Simon Butcher
780cf189b0
Merge remote-tracking branch 'public/pr/2271' into development
2018-12-20 12:15:08 +00:00
Simon Butcher
032c037052
Merge remote-tracking branch 'public/pr/2270' into development
2018-12-20 12:04:13 +00:00
Simon Butcher
a033633bb0
Merge remote-tracking branch 'public/pr/2269' into development
2018-12-20 12:02:56 +00:00
Simon Butcher
0bbf7f450d
Merge remote-tracking branch 'public/pr/2279' into development
2018-12-20 12:01:49 +00:00
k-stachowiak
270a125946
Add a change log entry
2018-12-19 19:02:39 +01:00
k-stachowiak
d409285cfa
Add a change log entry
2018-12-19 17:34:58 +01:00
k-stachowiak
9af22e4790
Update change log
2018-12-19 17:32:19 +01:00
Simon Butcher
54b789aa74
Merge remote-tracking branch 'public/pr/2298' into development
2018-12-19 08:08:14 +00:00
Andres Amaya Garcia
ba519b94a5
Add parameter validation to SHA-512 module
2018-12-18 15:06:39 +00:00
Andres Amaya Garcia
79e593f617
Add parameter validation to SHA-256 module
2018-12-18 11:41:20 +00:00
Andres Amaya Garcia
f7c43b3145
Add parameter validation to SHA-1
2018-12-18 11:37:28 +00:00
Hanno Becker
6640b0d9a3
Undo deprecation of MBEDTLS_ERR_BLOWFISH_INVALID_INPUT_LENGTH
2018-12-18 09:53:14 +00:00
Hanno Becker
a034369eca
Undo deprecation of MBEDTLS_ERR_ARIA_INVALID_INPUT_LENGTH
2018-12-18 09:53:11 +00:00
Hanno Becker
938f9e9bdb
Undo deprecation of MBEDTLS_ERR_CAMELLIA_INVALID_INPUT_LENGTH
...
Merging MBEDTLS_ERR_CAMELLIA_INVALID_INPUT_LENGTH and
MBEDTLS_ERR_CAMELLIA_INVALID_KEY_LENGTH is an API break.
2018-12-18 09:50:57 +00:00
Hanno Becker
d2f3a00062
Introduce single BLOWFISH error code for bad input data
...
Deprecate the old specific error codes
* MBEDTLS_ERR_BLOWFISH_INVALID_KEY_LENGTH
* MBEDTLS_ERR_BLOWFISH_INVALID_INPUT_LENGTH
2018-12-17 13:26:37 +00:00
Hanno Becker
4c029d09be
Introduce single CAMELLIA error code for bad input data
...
Deprecate the old specific error codes
* MBEDTLS_ERR_CAMELLIA_INVALID_KEY_LENGTH
* MBEDTLS_ERR_CAMELLIA_INVALID_INPUT_LENGTH
2018-12-17 13:26:33 +00:00
Hanno Becker
2f47550018
Introduce single ARIA error code for bad input data
...
Deprecate the old specific error codes
* MBEDTLS_ERR_ARIA_INVALID_KEY_LENGTH
* MBEDTLS_ERR_ARIA_INVALID_INPUT_LENGTH
2018-12-17 13:26:28 +00:00
Manuel Pégourié-Gonnard
9794098cfa
Clarify ChangeLog entry again.
2018-12-17 13:13:50 +01:00
Ron Eldor
8b0cf2e76f
Include configuration file to headers
...
