|
* [Med] In the case that the WOLFSSL_CALLBACKS macro is set when building wolfSSL, there is a potential heap over read of 5 bytes when handling TLS 1.3 client connections. This heap over read is limited to wolfSSL builds explicitly setting the macro WOLFSSL_CALLBACKS, the feature does not get turned on by any other build options. The macro WOLFSSL_CALLBACKS is intended for debug use only, but if having it enabled in production, users are recommended to disable WOLFSSL_CALLBACKS. Users enabling WOLFSSL_CALLBACKS are recommended to update their version of wolfSSL. Thanks to Lucca Hirschi and Steve Kremer from LORIA, Inria and Max Ammann from Trail of Bits for finding and reporting the bug with the tlspuffin tool developed partly at LORIA and Trail of Bits. CVE 2022-42905
|
||||||
|
|
||||||
|
Release 5.5.2 of wolfSSL embedded TLS has bug fixes and new features including:
|
||||||
|
|
||||||
## New Feature Additions
|
## New Feature Additions
|
||||||
* Add support for non-blocking ECC key gen and shared secret gen for P-256/384/521
|
* Add function wolfSSL_CTX_load_system_CA_certs to load system CA certs into a WOLFSSL_CTX and --sys-ca-certs option to example client
|
||||||
* Add support for non-blocking ECDHE/ECDSA in TLS/DTLS layer.
|
* Add wolfSSL_set1_host to OpenSSL compatible API
|
||||||
* Port to NXP RT685 with FreeRTOS
|
* Added the function sk_X509_shift
|
||||||
* Add option to build post quantum Kyber API (--enable-kyber)
|
* AES x86 ASM for AES-CBC and GCM performance enhancements
|
||||||
* Add post quantum algorithm sphincs to wolfCrypt
|
* Add assembly for AES for ARM32 without using crypto hardware instructions
|
||||||
* Config. option to force no asm with SP build (--enable-sp=noasm)
|
* Xilinx Versal port and hardware acceleration tie in
|
||||||
* Allow post quantum keyshare for DTLS 1.3
|
* SP Cortex-M support for ICCARM
|
||||||
|
|
||||||
## Enhancements
|
## Enhancements
|
||||||
* DTLSv1.3: Do HRR Cookie exchange by default
|
* Add snifftest vcxproj file and documentation
|
||||||
* Add wolfSSL_EVP_PKEY_new_CMAC_key to OpenSSL compatible API
|
* Nucleus Thread Types supported
|
||||||
* Update ide win10 build files to add missing sp source files
|
* Handle certificates with RSA-PSS signature that have RSAk public keys
|
||||||
* Improve Workbench docs
|
* Small stack build improvements
|
||||||
* Improve EVP support for CHACHA20_POLY1305
|
* DTLS 1.3 improvements for Alerts and unit tests
|
||||||
* Improve `wc_SetCustomExtension` documentation
|
* Add a binary search for CRL
|
||||||
* RSA-PSS with OCSP and add simple OCSP response DER verify test case
|
* Improvement of SSL/CTX_set_max_early_data() for client side
|
||||||
* Clean up some FIPS versioning logic in configure.ac and WIN10 user_settings.h
|
* Remove unused ASN1_GENERALIZEDTIME enum value from wolfssl/ssl.h
|
||||||
* Don't over-allocate memory for DTLS fragments
|
* Add user_settings.h for Intel/M1 FIPSv2 macOS C++ projects
|
||||||
* Add WOLFSSL_ATECC_TFLXTLS for Atmel port
|
* Add dtlscid.test to ‘make check’ unit testing
|
||||||
* SHA-3 performance improvements with x86_64 assembly
|
* Generate an assembler-safe user_settings.h in configure.ac and CMakeLists.txt
|
||||||
* Add code to fallback to S/W if TSIP cannot handle
|
* ForceZero enabled with USE_FAST_MATH
|
||||||
* Improves entropy with VxWorks
|
* Add TLS 1.3 support of ticketNonce sizes bigger than MAX_TICKET_NONCE_SZ
|
||||||
* Make time in milliseconds 64-bits for longer session ticket lives
|
