mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2026-05-11 06:28:17 +02:00
Applying current changes
Signed-off-by: TRodziewicz <tomasz.rodziewicz@mobica.com>
This commit is contained in:
5
ChangeLog.d/bugfix_PR3616.txt
Normal file
5
ChangeLog.d/bugfix_PR3616.txt
Normal file
@@ -0,0 +1,5 @@
|
||||
Bugfix
|
||||
* Fix premature fopen() call in mbedtls_entropy_write_seed_file which may
|
||||
lead to the seed file corruption in case if the path to the seed file is
|
||||
equal to MBEDTLS_PLATFORM_STD_NV_SEED_FILE. Contributed by Victor
|
||||
Krasnoshchok in #3616.
|
||||
2
ChangeLog.d/dtls_sample_use_read_timeout.txt
Normal file
2
ChangeLog.d/dtls_sample_use_read_timeout.txt
Normal file
@@ -0,0 +1,2 @@
|
||||
Changes
|
||||
* Fix the setting of the read timeout in the DTLS sample programs.
|
||||
5
ChangeLog.d/fix-invalid-id-error-code.txt
Normal file
5
ChangeLog.d/fix-invalid-id-error-code.txt
Normal file
@@ -0,0 +1,5 @@
|
||||
Bugfix
|
||||
* PSA functions creating a key now return PSA_ERROR_INVALID_ARGUMENT rather
|
||||
than PSA_ERROR_INVALID_HANDLE when the identifier specified for the key
|
||||
to create is not valid, bringing them in line with version 1.0.0 of the
|
||||
specification. Fix #4271.
|
||||
10
ChangeLog.d/fix-printf-specifiers.txt
Normal file
10
ChangeLog.d/fix-printf-specifiers.txt
Normal file
@@ -0,0 +1,10 @@
|
||||
Bugfix
|
||||
* Add printf function attributes to mbedtls_debug_print_msg to ensure we
|
||||
get printf format specifier warnings.
|
||||
Changes
|
||||
* Add extra printf compiler warning flags to builds.
|
||||
Requirement changes
|
||||
* The library now uses the %zu format specifier with the printf() family of
|
||||
functions, so requires a toolchain that supports it. This change does not
|
||||
affect the maintained LTS branches, so when contributing changes please
|
||||
bear this in mind and do not add them to backported code.
|
||||
2
ChangeLog.d/fix_memsan_build_clang11.txt
Normal file
2
ChangeLog.d/fix_memsan_build_clang11.txt
Normal file
@@ -0,0 +1,2 @@
|
||||
Changes
|
||||
* Fix memsan build false positive in x509_crt.c with clang 11
|
||||
4
ChangeLog.d/fix_return_type_for_invalid_crypto_key.txt
Normal file
4
ChangeLog.d/fix_return_type_for_invalid_crypto_key.txt
Normal file
@@ -0,0 +1,4 @@
|
||||
Bugfix
|
||||
* PSA functions other than psa_open_key now return PSA_ERROR_INVALID_HANDLE
|
||||
rather than PSA_ERROR_DOES_NOT_EXIST for an invalid handle, bringing them
|
||||
in line with version 1.0.0 of the specification. Fix #4162.
|
||||
3
ChangeLog.d/issue1792.txt
Normal file
3
ChangeLog.d/issue1792.txt
Normal file
@@ -0,0 +1,3 @@
|
||||
Bugfix
|
||||
* Fix a bug in ECDSA that would cause it to fail when the hash is all-bits
|
||||
zero. Fixes #1792
|
||||
@@ -1,10 +0,0 @@
|
||||
Security
|
||||
* Fix a security reduction in CTR_DRBG when the initial seeding obtained a
|
||||
nonce from entropy. Applications were affected if they called
|
||||
mbedtls_ctr_drbg_set_nonce_len(), if they called
|
||||
mbedtls_ctr_drbg_set_entropy_len() with a size that was 3/2 times the key
|
||||
length, or when the entropy module uses SHA-256 and CTR_DRBG uses AES-256.
|
||||
In such cases, a random nonce was necessary to achieve the advertised
|
||||
security strength, but the code incorrectly used a constant instead of
|
||||
entropy from the nonce.
|
||||
Found by John Stroebel in #3819 and fixed in #3973.