Add inclusion to configration file in header files,
instead of relying on other header files to include
the configuration file. This issue resolves #1371
2018-12-16 12:02:50 +02:00
Manuel Pégourié-Gonnard
12dce61e09
Fix order of sections in ChangeLog
2018-12-13 09:48:40 +01:00
Manuel Pégourié-Gonnard
e7306d30a9
Improve some documentation and ChangeLog entry
2018-12-13 09:45:49 +01:00
Manuel Pégourié-Gonnard
cd2b29cd12
Improve wording in documentation and ChangeLog
2018-12-12 10:23:57 +01:00
Manuel Pégourié-Gonnard
8a46c22466
Add a ChangeLog entry for MBEDTLS_CHECK_PARAMS
2018-12-11 12:28:56 +01:00
Jaeden Amero
01b34fb316
Merge remote-tracking branch 'upstream-public/pr/2267' into development
2018-12-07 16:17:12 +00:00
Janos Follath
855def157f
Add changelog entry for ECC hardware bugfix
2018-12-07 11:05:03 +00:00
Jaeden Amero
9055a7d855
Merge remote-tracking branch 'upstream-public/pr/2175' into development
2018-12-06 16:09:58 +00:00
Jaeden Amero
bc1cf5cd36
Merge remote-tracking branch 'upstream-public/pr/2131' into development
2018-12-06 16:04:55 +00:00
Jaeden Amero
c27e3420b9
Merge remote-tracking branch 'upstream-public/pr/2117' into development
2018-12-06 15:59:32 +00:00
Jaeden Amero
083681c832
Merge remote-tracking branch 'upstream-public/pr/2039' into development
2018-12-06 15:55:34 +00:00
Jaeden Amero
41722ec29e
Merge remote-tracking branch 'upstream-public/pr/1958' into development
2018-12-06 15:53:56 +00:00
Janos Follath
b8f27060e0
Add Changelog entry for the new ECDH context
2018-12-06 12:22:46 +00:00
Simon Butcher
fabc6001ff
Clarify attribution for the Bleichenbacher's Cat fix
2018-12-01 22:43:08 +00:00
Simon Butcher
51b8a2fa87
Merge remote-tracking branch 'restricted/pr/512' into development
2018-11-29 16:56:02 +00:00
Simon Butcher
b9eb7866eb
Merge remote-tracking branch 'restricted/pr/535' into development
2018-11-29 16:54:51 +00:00
Simon Butcher
658618b6b2
Merge remote-tracking branch 'restricted/pr/516' into development
2018-11-29 16:53:51 +00:00
Gilles Peskine
50da016e5c
Add changelog entry for mbedtls_mpi_write_binary fix
2018-11-29 12:46:05 +01:00
Gilles Peskine
056f19c79f
Tweak RSA vulnerability changelog entry
...
* Correct the list of authors.
* Add the CVE number.
* Improve the impact description.
2018-11-29 12:45:01 +01:00
Ron Eldor
8a6917dc67
Update ChangeLog
...
Update the ChangeLog with the fix.
2018-11-27 10:37:02 +02:00
Gilles Peskine
5da0505842
Add ChangeLog entry for deprecation of mbedtls_xxx_drbg_update
...
Fixes ARMmbed/mbedtls#1798
2018-11-26 19:26:22 +01:00
Gilles Peskine
1b09f4027e
Add ChangeLog entry for wiping sensitive buffers
2018-11-26 16:19:22 +01:00
Ron Eldor
822b834bdf
Update ChangeLog
...
Add an entry in ChangeLog describing the fix.
2018-11-25 10:38:34 +02:00
Simon Butcher
c1b9892177
Update library version number to 2.14.0
2018-11-19 18:31:40 +00:00
Simon Butcher
b35e59d36d
Refine the language in the ChangeLog
...
Fix the language and descriptions in the ChangeLog following review of the
Release Notes for the next release.
2018-11-19 15:49:26 +00:00
Simon Butcher
681edee803
Fix language and formatting in ChangeLog
...
Changed the formatting and language in the ChangeLog to the house-style.
2018-11-15 13:01:23 +00:00
Simon Butcher
06d80cf172
Fix merge of Changelog 128bit CTR_DRBG entry
...
The entry describing support for 128-bit keys in CTR_DRBG was merged into the
wrong version.
2018-11-12 14:30:19 +00:00
Simon Butcher
de13963d66
Merge remote-tracking branch 'restricted/pr/520' into development-restricted-proposed
2018-11-12 14:30:16 +00:00
Simon Butcher
cdd1a6c872
Merge remote-tracking branch 'restricted/pr/510' into development-restricted-proposed
2018-11-12 14:29:14 +00:00
Simon Butcher
2ab14bb2ca
Clarified new platform errors in the ChangeLog
...
Clarified new platform errors and error code deprecations in the ChangeLog.
2018-11-09 20:09:33 +00:00
Simon Butcher
e51d4b336b
Merge remote-tracking branch 'public/pr/2054' into development-proposed
2018-11-09 19:57:53 +00:00
Ron Eldor
6aa9fb4916
Add ChangeLog entry
...
Add the ChangeLog entry describing the change.
2018-11-09 15:01:09 +00:00
Simon Butcher
53b45ec881
Merge remote-tracking branch 'public/pr/2079' into development-restricted-proposed
2018-11-07 12:58:44 +00:00
Simon Butcher
361ce6c302
Merge remote-tracking branch 'public/pr/2127' into development-restricted-proposed
2018-11-07 12:57:01 +00:00
Simon Butcher
241823aab8
Merge remote-tracking branch 'public/pr/1641' into development-restricted-proposed
2018-11-07 12:55:47 +00:00
Simon Butcher
42ab4ae033
Merge remote-tracking branch 'public/pr/2167' into development-restricted-proposed
2018-11-07 12:54:45 +00:00
Hanno Becker
f143a78011
Adapt ChangeLog
2018-11-06 17:59:28 +00:00
Hanno Becker
fe936c35c1
Adapt ChangeLog
2018-11-06 13:35:47 +00:00
Hanno Becker
d3445da3ef
Adapt ChangeLog
2018-11-05 11:54:06 +00:00
Simon Butcher
06f88e9c42
Merge remote-tracking branch 'public/pr/2007' into development-proposed
2018-11-04 19:12:57 +00:00
Simon Butcher
76646a4bac
Merge remote-tracking branch 'public/pr/1777' into development-proposed
2018-11-04 18:51:36 +00:00
Simon Butcher
2705beaeef
Merge remote-tracking branch 'public/pr/2095' into development-proposed
2018-11-04 18:48:04 +00:00
Hanno Becker
b12fd31415
Adapt ChangeLog
2018-11-02 10:49:09 +00:00
Simon Butcher
2b5be1e630
Fix ChangeLog entry for #2069
...
