mirror of
https://github.com/wolfSSL/wolfssl.git
synced 2025-07-31 19:24:42 +02:00
Merge pull request #1288 from cconlon/release3.13
wolfSSL 3.13.0 README and version updates
This commit is contained in:
58
README
58
README
@@ -35,6 +35,64 @@ before calling wolfSSL_new(); Though it's not recommended.
|
|||||||
*** end Notes ***
|
*** end Notes ***
|
||||||
|
|
||||||
|
|
||||||
|
********* wolfSSL (Formerly CyaSSL) Release 3.13.0 (12/21/2017)
|
||||||
|
|
||||||
|
wolfSSL 3.13.0 includes bug fixes and new features, including support for
|
||||||
|
TLS 1.3 Draft 21, performance and footprint optimizations, build fixes,
|
||||||
|
updated examples and project files, and one vulnerability fix. The full list
|
||||||
|
of changes and additions in this release include:
|
||||||
|
|
||||||
|
- Fixes for TLS 1.3, support for Draft 21
|
||||||
|
- TLS 1.0 disabled by default, addition of “--enable-tls10” configure option
|
||||||
|
- New option to reduce SHA-256 code size at expense of performance
|
||||||
|
(USE_SLOW_SHA256)
|
||||||
|
- New option for memory reduced build (--enable-lowresource)
|
||||||
|
- AES-GCM performance improvements on AVX1 (IvyBridge) and AVX2
|
||||||
|
- SHA-256 and SHA-512 performance improvements using AVX1/2 ASM
|
||||||
|
- SHA-3 size and performance optimizations
|
||||||
|
- Fixes for Intel AVX2 builds on Mac/OSX
|
||||||
|
- Intel assembly for Curve25519, and Ed25519 performance optimizations
|
||||||
|
- New option to force 32-bit mode with “--enable-32bit”
|
||||||
|
- New option to disable all inline assembly with “--disable-asm”
|
||||||
|
- Ability to override maximum signature algorithms using WOLFSSL_MAX_SIGALGO
|
||||||
|
- Fixes for handling of unsupported TLS extensions.
|
||||||
|
- Fixes for compiling AES-GCM code with GCC 4.8.*
|
||||||
|
- Allow adjusting static I/O buffer size with WOLFMEM_IO_SZ
|
||||||
|
- Fixes for building without a filesystem
|
||||||
|
- Removes 3DES and SHA1 dependencies from PKCS#7
|
||||||
|
- Adds ability to disable PKCS#7 EncryptedData type (NO_PKCS7_ENCRYPTED_DATA)
|
||||||
|
- Add ability to get client-side SNI
|
||||||
|
- Expanded OpenSSL compatibility layer
|
||||||
|
- Fix for logging file names with OpenSSL compatibility layer enabled, with
|
||||||
|
WOLFSSL_MAX_ERROR_SZ user-overridable
|
||||||
|
- Adds static memory support to the wolfSSL example client
|
||||||
|
- Fixes for sniffer to use TLS 1.2 client method
|
||||||
|
- Adds option to wolfCrypt benchmark to benchmark individual algorithms
|
||||||
|
- Adds option to wolfCrypt benchmark to display benchmarks in powers
|
||||||
|
of 10 (-base10)
|
||||||
|
- Updated Visual Studio for ARM builds (for ECC supported curves and SHA-384)
|
||||||
|
- Updated Texas Instruments TI-RTOS build
|
||||||
|
- Updated STM32 CubeMX build with fixes for SHA
|
||||||
|
- Updated IAR EWARM project files
|
||||||
|
- Updated Apple Xcode projects with the addition of a benchmark example project
|
||||||
|
|
||||||
|
This release of wolfSSL fixes 1 security vulnerability.
|
||||||
|
|
||||||
|
wolfSSL is cited in the recent ROBOT Attack by Böck, Somorovsky, and Young.
|
||||||
|
The paper notes that wolfSSL only gives a weak oracle without a practical
|
||||||
|
attack but this is still a flaw. This release contains a fix for this report.
|
||||||
|
Please note that wolfSSL has static RSA cipher suites disabled by default as
|
||||||
|
of version 3.6.6 because of the lack of perfect forward secrecy. Only users
|
||||||
|
who have explicitly enabled static RSA cipher suites with WOLFSSL_STATIC_RSA
|
||||||
|
and use those suites on a host are affected. More information will be
|
||||||
|
available on our website at:
|
||||||
|
|
||||||
|
https://wolfssl.com/wolfSSL/security/vulnerabilities.php
|
||||||
|
|
||||||
|
See INSTALL file for build instructions.