* FIPSv2 builds on win10 adjust for new fastmath default in settings.h
|
||||||
* Support for setting cipher list with bytes
|
* Add IRQ install for Aruix example
|
||||||
* wolfSSL_set1_curves_list(), wolfSSL_CTX_set1_curves_list() improvements
|
|
||||||
* Add to RSAES-OAEP key parsing for pkcs7
|
|
||||||
* Add missing DN nid to work with PrintName()
|
|
||||||
* SP int: default to 16 bit word size when NO_64BIT defined
|
|
||||||
* Limit the amount of fragments we store per a DTLS connection and error out when max limit is reached
|
|
||||||
* Detect when certificate's RSA public key size is too big and fail on loading of certificate
|
|
||||||
|
|
||||||
## Fixes
|
## Fixes
|
||||||
* Fix for async with OCSP non-blocking in `ProcessPeerCerts`
|
* When looking up the session by ID on the server, check that the protocol version of the SSL and session match on TLS 1.3 or not
|
||||||
* Fixes for building with 32-bit and socket size sign/unsigned mismatch
|
* Fix for potential EVP_PKEY_DH memory leak with OPENSSL_EXTRA
|
||||||
* Fix Windows CMakeList compiler options
|
* Curve448 32-bit C code: handle corner case
|
||||||
* TLS 1.3 Middle-Box compat: fix missing brace
|
* Fixup builds using WOLFSSL_LOG_PRINTF
|
||||||
* Configuration consistency fixes for RSA keys and way to force disable of private keys
|
* Correct DIST_POINT_NAME type value
|
||||||
* Fix for Aarch64 Mac M1 SP use
|
* Do not perform IV Wrap test when using cert3389 inlined armasm
|
||||||
* Fix build errors and warnings for MSVC with DTLS 1.3
|
* Fix for Linux kernel module and stdio.h
|
||||||
* Fix HMAC compat layer function for SHA-1
|
* (D)TLS: send alert on version mismatch
|
||||||
* Fix DTLS 1.3 do not negotiate ConnectionID in HelloRetryRequest
|
* Fix PKCS#7 SignedData verification when signer cert is not first in SET
|
||||||
* Check return from call to wc_Time
|
* Fix bug with wolfIO_TcpConnect not working with timeout on Windows
|
||||||
* SP math: fix build configuration with opensslall
|
* Fix output length bug in SP non-blocking ECC shared secret gen
|
||||||
* Fix for async session tickets
|
* Fix build with enable-fastmath and disable-rsa
|
||||||
* SP int mp_init_size fixes when SP_WORD_SIZE == 8
|
* Correct wolfSSL_sk_X509_new in OpenSSL compatible API
|
||||||
* Ed. function to make public key now checks for if the private key flag is set
|
* Fixes for SP and x86_64 with MSVC
|
||||||
* Fix HashRaw WC_SHA256_DIGEST_SIZE for wc_Sha256GetHash
|
* Fix wrong size using DTLSv1.3 in RestartHandshakeHashWithCookie
|
||||||
* Fix for building with PSK only
|
* Fix redundant file include with TI RTOS build
|
||||||
* Set correct types in wolfSSL_sk_*_new functions
|
* Fix wolfCrypt only build with wincrypt.h
|
||||||
* Sanity check that size passed to mp_init_size() is no more than SP_INT_DIGITS
|
* DTLS 1.2: Reset state when sending HelloVerifyRequest
|
||||||
|
|
||||||
For additional vulnerability information visit the vulnerability page at:
|
For additional vulnerability information visit the vulnerability page at:
|
||||||
https://www.wolfssl.com/docs/security-vulnerabilities/
|
https://www.wolfssl.com/docs/security-vulnerabilities/
|
||||||
|
94
README.md
94
README.md
@@ -78,63 +78,59 @@ macro `NO_OLD_SHA_NAMES`. These names get mapped to the OpenSSL API for a
|
|||||||
single call hash function. Instead the name `WC_SHA`, `WC_SHA256`, `WC_SHA384` and
|
single call hash function. Instead the name `WC_SHA`, `WC_SHA256`, `WC_SHA384` and
|
||||||
`WC_SHA512` should be used for the enum name.