The fix for #2069 had accidentally been added to features, not bugfixes.
2018-10-30 15:55:10 +00:00
Hanno Becker
0bb204cab1
Adapt ChangeLog
2018-10-30 10:08:33 +00:00
Manuel Pégourié-Gonnard
d8e3a1ef66
Clarify documentation of ssl_set_own_cert()
...
fixes #507
2018-10-29 09:52:10 +01:00
Simon Butcher
7904f94550
Merge remote-tracking branch 'public/pr/1099' into development-proposed
2018-10-28 18:10:37 +00:00
Simon Butcher
4a865ef233
Add ChangeLog entry for PR #1618 - ARM DSP instruction support
2018-10-28 18:00:51 +00:00
Simon Butcher
5706452787
Merge remote-tracking branch 'public/pr/2056' into development-proposed
2018-10-28 17:21:29 +00:00
Simon Butcher
b4e5451326
Merge remote-tracking branch 'public/pr/2070' into development-proposed
2018-10-28 16:53:48 +00:00
Simon Butcher
17a0fab345
Merge remote-tracking branch 'public/pr/2111' into development-proposed
2018-10-28 16:22:18 +00:00
Simon Butcher
a07d86e8af
Merge remote-tracking branch 'public/pr/1902' into development
2018-10-27 18:36:55 +01:00
Simon Butcher
ddc9e26b3b
Merge remote-tracking branch 'public/pr/1627' into development
2018-10-27 18:27:41 +01:00
Simon Butcher
e783f4a767
Merge remote-tracking branch 'public/pr/1609' into development
2018-10-27 17:35:25 +01:00
Hanno Becker
a7d2fa7891
Adapt ChangeLog
2018-10-25 16:11:15 +01:00
Hanno Becker
e4f965da14
Adapt ChangeLog
2018-10-25 15:21:28 +01:00
Hanno Becker
5e0924cb52
Adapt ChangeLog
2018-10-18 12:12:14 +01:00
Hanno Becker
f24c3360fc
Adapt ChangeLog
2018-10-17 14:53:05 +01:00
Hanno Becker
7e1f3bedd9
Adapt ChangeLog
2018-10-15 13:20:28 +01:00
Manuel Pégourié-Gonnard
f0bbd7e3fd
Misc documentation fixes/improvements.
2018-10-15 13:22:41 +02:00
Manuel Pégourié-Gonnard
6346a75dfb
Merge branch 'development' into iotssl-1260-non-blocking-ecc-restricted
...
* development:
ssl-opt.sh: change expected output for large srv packet test with SSLv3
Adapt ChangeLog
Fix bug in SSL ticket implementation removing keys of age < 1s
ssl-opt.sh: Add DTLS session resumption tests
Add ChangeLog entry
Fix typo
Fix hmac_drbg failure in benchmark, with threading
Remove trailing whitespace
Remove trailing whitespace
ssl_server2: add buffer overhead for a termination character
Add missing large and small packet tests for ssl_server2
Added buffer_size and response_size options for ssl-server2. Added appropriate tests.
Solving a conflict in tests/ssl-opt.sh: two set of tests were added at the
same place (just after large packets):
- restartable ECC tests (in this branch)
- server-side large packets (in development)
Resolution was to move the ECC tests after the newly added server large packet
ones.
2018-10-15 11:26:17 +02:00
Janos Follath
e0e7ddf99e
Changelog: Add entry for prime validation fix
2018-10-09 16:36:53 +01:00
Janos Follath
3332937538
Changelog: Add entry for prime test improvement
2018-10-09 16:33:27 +01:00
Hanno Becker
abe6003f5a
Adapt ChangeLog
2018-10-09 12:44:47 +01:00
Hanno Becker
dc71ef8fcc
Adapt ChangeLog
2018-10-08 13:51:38 +01:00
Simon Butcher
5199227d87
Add Changelog entry for #767
...
Add Changelog entry for fix for alternative header/footers in CSR's.