|
||||||
|
More info can be found on-line at http://wolfssl.com/wolfSSL/Docs.html
|
||||||
|
|
||||||
|
|
||||||
********* wolfSSL (Formerly CyaSSL) Release 3.12.2 (10/23/2017)
|
********* wolfSSL (Formerly CyaSSL) Release 3.12.2 (10/23/2017)
|
||||||
|
|
||||||
Release 3.12.2 of wolfSSL has bug fixes and new features including:
|
Release 3.12.2 of wolfSSL has bug fixes and new features including:
|
||||||
|
58
README.md
58
README.md
@@ -38,6 +38,64 @@ wolfSSL_CTX_set_verify(ctx, SSL_VERIFY_NONE, 0);
|
|||||||
before calling wolfSSL_new(); Though it's not recommended.
|
before calling wolfSSL_new(); Though it's not recommended.
|
||||||
```
|
```
|
||||||
|
|
||||||
|
# wolfSSL (Formerly CyaSSL) Release 3.13.0 (12/21/2017)
|
||||||
|
|
||||||
|
wolfSSL 3.13.0 includes bug fixes and new features, including support for
|
||||||
|
TLS 1.3 Draft 21, performance and footprint optimizations, build fixes,
|
||||||
|
updated examples and project files, and one vulnerability fix. The full list
|
||||||
|
of changes and additions in this release include:
|
||||||
|
|
||||||
|
* Fixes for TLS 1.3, support for Draft 21
|
||||||
|
* TLS 1.0 disabled by default, addition of “--enable-tls10” configure option
|
||||||
|
* New option to reduce SHA-256 code size at expense of performance
|
||||||
|
(USE_SLOW_SHA256)
|
||||||
|
* New option for memory reduced build (--enable-lowresource)
|
||||||
|
* AES-GCM performance improvements on AVX1 (IvyBridge) and AVX2
|
||||||
|
* SHA-256 and SHA-512 performance improvements using AVX1/2 ASM
|
||||||
|
* SHA-3 size and performance optimizations
|
||||||
|
* Fixes for Intel AVX2 builds on Mac/OSX
|
||||||
|
* Intel assembly for Curve25519, and Ed25519 performance optimizations
|
||||||
|
* New option to force 32-bit mode with “--enable-32bit”
|
||||||
|
* New option to disable all inline assembly with “--disable-asm”
|
||||||
|
* Ability to override maximum signature algorithms using WOLFSSL_MAX_SIGALGO
|
||||||
|
* Fixes for handling of unsupported TLS extensions.
|
||||||
|
* Fixes for compiling AES-GCM code with GCC 4.8.*
|
||||||
|
* Allow adjusting static I/O buffer size with WOLFMEM_IO_SZ
|
||||||
|
* Fixes for building without a filesystem
|
||||||
|
* Removes 3DES and SHA1 dependencies from PKCS#7
|
||||||
|
* Adds ability to disable PKCS#7 EncryptedData type (NO_PKCS7_ENCRYPTED_DATA)
|
||||||
|
* Add ability to get client-side SNI
|
||||||
|
* Expanded OpenSSL compatibility layer
|
||||||
|
* Fix for logging file names with OpenSSL compatibility layer enabled, with
|
||||||
|
WOLFSSL_MAX_ERROR_SZ user-overridable
|
||||||
|
* Adds static memory support to the wolfSSL example client
|
||||||
|
* Fixes for sniffer to use TLS 1.2 client method
|
||||||
|
* Adds option to wolfCrypt benchmark to benchmark individual algorithms
|
||||||
|
* Adds option to wolfCrypt benchmark to display benchmarks in powers
|
||||||
|
of 10 (-base10)
|
||||||
|
* Updated Visual Studio for ARM builds (for ECC supported curves and SHA-384)
|
||||||
|
* Updated Texas Instruments TI-RTOS build
|
||||||
|
* Updated STM32 CubeMX build with fixes for SHA
|
||||||
|
* Updated IAR EWARM project files
|
||||||
|
* Updated Apple Xcode projects with the addition of a benchmark example project
|
||||||
|
|
||||||
|
This release of wolfSSL fixes 1 security vulnerability.