|
||||
2
ChangeLog.d/issue4280.txt
Normal file
2
ChangeLog.d/issue4280.txt
Normal file
@@ -0,0 +1,2 @@
|
||||
Removals
|
||||
* Removed deprecated functions from hashing modules. Fixes #4280.
|
||||
2
ChangeLog.d/issue4283.txt
Normal file
2
ChangeLog.d/issue4283.txt
Normal file
@@ -0,0 +1,2 @@
|
||||
Removals
|
||||
* Remove deprecated error codes. Fix #4283
|
||||
2
ChangeLog.d/issue4284.txt
Normal file
2
ChangeLog.d/issue4284.txt
Normal file
@@ -0,0 +1,2 @@
|
||||
Removals
|
||||
* Removed deprecated things in psa/crypto_compat.h. Fixes #4284
|
||||
7
ChangeLog.d/move_alt_helpers.txt
Normal file
7
ChangeLog.d/move_alt_helpers.txt
Normal file
@@ -0,0 +1,7 @@
|
||||
API changes
|
||||
* Move alt helpers and definitions.
|
||||
Various helpers and definitions available for use in alt implementations
|
||||
have been moved out of the include/ directory and into the library/
|
||||
directory. The files concerned are ecp_internal.h and rsa_internal.h
|
||||
which have also been renamed to ecp_alt.h and rsa_alt_helpers.h
|
||||
respectively.
|
||||
6
ChangeLog.d/move_internal_headers.txt
Normal file
6
ChangeLog.d/move_internal_headers.txt
Normal file
@@ -0,0 +1,6 @@
|
||||
API changes
|
||||
* Move internal headers.
|
||||
Header files that were only meant for the library's internal use and
|
||||
were not meant to be used in application code have been moved out of
|
||||
the include/ directory. The headers concerned are bn_mul.h, aesni.h,
|
||||
padlock.h, entropy_poll.h and *_internal.h.
|
||||
3
ChangeLog.d/mpi_read_negative_zero.txt
Normal file
3
ChangeLog.d/mpi_read_negative_zero.txt
Normal file
@@ -0,0 +1,3 @@
|
||||
Bugfix
|
||||
* mbedtls_mpi_read_string on "-0" produced an MPI object that was not treated
|
||||
as equal to 0 in all cases. Fix it to produce the same object as "0".
|
||||
5
ChangeLog.d/pkcs1_v21_sign_ext.txt
Normal file
5
ChangeLog.d/pkcs1_v21_sign_ext.txt
Normal file
@@ -0,0 +1,5 @@
|
||||
Features
|
||||
* Add mbedtls_rsa_rsassa_pss_sign_ext() function allowing to generate a
|
||||
signature with a specific salt length. This function allows to validate
|
||||
test cases provided in the NIST's CAVP test suite. Contributed by Cédric
|
||||
Meuter in PR #3183.
|
||||
@@ -1,2 +0,0 @@
|
||||
Bugfix
|
||||
* Fix use-after-scope error in programs/ssl/ssl_client2.c and ssl_server2.c
|
||||
@@ -1,5 +0,0 @@
|
||||
Features
|
||||
* The PSA crypto subsystem can now use HMAC_DRBG instead of CTR_DRBG.
|
||||
CTR_DRBG is used by default if it is available, but you can override
|
||||
this choice by setting MBEDTLS_PSA_HMAC_DRBG_MD_TYPE at compile time.
|
||||
Fix #3354.
|
||||
@@ -1,3 +0,0 @@
|
||||
Bugfix
|
||||
* Fix memory leak that occured when calling psa_close_key() on a
|
||||
wrapped key with MBEDTLS_PSA_CRYPTO_SE_C defined.
|
||||
14
ChangeLog.d/remove_allow_sha1_in_certificates
Normal file
14
ChangeLog.d/remove_allow_sha1_in_certificates
Normal file
@@ -0,0 +1,14 @@
|
||||
Removals
|
||||
* Remove the MBEDTLS_TLS_DEFAULT_ALLOW_SHA1_IN_CERTIFICATES
|
||||
compile-time option, which was off by default. Users should not trust
|
||||
certificates signed with SHA-1 due to the known attacks against SHA-1.
|
||||
If needed, SHA-1 cerificate can still be used by providing custom
|
||||
verification profile to mbedtls_x509_crt_verify_with_profile function
|
||||
in x509_crt.h, or mbedtls_ssl_conf_cert_profile function in ssl.h.