2018-10-06 17:19:31 +01:00
Gilles Peskine
c5ccd7a1e7
Indicate the memory access variations in the changelog entry
2018-10-05 15:42:52 +02:00
Hanno Becker
617a321ed9
Adapt ChangeLog
2018-10-05 09:52:59 +01:00
Gilles Peskine
ddffa06501
Add ChangeLog entry
2018-10-03 13:40:16 +02:00
Simon Butcher
404aa65813
Add ChangeLog entry for Windows threading fix
2018-10-01 14:44:22 +01:00
Simon Butcher
df0500d7bc
Add Changelog entry for #482
...
Add Changelog entry for inline assembly/literal strings too long issue with
Clang.
2018-09-30 12:37:27 +01:00
Jaeden Amero
3725bb2d6d
rsa: pss: Enable use of big hashes with small keys
...
It should be valid to RSASSA-PSS sign a SHA-512 hash with a 1024-bit or
1032-bit RSA key, but with the salt size being always equal to the hash
size, this isn't possible: the key is too small.
To enable use of hashes that are relatively large compared to the key
size, allow reducing the salt size to no less than the hash size minus 2
bytes. We don't allow salt sizes smaller than the hash size minus 2
bytes because that too significantly changes the security guarantees the
library provides compared to the previous implementation which always
used a salt size equal to the hash size. The new calculated salt size
remains compliant with FIPS 186-4.
We also need to update the "hash too large" test, since we now reduce
the salt size when certain key sizes are used. We used to not support
1024-bit keys with SHA-512, but now we support this by reducing the salt
size to 62. Update the "hash too large" test to use a 1016-bit RSA key
with SHA-512, which still has too large of a hash because we will not
reduce the salt size further than 2 bytes shorter than the hash size.
The RSA private key used for the test was generated using "openssl
genrsa 1016" using OpenSSL 1.1.1-pre8.
$ openssl genrsa 1016
Generating RSA private key, 1016 bit long modulus (2 primes)
..............++++++
....++++++
e is 65537 (0x010001)
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
2018-09-27 18:23:08 +01:00
Simon Butcher
0592ea772a
Merge remote-tracking branch 'public/pr/1140' into development
2018-09-27 11:37:42 +01:00
Simon Butcher
1afc767f23
Merge remote-tracking branch 'public/pr/1758' into development
2018-09-27 11:35:19 +01:00
Simon Butcher
c86993e33c
Merge remote-tracking branch 'public/pr/1970' into development
2018-09-27 09:48:54 +01:00
Simon Butcher
c0514bfffe
Added ChangeLog entry for yotta support removal
2018-09-26 18:08:54 +01:00
Manuel Pégourié-Gonnard
125af948c3
Merge branch 'development-restricted' into iotssl-1260-non-blocking-ecc-restricted
...
* development-restricted: (578 commits)
Update library version number to 2.13.1
Don't define _POSIX_C_SOURCE in header file
Don't declare and define gmtime()-mutex on Windows platforms
Correct preprocessor guards determining use of gmtime()
Correct documentation of mbedtls_platform_gmtime_r()
Correct typo in documentation of mbedtls_platform_gmtime_r()
Correct POSIX version check to determine presence of gmtime_r()
Improve documentation of mbedtls_platform_gmtime_r()
platform_utils.{c/h} -> platform_util.{c/h}
Don't include platform_time.h if !MBEDTLS_HAVE_TIME
Improve wording of documentation of MBEDTLS_PLATFORM_GMTIME_R_ALT
Fix typo in documentation of MBEDTLS_PLATFORM_GMTIME_R_ALT
Replace 'thread safe' by 'thread-safe' in the documentation
Improve documentation of MBEDTLS_HAVE_TIME_DATE
ChangeLog: Add missing renamings gmtime -> gmtime_r
Improve documentation of MBEDTLS_HAVE_TIME_DATE
Minor documentation improvements
Style: Add missing period in documentation in threading.h
Rename mbedtls_platform_gmtime() to mbedtls_platform_gmtime_r()
Guard decl and use of gmtime mutex by HAVE_TIME_DATE and !GMTIME_ALT
...
2018-09-11 12:39:14 +02:00
Simon Butcher
5d40f67138
Merge remote-tracking branch 'public/pr/1927' into development-restricted
2018-09-06 16:24:48 +01:00
Gilles Peskine
5215783d56
Add ChangeLog entry
2018-09-05 17:27:48 +02:00
Hanno Becker
921b76d056
Replace 'thread safe' by 'thread-safe' in the documentation
2018-09-05 16:21:36 +01:00
Hanno Becker
acef292eac
ChangeLog: Add missing renamings gmtime -> gmtime_r
2018-09-05 16:19:07 +01:00
Hanno Becker
cfeb70c6b9
gmtime: Remove special treatment for IAR
...