|
||||||
|
|
||||||
|
wolfSSL is cited in the recent ROBOT Attack by Böck, Somorovsky, and Young.
|
||||||
|
The paper notes that wolfSSL only gives a weak oracle without a practical
|
||||||
|
attack but this is still a flaw. This release contains a fix for this report.
|
||||||
|
Please note that wolfSSL has static RSA cipher suites disabled by default as
|
||||||
|
of version 3.6.6 because of the lack of perfect forward secrecy. Only users
|
||||||
|
who have explicitly enabled static RSA cipher suites with WOLFSSL_STATIC_RSA
|
||||||
|
and use those suites on a host are affected. More information will be
|
||||||
|
available on our website at:
|
||||||
|
|
||||||
|
https://wolfssl.com/wolfSSL/security/vulnerabilities.php
|
||||||
|
|
||||||
|
See INSTALL file for build instructions.
|
||||||
|
More info can be found on-line at http://wolfssl.com/wolfSSL/Docs.html
|
||||||
|
|
||||||
|
|
||||||
# wolfSSL (Formerly CyaSSL) Release 3.12.2 (10/23/2017)
|
# wolfSSL (Formerly CyaSSL) Release 3.12.2 (10/23/2017)
|
||||||
|
|
||||||
## Release 3.12.2 of wolfSSL has bug fixes and new features including:
|
## Release 3.12.2 of wolfSSL has bug fixes and new features including:
|
||||||
|
@@ -6,7 +6,7 @@
|
|||||||
#
|
#
|
||||||
#
|
#
|
||||||
|
|
||||||
AC_INIT([wolfssl],[3.12.2],[https://github.com/wolfssl/wolfssl/issues],[wolfssl],[http://www.wolfssl.com])
|
AC_INIT([wolfssl],[3.13.0],[https://github.com/wolfssl/wolfssl/issues],[wolfssl],[http://www.wolfssl.com])
|
||||||
|
|
||||||
AC_CONFIG_AUX_DIR([build-aux])
|
AC_CONFIG_AUX_DIR([build-aux])
|
||||||
|
|
||||||
@@ -35,7 +35,7 @@ AC_CONFIG_MACRO_DIR([m4])
|
|||||||
AC_CONFIG_HEADERS([config.h:config.in])dnl Keep filename to 8.3 for MS-DOS.
|
AC_CONFIG_HEADERS([config.h:config.in])dnl Keep filename to 8.3 for MS-DOS.
|
||||||
|
|
||||||
#shared library versioning
|
#shared library versioning
|
||||||
WOLFSSL_LIBRARY_VERSION=14:0:0
|
WOLFSSL_LIBRARY_VERSION=15:0:0
|
||||||
# | | |
|
# | | |
|
||||||
# +------+ | +---+
|
# +------+ | +---+
|
||||||
# | | |
|
# | | |
|
||||||
|
@@ -72,8 +72,8 @@ mkdir -p $RPM_BUILD_ROOT/
|
|||||||
%{_docdir}/wolfssl/README.txt
|
%{_docdir}/wolfssl/README.txt
|
||||||
%{_libdir}/libwolfssl.la
|
%{_libdir}/libwolfssl.la
|
||||||
%{_libdir}/libwolfssl.so
|
%{_libdir}/libwolfssl.so
|
||||||
%{_libdir}/libwolfssl.so.14
|
%{_libdir}/libwolfssl.so.15
|
||||||
%{_libdir}/libwolfssl.so.14.0.0
|
%{_libdir}/libwolfssl.so.15.0.0
|
||||||
|
|
||||||
%files devel
|
%files devel
|
||||||
%defattr(-,root,root,-)
|
%defattr(-,root,root,-)
|
||||||
|
@@ -28,8 +28,8 @@
|
|||||||
extern "C" {
|
extern "C" {
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
#define LIBWOLFSSL_VERSION_STRING "3.12.2"
|
#define LIBWOLFSSL_VERSION_STRING "3.13.0"
|
||||||
#define LIBWOLFSSL_VERSION_HEX 0x03012002
|
#define LIBWOLFSSL_VERSION_HEX 0x03013000
|
||||||
|
|
||||||
#ifdef __cplusplus
|
#ifdef __cplusplus
|
||||||
}
|
}
|
||||||
|
Reference in New Issue
Block a user