|
`WC_SHA512` should be used for the enum name.
|
||||||
|
|
||||||
# wolfSSL Release 5.5.1 (Sep 28, 2022)
|
# wolfSSL Release 5.5.2 (Oct 28, 2022)
|
||||||
Release 5.5.1 of wolfSSL embedded TLS has bug fixes and new features including:
|
Release 5.5.2 of wolfSSL embedded TLS has bug fixes and new features including:
|
||||||
|
|
||||||
## Vulnerabilities
|
## Vulnerabilities
|
||||||
* [Med] Denial of service attack and buffer overflow against TLS 1.3 servers using session ticket resumption. When built with --enable-session-ticket and making use of TLS 1.3 server code in wolfSSL, there is the possibility of a malicious client to craft a malformed second ClientHello packet that causes the server to crash. This issue is limited to when using both --enable-session-ticket and TLS 1.3 on the server side. Users with TLS 1.3 servers, and having --enable-session-ticket, should update to the latest version of wolfSSL. Thanks to Max at Trail of Bits for the report, found by Lucca Hirschi from LORIA, Inria, France with the tlspuffin tool developed partly at LORIA and Trail of Bits. CVE-2022-39173
|
* [Med] In the case that the WOLFSSL_CALLBACKS macro is set when building wolfSSL, there is a potential heap over read of 5 bytes when handling TLS 1.3 client connections. This heap over read is limited to wolfSSL builds explicitly setting the macro WOLFSSL_CALLBACKS, the feature does not get turned on by any other build options. The macro WOLFSSL_CALLBACKS is intended for debug use only, but if having it enabled in production, users are recommended to disable WOLFSSL_CALLBACKS. Users enabling WOLFSSL_CALLBACKS are recommended to update their version of wolfSSL. Thanks to Lucca Hirschi and Steve Kremer from LORIA, Inria and Max Ammann from Trail of Bits for finding and reporting the bug with the tlspuffin tool developed partly at LORIA and Trail of Bits. CVE 2022-42905
|
||||||
|
|
||||||
|
Release 5.5.2 of wolfSSL embedded TLS has bug fixes and new features including:
|
||||||
|
|
||||||
## New Feature Additions
|
## New Feature Additions
|
||||||
* Add support for non-blocking ECC key gen and shared secret gen for P-256/384/521
|
* Add function wolfSSL_CTX_load_system_CA_certs to load system CA certs into a WOLFSSL_CTX and --sys-ca-certs option to example client
|
||||||
* Add support for non-blocking ECDHE/ECDSA in TLS/DTLS layer.
|
* Add wolfSSL_set1_host to OpenSSL compatible API
|
||||||
* Port to NXP RT685 with FreeRTOS
|
* Added the function sk_X509_shift
|
||||||
* Add option to build post quantum Kyber API (--enable-kyber)
|
* AES x86 ASM for AES-CBC and GCM performance enhancements
|
||||||
* Add post quantum algorithm sphincs to wolfCrypt
|
* Add assembly for AES for ARM32 without using crypto hardware instructions
|
||||||
* Config. option to force no asm with SP build (--enable-sp=noasm)
|
* Xilinx Versal port and hardware acceleration tie in
|
||||||
* Allow post quantum keyshare for DTLS 1.3
|
* SP Cortex-M support for ICCARM
|
||||||
|
|
||||||
## Enhancements
|
## Enhancements
|
||||||
* DTLSv1.3: Do HRR Cookie exchange by default
|
* Add snifftest vcxproj file and documentation
|
||||||
* Add wolfSSL_EVP_PKEY_new_CMAC_key to OpenSSL compatible API
|
* Nucleus Thread Types supported