Previous commits attempted to use `gmtime_s()` for IAR systems; however,
this attempt depends on the use of C11 extensions which lead to incompatibility
with other pieces of the library, such as the use of `memset()` which is
being deprecated in favor of `memset_s()` in C11.
2018-09-05 13:52:46 +01:00
Andres Amaya Garcia
45e30201a4
Document that IAR gmtime_s() is auto selected
2018-09-05 12:05:59 +01:00
Andres Amaya Garcia
c29c34c1b4
Improve wording of gmtime feature in ChangeLog
2018-09-05 11:54:40 +01:00
Andres Amaya Garcia
8c9a620fb6
Fix missing word in ChangeLog entry for gmtime()
2018-09-05 11:30:28 +01:00
Simon Butcher
c0a63bd0c1
Remove duplication of some entries in the ChangeLog
...
Fixes for #1941 and #1954 were listed twice.
2018-09-04 09:54:28 +01:00
Simon Butcher
4d075cd7d0
Update library version number to 2.13.0
2018-08-31 15:59:10 +01:00
Simon Butcher
b5afb97244
Revised and clarified ChangeLog
...
Minor changes to fix language, merge mistakes and incorrect classifications of
changes.
2018-08-31 11:59:56 +01:00
Simon Butcher
0bbb4fc132
Merge branch 'development' into development
2018-08-30 01:11:35 +01:00
Simon Butcher
552754a6ee
Merge remote-tracking branch 'public/pr/1988' into development
2018-08-30 00:57:28 +01:00
Simon Butcher
68dbc94720
Merge remote-tracking branch 'public/pr/1951' into development
2018-08-30 00:56:56 +01:00
Simon Butcher
07de4c0035
Merge remote-tracking branch 'public/pr/1920' into development
2018-08-30 00:56:08 +01:00
Nir Sonnenschein
b7ebbcaa2c
compile time warning of 128bit ctr_drbg keys and standardized warnings
...
a compile time print was added warning in case of 128bit ctr_drbg keys.
This was don't to avoid an actual warning in these cases
(making build with warnings as errors possible).
Additional warnings on the Changelog/headers were set to use the same phrasing
phrasing was approved by Gilles and Janos.
2018-08-29 10:20:12 +03:00
Simon Butcher
8a552cf9d6
Merge remote-tracking branch 'public/pr/1920' into development-restricted
2018-08-28 15:39:38 +01:00
Simon Butcher
129fa82908
Merge remote-tracking branch 'restricted/pr/470' into development-restricted
2018-08-28 15:26:11 +01:00
Simon Butcher
7f85563f9b
Merge remote-tracking branch 'restricted/pr/491' into development-restricted
2018-08-28 15:22:40 +01:00
Hanno Becker
02f6f5af26
Adapt ChangeLog
...
Make explicit that buffering support is about DTLS.
2018-08-28 12:54:27 +01:00
Simon Butcher
9ce5160fea
Merge remote-tracking branch 'public/pr/1965' into development
2018-08-28 12:34:14 +01:00
Simon Butcher
676d3fd116
Merge remote-tracking branch 'public/pr/1129' into development
2018-08-28 12:31:23 +01:00
Simon Butcher
9d5a9e1213
Merge remote-tracking branch 'public/pr/1625' into development
2018-08-28 12:23:40 +01:00
Simon Butcher
14dac0953e
Merge remote-tracking branch 'public/pr/1918' into development
2018-08-28 12:21:41 +01:00
Simon Butcher
1846e406c8
Merge remote-tracking branch 'public/pr/1939' into development
2018-08-28 12:19:56 +01:00
Simon Butcher
9598845d11
Merge remote-tracking branch 'public/pr/1955' into development
2018-08-28 12:00:18 +01:00
Simon Butcher
4613772dea
Merge remote-tracking branch 'public/pr/1915' into development
2018-08-28 11:45:44 +01:00
Hanno Becker
0e96585bdd
Merge branch 'datagram_packing' into message_reordering
2018-08-24 12:16:41 +01:00
Hanno Becker
1841b0a11c
Rename ssl_conf_datagram_packing() to ssl_set_datagram_packing()
...
The naming convention is that functions of the form mbedtls_ssl_conf_xxx()
apply to the SSL configuration.