|
||||
Example of custom verification profile, supporting SHA-1:
|
||||
const mbedtls_x509_crt_profile mbedtls_x509_crt_custom = {
|
||||
MBEDTLS_X509_ID_FLAG( MBEDTLS_MD_SHA1 ),
|
||||
0xFFFFFFF, /* Any PK alg */
|
||||
0xFFFFFFF, /* Any curve */
|
||||
2048
|
||||
};
|
||||
5
ChangeLog.d/remove_certs.txt
Normal file
5
ChangeLog.d/remove_certs.txt
Normal file
@@ -0,0 +1,5 @@
|
||||
API changes
|
||||
* Remove certs module from the API.
|
||||
Transfer keys and certificates embedded in the library to the test
|
||||
component. This contributes to minimizing library API and discourages
|
||||
users from using unsafe keys in production.
|
||||
@@ -1,7 +1,9 @@
|
||||
API changes
|
||||
* Remove HAVEGE module.
|
||||
The design of HAVEGE makes it unsuitable for microcontrollers. Platforms with a more complex
|
||||
CPU usually have an operating system interface that provides better randomness.
|
||||
Instead of HAVEGE, declare OS or hardware RNG interfaces with mbedtls_entropy_add_source()
|
||||
and/or use an entropy seed file created securely during device provisioning.
|
||||
See https://tls.mbed.org/kb/how-to/add-entropy-sources-to-entropy-pool for more information.
|
||||
The design of HAVEGE makes it unsuitable for microcontrollers. Platforms
|
||||
with a more complex CPU usually have an operating system interface that
|
||||
provides better randomness. Instead of HAVEGE, declare OS or hardware RNG
|
||||
interfaces with mbedtls_entropy_add_source() and/or use an entropy seed
|
||||
file created securely during device provisioning. See
|
||||
https://tls.mbed.org/kb/how-to/add-entropy-sources-to-entropy-pool for
|
||||
more information.
|
||||
|
||||
10
ChangeLog.d/remove_obsolete_tls_features.txt
Normal file
10
ChangeLog.d/remove_obsolete_tls_features.txt
Normal file
@@ -0,0 +1,10 @@
|
||||
API changes
|
||||
* Drop support for parsing SSLv2 ClientHello
|
||||
(MBEDTLS_SSL_SRV_SUPPORT_SSLV2_CLIENT_HELLO).
|
||||
* Drop support for SSLv3 (MBEDTLS_SSL_PROTO_SSL3).
|
||||
* Drop support for compatibility with our own previous buggy
|
||||
implementation of truncated HMAC (MBEDTLS_SSL_TRUNCATED_HMAC_COMPAT).
|
||||
* Drop support for TLS record-level compression (MBEDTLS_ZLIB_SUPPORT).
|
||||
* Drop support for RC4 TLS ciphersuites.
|
||||
* Drop support for single-DES ciphersuites.
|
||||
* Drop support for MBEDTLS_SSL_HW_RECORD_ACCEL.
|
||||
3
ChangeLog.d/remove_old_transition_helpers.txt
Normal file
3
ChangeLog.d/remove_old_transition_helpers.txt
Normal file
@@ -0,0 +1,3 @@
|
||||
API changes
|
||||
* Remove helpers for the transition from Mbed TLS 1.3 to Mbed TLS 2.0: the
|
||||
header compat-1.3.h and the script rename.pl.
|
||||
6
ChangeLog.d/remove_pkcs11.txt
Normal file
6
ChangeLog.d/remove_pkcs11.txt
Normal file
@@ -0,0 +1,6 @@
|
||||
Removals
|
||||
* Remove PKCS#11 library wrapper. PKCS#11 has limited functionality,
|
||||
lacks automated tests and has scarce documentation. Also, PSA Crypto
|
||||
provides a more flexible private key management.
|
||||
More details on PCKS#11 wrapper removal can be found in the mailing list
|
||||
https://lists.trustedfirmware.org/pipermail/mbed-tls/2020-April/000024.html
|
||||
@@ -1,2 +0,0 @@
|
||||
Bugfix
|
||||
* Fix an incorrect error code if an RSA private operation glitched.
|
||||
Reference in New Issue
Block a user