|
||||||
* Update ide win10 build files to add missing sp source files
|
* Handle certificates with RSA-PSS signature that have RSAk public keys
|
||||||
* Improve Workbench docs
|
* Small stack build improvements
|
||||||
* Improve EVP support for CHACHA20_POLY1305
|
* DTLS 1.3 improvements for Alerts and unit tests
|
||||||
* Improve `wc_SetCustomExtension` documentation
|
* Add a binary search for CRL
|
||||||
* RSA-PSS with OCSP and add simple OCSP response DER verify test case
|
* Improvement of SSL/CTX_set_max_early_data() for client side
|
||||||
* Clean up some FIPS versioning logic in configure.ac and WIN10 user_settings.h
|
* Remove unused ASN1_GENERALIZEDTIME enum value from wolfssl/ssl.h
|
||||||
* Don't over-allocate memory for DTLS fragments
|
* Add user_settings.h for Intel/M1 FIPSv2 macOS C++ projects
|
||||||
* Add WOLFSSL_ATECC_TFLXTLS for Atmel port
|
* Add dtlscid.test to ‘make check’ unit testing
|
||||||
* SHA-3 performance improvements with x86_64 assembly
|
* Generate an assembler-safe user_settings.h in configure.ac and CMakeLists.txt
|
||||||
* Add code to fallback to S/W if TSIP cannot handle
|
* ForceZero enabled with USE_FAST_MATH
|
||||||
* Improves entropy with VxWorks
|
* Add TLS 1.3 support of ticketNonce sizes bigger than MAX_TICKET_NONCE_SZ
|
||||||
* Make time in milliseconds 64-bits for longer session ticket lives
|
* FIPSv2 builds on win10 adjust for new fastmath default in settings.h
|
||||||
* Support for setting cipher list with bytes
|
* Add IRQ install for Aruix example
|
||||||
* wolfSSL_set1_curves_list(), wolfSSL_CTX_set1_curves_list() improvements
|
|
||||||
* Add to RSAES-OAEP key parsing for pkcs7
|
|
||||||
* Add missing DN nid to work with PrintName()
|
|
||||||
* SP int: default to 16 bit word size when NO_64BIT defined
|
|
||||||
* Limit the amount of fragments we store per a DTLS connection and error out when max limit is reached
|
|
||||||
* Detect when certificate's RSA public key size is too big and fail on loading of certificate
|
|
||||||
|
|
||||||
## Fixes
|
## Fixes
|
||||||
* Fix for async with OCSP non-blocking in `ProcessPeerCerts`
|
* When looking up the session by ID on the server, check that the protocol version of the SSL and session match on TLS 1.3 or not
|
||||||
* Fixes for building with 32-bit and socket size sign/unsigned mismatch
|
* Fix for potential EVP_PKEY_DH memory leak with OPENSSL_EXTRA
|
||||||
* Fix Windows CMakeList compiler options
|
* Curve448 32-bit C code: handle corner case
|
||||||
* TLS 1.3 Middle-Box compat: fix missing brace
|
* Fixup builds using WOLFSSL_LOG_PRINTF
|
||||||
* Configuration consistency fixes for RSA keys and way to force disable of private keys
|
* Correct DIST_POINT_NAME type value
|
||||||
* Fix for Aarch64 Mac M1 SP use
|
* Do not perform IV Wrap test when using cert3389 inlined armasm
|
||||||
* Fix build errors and warnings for MSVC with DTLS 1.3
|
* Fix for Linux kernel module and stdio.h
|
||||||
* Fix HMAC compat layer function for SHA-1
|
* (D)TLS: send alert on version mismatch
|
||||||
* Fix DTLS 1.3 do not negotiate ConnectionID in HelloRetryRequest
|
* Fix PKCS#7 SignedData verification when signer cert is not first in SET
|
||||||
* Check return from call to wc_Time