2018-08-24 11:13:57 +01:00
Hanno Becker
aa035d89a6
Move ChangeLog entry from Bugfix to Changes section
2018-08-23 16:40:43 +01:00
Hanno Becker
485aaaf2b9
Adapt ChangeLog
2018-08-23 14:59:42 +01:00
Hanno Becker
a70fb95c82
Adapt ChangeLog
2018-08-23 14:36:50 +01:00
Hanno Becker
aa24937853
Adapt ChangeLog
2018-08-22 10:27:13 +01:00
Hanno Becker
3546201dbc
Merge branch 'datagram_packing' into message_reordering
2018-08-22 10:25:40 +01:00
Hanno Becker
a67dee256d
Merge branch 'iotssl-2402-basic-pmtu-adaptation' into datagram_packing
2018-08-22 10:06:38 +01:00
Manuel Pégourié-Gonnard
b8eec192f6
Implement PMTU auto-reduction in handshake
2018-08-22 10:50:30 +02:00
Hanno Becker
170e2d89da
Merge branch 'iotssl-165-dtls-hs-fragmentation-new' into datagram_packing
2018-08-22 09:44:54 +01:00
Hanno Becker
5e863e02ac
Adapt ChangeLog
2018-08-21 17:52:45 +01:00
Hanno Becker
903ee3d363
Merge branch 'datagram_packing' into message_reordering
2018-08-21 17:24:17 +01:00
Nir Sonnenschein
04354b0796
add ChangeLog entry
2018-08-21 17:53:38 +03:00
Manuel Pégourié-Gonnard
f2f1d40d6d
Improve wording in ChangeLog and documentation
2018-08-21 09:53:22 +02:00
Hanno Becker
6aeaa05a95
Merge branch 'iotssl-165-dtls-hs-fragmentation-new' into datagram_packing
2018-08-20 12:53:37 +01:00
Manuel Pégourié-Gonnard
6e7aaca146
Move MTU setting to SSL context, not config
...
This setting belongs to the individual connection, not to a configuration
shared by many connections. (If a default value is desired, that can be handled
by the application code that calls mbedtls_ssl_set_mtu().)
There are at least two ways in which this matters:
- per-connection settings can be adjusted if MTU estimates become available
during the lifetime of the connection
- it is at least conceivable that a server might recognize restricted clients
based on range of IPs and immediately set a lower MTU for them. This is much
easier to do with a per-connection setting than by maintaining multiple
near-duplicated ssl_config objects that differ only by the MTU setting.
2018-08-20 10:37:23 +02:00
Ron Eldor
34b03ef78f
Remove redundant else
statement
...
Remove `else` statement, as it is redundant. resolves #1776
2018-08-20 10:39:27 +03:00
Hanno Becker
f103542c3d
Adapt ChangeLog
2018-08-17 16:52:08 +01:00
Hanno Becker
d87a59cc36
Adapt ChangeLog
2018-08-17 15:51:24 +01:00
Jaeden Amero
141e767fa9
Merge remote-tracking branch 'upstream-public/pr/1942' into development
...
Resolve conflicts in ChangeLog
2018-08-17 14:26:51 +01:00
Manuel Pégourié-Gonnard
3879fdfece
Merge remote-tracking branch 'public/pr/1955' into iotssl-165-dtls-hs-fragmentation-new
...
* public/pr/1955:
Adapt ChangeLog
Fix overly strict bounds check in ssl_parse_certificate_request()
2018-08-17 10:49:47 +02:00
Hanno Becker
eb2b15accd
Improve ChangeLog wording for the commmit that Fixes #1954 .
2018-08-17 09:47:22 +01:00
Andres Amaya Garcia
a7b9f15f27
Add ChangeLog entry for configurable gmtime() in platform
2018-08-16 21:46:35 +01:00
Hanno Becker
ad0fe92fb6
Adapt ChangeLog
2018-08-16 15:52:22 +01:00
Manuel Pégourié-Gonnard
637e234d9f
Merge remote-tracking branch 'public/pr/1915' into iotssl-165-dtls-hs-fragmentation-new
...
* public/pr/1915:
Adapt ChangeLog
Fix mbedtls_ssl_get_record_expansion() for ChaChaPoly and CBC
2018-08-16 10:01:21 +02:00
Manuel Pégourié-Gonnard
0b1d9b2c75
Declare ssl_conf_mtu()
2018-08-16 10:01:10 +02:00
Manuel Pégourié-Gonnard
01ec4af023
Add ChangeLog entry
2018-08-16 10:01:10 +02:00
Janos Follath
08a4aebc46
HKDF: Add warning to partial functions
...
The standard HKDF security guarantees only hold if `mbedtls_hkdf()` is
used or if `mbedtls_hkdf_extract()` and `mbedtls_hkdf_expand()` are
called in succession carefully and an equivalent way.
Making `mbedtls_hkdf_extract()` and `mbedtls_hkdf_expand()` static would
prevent any misuse, but doing so would require the TLS 1.3 stack to
break abstraction and bypass the module API.
To reduce the risk of misuse we add warnings to the function
descriptions.