|
* Fix bug with wolfIO_TcpConnect not working with timeout on Windows
|
||||||
* SP math: fix build configuration with opensslall
|
* Fix output length bug in SP non-blocking ECC shared secret gen
|
||||||
* Fix for async session tickets
|
* Fix build with enable-fastmath and disable-rsa
|
||||||
* SP int mp_init_size fixes when SP_WORD_SIZE == 8
|
* Correct wolfSSL_sk_X509_new in OpenSSL compatible API
|
||||||
* Ed. function to make public key now checks for if the private key flag is set
|
* Fixes for SP and x86_64 with MSVC
|
||||||
* Fix HashRaw WC_SHA256_DIGEST_SIZE for wc_Sha256GetHash
|
* Fix wrong size using DTLSv1.3 in RestartHandshakeHashWithCookie
|
||||||
* Fix for building with PSK only
|
* Fix redundant file include with TI RTOS build
|
||||||
* Set correct types in wolfSSL_sk_*_new functions
|
* Fix wolfCrypt only build with wincrypt.h
|
||||||
* Sanity check that size passed to mp_init_size() is no more than SP_INT_DIGITS
|
* DTLS 1.2: Reset state when sending HelloVerifyRequest
|
||||||
|
|
||||||
For additional vulnerability information visit the vulnerability page at:
|
For additional vulnerability information visit the vulnerability page at:
|
||||||
https://www.wolfssl.com/docs/security-vulnerabilities/
|
https://www.wolfssl.com/docs/security-vulnerabilities/
|
||||||
|
@@ -7,7 +7,7 @@
|
|||||||
#
|
#
|
||||||
AC_COPYRIGHT([Copyright (C) 2006-2020 wolfSSL Inc.])
|
AC_COPYRIGHT([Copyright (C) 2006-2020 wolfSSL Inc.])
|
||||||
AC_PREREQ([2.69])
|
AC_PREREQ([2.69])
|
||||||
AC_INIT([wolfssl],[5.5.1],[https://github.com/wolfssl/wolfssl/issues],[wolfssl],[https://www.wolfssl.com])
|
AC_INIT([wolfssl],[5.5.2],[https://github.com/wolfssl/wolfssl/issues],[wolfssl],[https://www.wolfssl.com])
|
||||||
AC_CONFIG_AUX_DIR([build-aux])
|
AC_CONFIG_AUX_DIR([build-aux])
|
||||||
|
|
||||||
# The following sets CFLAGS to empty if unset on command line. We do not
|
# The following sets CFLAGS to empty if unset on command line. We do not
|
||||||
@@ -44,9 +44,9 @@ AC_SUBST([WOLFSSL_CONFIG_ARGS])
|
|||||||
# The three numbers in the libwolfssl.so.*.*.* file name. Unfortunately
|
# The three numbers in the libwolfssl.so.*.*.* file name. Unfortunately
|
||||||
# these numbers don't always line up nicely with the library version.
|
# these numbers don't always line up nicely with the library version.
|
||||||
WOLFSSL_LIBRARY_VERSION_FIRST=35
|
WOLFSSL_LIBRARY_VERSION_FIRST=35
|
||||||
WOLFSSL_LIBRARY_VERSION_SECOND=1
|
WOLFSSL_LIBRARY_VERSION_SECOND=2
|
||||||
WOLFSSL_LIBRARY_VERSION_THIRD=0
|
WOLFSSL_LIBRARY_VERSION_THIRD=0
|
||||||
WOLFSSL_LIBRARY_VERSION=36:0:1
|
WOLFSSL_LIBRARY_VERSION=37:0:2
|
||||||
# | | |
|
# | | |
|
||||||
# +------+ | +---+
|
# +------+ | +---+
|
||||||
# | | |
|
# | | |
|
||||||
|
BIN
wolfssl.rc
BIN
wolfssl.rc
Binary file not shown.
@@ -28,8 +28,8 @@
|
|||||||
extern "C" {
|
extern "C" {
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#define LIBWOLFSSL_VERSION_STRING "5.5.1"
|
#define LIBWOLFSSL_VERSION_STRING "5.5.2"
|
||||||
#define LIBWOLFSSL_VERSION_HEX 0x05005001
|
#define LIBWOLFSSL_VERSION_HEX 0x05005002
|
||||||
|
|
||||||
#ifdef __cplusplus
|
#ifdef __cplusplus
|
||||||
}
|
}
|
||||||
|
Reference in New Issue
Block a user