2018-08-14 16:08:38 +01:00
Hanno Becker
9dc3be7601
Improve wording in ChangeLog
2018-08-14 15:22:05 +01:00
Hanno Becker
361f254eab
Adapt ChangeLog
2018-08-13 16:36:58 +01:00
Ron Eldor
d1a4762adb
Use mbedtls_printf instead of printf
...
Replace usages of `printf()` with `mbedtls_printf()` in `aria.c`
which were accidently merged. Fixes #1908
2018-08-13 13:49:52 +03:00
Jaeden Amero
d8f41698d2
Merge remote-tracking branch 'upstream-public/pr/1598' into development
...
Add a Changelog entry
2018-08-10 11:23:15 +01:00
Jaeden Amero
03bd4847b3
Merge remote-tracking branch 'upstream-public/pr/1861' into development
...
Add Changelog entry
2018-08-10 11:17:14 +01:00
Jaeden Amero
cac0c1a250
Merge remote-tracking branch 'upstream-public/pr/1378' into development
2018-08-10 10:59:53 +01:00
Jaeden Amero
372b50b252
Add a ChangeLog entry for #1816
2018-08-10 10:56:31 +01:00
Jaeden Amero
f48163a960
Merge remote-tracking branch 'upstream-public/pr/1834' into development
2018-08-10 10:49:10 +01:00
Andres Amaya Garcia
824dfb34b4
Add ChangeLog entry for use of gmtime
2018-08-07 20:29:57 +01:00
Hanno Becker
448146407f
Adapt ChangeLog
2018-08-03 10:07:39 +01:00
Simon Butcher
b363382ba4
Add ChangeLog entry for bug #1890
2018-07-30 22:10:48 +01:00
Angus Gratton
608a487b9c
Fix memory leak in ecp_mul_comb() if ecp_precompute_comb() fails
...
In ecp_mul_comb(), if (!p_eq_g && grp->T == NULL) and then ecp_precompute_comb() fails (which can
happen due to OOM), then the new array of points T will be leaked (as it's newly allocated, but
hasn't been asigned to grp->T yet).
Symptom was a memory leak in ECDHE key exchange under low memory conditions.
2018-07-27 09:15:34 +10:00
Simon Butcher
6c34268e20
Merge remote-tracking branch 'restricted/pr/501' into development-restricted
2018-07-26 14:24:56 +01:00
Simon Butcher
f11a7cda73
Clarify Changelog entries
...
Corrected the Changelog to move an entry in the wrong place after a merge, some
entries which were Changes not bugfixes, and corrected style issues.
2018-07-25 17:29:59 +01:00
Jaeden Amero
193c86425e
Update version to 2.12.0
2018-07-25 15:42:26 +01:00
Simon Butcher
37b9fd5df6
Merge remote-tracking branch 'restricted/pr/490' into development
2018-07-24 23:40:37 +01:00
Simon Butcher
2c92949e0a
Merge remote-tracking branch 'public/pr/1198' into development
2018-07-24 17:20:17 +01:00
Simon Butcher
c88c627fba
Merge remote-tracking branch 'public/pr/1658' into development
2018-07-24 17:19:10 +01:00
Ron Eldor
9cf0d53adc
Add ChangeLog
...
Add entry in ChangeLog for the Key Wrapping feature.
2018-07-24 16:43:20 +01:00
Simon Butcher
ccb43df37e
Merge remote-tracking branch 'public/pr/927' into development
2018-07-24 13:06:54 +01:00
Simon Butcher
dad05b7fc9
Merge remote-tracking branch 'public/pr/1844' into development
2018-07-24 13:05:09 +01:00
Simon Butcher
05330541ea
Revise ChangeLog entry for empty data records fixes
2018-07-24 12:54:15 +01:00
Simon Butcher
116ac43d00
Merge remote-tracking branch 'public/pr/1852' into development
2018-07-24 12:18:59 +01:00
Simon Butcher
fced1f2fb3
Merge remote-tracking branch 'public/pr/1854' into development
2018-07-24 10:26:46 +01:00
Simon Butcher
ecb635efca
Add ChangeLog entry for #1098 fix.
2018-07-24 10:03:41 +01:00
Brian J Murray
4736e96568
add myself to changelog
2018-07-23 10:34:47 -07:00
Ron Eldor
4e64e0b922
Fix after PR comments
...
1. Don't set IV onECB
2. Fix style issues
3. reduce number of tests
2018-07-23 18:18:32 +01:00
Ron Eldor
7b01244b99
Add tests for mbedtls_cipher_crypt API
...
1. Add tests for 'mbedtls_cipher_crypt()' API
2. Resolves #1091 , by ignoring IV when the cipher mode is MBEDTLS_MODE_ECB
2018-07-23 18:02:09 +01:00
Andres Amaya Garcia
81f0633c16
Add ChangeLog entry for empty app data fix
2018-07-20 23:09:29 +01:00
Angus Gratton
1a7a17e548
Check for invalid short Alert messages
...
(Short Change Cipher Spec & Handshake messages are already checked for.)
2018-07-20 23:09:29 +01:00
Angus Gratton
b512bc1d29
CBC mode: Allow zero-length message fragments (100% padding)
...
Fixes https://github.com/ARMmbed/mbedtls/issues/1632
2018-07-20 23:09:29 +01:00
Simon Butcher
922bd1efb2
Merge remote-tracking branch 'public/pr/1752' into development
2018-07-20 14:33:18 +01:00
Simon Butcher
862e703d51
Merge remote-tracking branch 'public/pr/921' into development
2018-07-20 14:30:50 +01:00
Simon Butcher
4f37bcabf9
Fix ChangeLog entry for issue #1663
...
The ChangeLog entry was under the wrong version, and under Changes, not
BugFixes.
2018-07-19 19:52:32 +01:00
Simon Butcher
df15356259
Merge remote-tracking branch 'public/pr/1663' into development
2018-07-19 19:48:10 +01:00
Simon Butcher
a72098b4d6
Merge remote-tracking branch 'public/pr/1778' into development
2018-07-19 16:10:38 +01:00
k-stachowiak
6ca436a457
Update change log
2018-07-16 12:20:10 +02:00
Manuel Pégourié-Gonnard
830ce11eba
Clarify attack conditions in the ChangeLog.
...
Referring to the previous entry could imply that the current one was limited
to SHA-384 too, which it isn't.
2018-07-11 18:27:08 +02:00
k-stachowiak
21feae58cb
Update change log
2018-07-11 17:34:55 +02:00
Gilles Peskine
604ccc6608
Add ChangeLog entry
2018-07-10 16:50:33 +02:00
Simon Butcher
00af447ba8
Add ChangeLog entry for PR #536
2018-07-10 15:35:43 +01:00
Simon Butcher
32b074720e
Merge remote-tracking branch 'public/pr/1737' into development
2018-07-10 14:57:50 +01:00
Simon Butcher
cdbb2f2168
Merge remote-tracking branch 'public/pr/1563' into development
2018-07-10 12:49:26 +01:00
Simon Butcher
231d7e5669
Add ChangeLog entry for PR #1567 .
...
ChangeLog entry for platform support for the Haiku OS. PR #1567 .
2018-07-10 11:56:19 +01:00
Simon Butcher
6331cb0607
Fix some whitespace issues in ChangeLog and CMakeLists.txt
...
Stray tab in library/CMakeLists.txt and incorrect formatting in ChangeLog.
2018-07-10 11:48:42 +01:00
Manuel Pégourié-Gonnard
7b42030b5d
Add counter-measure to cache-based Lucky 13
...
The basis for the Lucky 13 family of attacks is for an attacker to be able to
distinguish between (long) valid TLS-CBC padding and invalid TLS-CBC padding.
Since our code sets padlen = 0 for invalid padding, the length of the input to
the HMAC function, and the location where we read the MAC, give information
about that.
A local attacker could gain information about that by observing via a
cache attack whether the bytes at the end of the record (at the location of
would-be padding) have been read during MAC verification (computation +
comparison).
Let's make sure they're always read.
2018-07-05 14:44:49 +02:00
Ron Eldor
636179a277
Fix typo
...
Fix typo in ChangeLog entry.
2018-07-05 14:33:54 +03:00
Ron Eldor
278af4536c
Fix hmac_drbg failure in benchmark, with threading
...
Remove redunadnat calls to `hmac_drbg_free()` between seeding operations,
which make the mutex invalid. Fixes #1095
2018-07-05 14:33:22 +03:00
Manuel Pégourié-Gonnard
1cc1fb0599
Fix Lucky 13 cache attack on MD/SHA padding
...
The basis for the Lucky 13 family of attacks is for an attacker to be able to
distinguish between (long) valid TLS-CBC padding and invalid TLS-CBC padding.
Since our code sets padlen = 0 for invalid padding, the length of the input to
the HMAC function gives information about that.
Information about this length (modulo the MD/SHA block size) can be deduced
from how much MD/SHA padding (this is distinct from TLS-CBC padding) is used.
If MD/SHA padding is read from a (static) buffer, a local attacker could get
information about how much is used via a cache attack targeting that buffer.
Let's get rid of this buffer. Now the only buffer used is the internal MD/SHA
one, which is always read fully by the process() function.
2018-07-05 10:47:00 +02:00
Ron Eldor
382c1db6c0
Minor fixes
...
1. Rephrase ChangeLog entry.
2. Add a full stop at the end of the fuinction documentation.
2018-07-04 17:42:47 +03:00