mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2025-08-08 17:42:09 +03:00
Merge remote-tracking branch 'origin/development' into update-restricted-2023-08-30
This commit is contained in:
@@ -21,6 +21,9 @@ We generally don't include changelog entries for:
|
||||
* Performance improvements, unless they are particularly significant.
|
||||
* Changes to parts of the code base that users don't interact with directly,
|
||||
such as test code and test data.
|
||||
* Fixes for compiler warnings. Releases typically contain a number of fixes
|
||||
of this kind, so we will only mention them in the Changelog if they are
|
||||
particularly significant.
|
||||
|
||||
Until Mbed TLS 2.24.0, we required changelog entries in more cases.
|
||||
Looking at older changelog entries is good practice for how to write a
|
||||
|
@@ -2,13 +2,17 @@ New deprecations
|
||||
* PSA_WANT_KEY_TYPE_xxx_KEY_PAIR and
|
||||
MBEDTLS_PSA_ACCEL_KEY_TYPE_xxx_KEY_PAIR, where xxx is either ECC or RSA,
|
||||
are now being deprecated in favor of PSA_WANT_KEY_TYPE_xxx_KEY_PAIR_yyy and
|
||||
MBEDTLS_PSA_ACCEL_KEY_TYPE_xxx_KEY_PAIR_yyy. Here yyy can be: USE, IMPORT,
|
||||
EXPORT, GENERATE, DERIVE. The goal is to have a finer detail about the
|
||||
capabilities of the PSA side for either key.
|
||||
MBEDTLS_PSA_ACCEL_KEY_TYPE_xxx_KEY_PAIR_yyy. Here yyy can be: BASIC,
|
||||
IMPORT, EXPORT, GENERATE, DERIVE. The goal is to have a finer detail about
|
||||
the capabilities of the PSA side for either key.
|
||||
|
||||
Features
|
||||
* New symbols PSA_WANT_KEY_TYPE_xxx_KEY_PAIR_yyy and
|
||||
MBEDTLS_PSA_ACCEL_KEY_TYPE_xxx_KEY_PAIR_yyy (where xxx is either ECC, RSA
|
||||
or DH) were introduced in order to have finer accuracy in defining the
|
||||
PSA capabilities for each key. These capabilities, named yyy above, can be
|
||||
any of: USE, IMPORT, EXPORT, GENERATE, DERIVE.
|
||||
any of: BASIC, IMPORT, EXPORT, GENERATE, DERIVE.
|
||||
- DERIVE is only available for ECC keys, not for RSA or DH ones.
|
||||
- implementations are free to enable more than what it was strictly
|
||||
requested. For example BASIC internally enables IMPORT and EXPORT
|
||||
(useful for testing purposes), but this might change in the future.
|
||||
|
6
ChangeLog.d/add-aes-hardware-only-option.txt
Normal file
6
ChangeLog.d/add-aes-hardware-only-option.txt
Normal file
@@ -0,0 +1,6 @@
|
||||
Features
|
||||
* New configuration option MBEDTLS_AES_USE_HARDWARE_ONLY introduced. When
|
||||
using CPU-accelerated AES (e.g., Arm Crypto Extensions), this option
|
||||
disables the plain C implementation and the run-time detection for the
|
||||
CPU feature, which reduces code size and avoids the vulnerability of the
|
||||
plain C implementation.
|
2
ChangeLog.d/add-pbkdf2-cmac.txt
Normal file
2
ChangeLog.d/add-pbkdf2-cmac.txt
Normal file
@@ -0,0 +1,2 @@
|
||||
Features
|
||||
* Add support for PBKDF2-CMAC through the PSA API.
|
3
ChangeLog.d/add-rfc822-directoryname-csr-gen.txt
Normal file
3
ChangeLog.d/add-rfc822-directoryname-csr-gen.txt
Normal file
@@ -0,0 +1,3 @@
|
||||
Features
|
||||
* Add a possibility to generate CSR's with RCF822 and directoryName subtype
|
||||
of subjectAltName extension in x509 certificates.
|
@@ -5,3 +5,6 @@ Features
|
||||
MBEDTLS_USE_PSA_CRYPTO. Restartable/interruptible ECDHE operations in
|
||||
TLS 1.2 (ECDHE-ECDSA key exchange) are not supported in those builds yet,
|
||||
as PSA does not have an API for restartable ECDH yet.
|
||||
* When all of ECDH, ECDSA and EC J-PAKE are either disabled or provided by
|
||||
a driver, it is possible to disable MBEDTLS_ECP_C and still get support
|
||||
for ECC keys and algorithms in PSA. See docs/driver-only-builds.txt.
|
3
ChangeLog.d/enforce-min-RSA-key-size.txt
Normal file
3
ChangeLog.d/enforce-min-RSA-key-size.txt
Normal file
@@ -0,0 +1,3 @@
|
||||
Changes
|
||||
* Enforce minimum RSA key size when generating a key
|
||||
to avoid accidental misuse.
|
6
ChangeLog.d/extend-pk-opaque-ecc.txt
Normal file
6
ChangeLog.d/extend-pk-opaque-ecc.txt
Normal file
@@ -0,0 +1,6 @@
|
||||
Features
|
||||
* Support for "opaque" (PSA-held) ECC keys in the PK module has been
|
||||
extended: it is now possible to use mbedtls_pk_write_key_der(),
|
||||
mbedtls_pk_write_key_pem(), mbedtls_pk_check_pair(), and
|
||||
mbedtls_pk_verify() with opaque ECC keys (provided the PSA attributes
|
||||
allow it).
|
3
ChangeLog.d/fix-a-few-unchecked-return.txt
Normal file
3
ChangeLog.d/fix-a-few-unchecked-return.txt
Normal file
@@ -0,0 +1,3 @@
|
||||
Bugfix
|
||||
* Fix some cases where mbedtls_mpi_mod_exp, RSA key construction or ECDSA
|
||||
signature can silently return an incorrect result in low memory conditions.
|
3
ChangeLog.d/fix-aes-cbc-iv-corruption
Normal file
3
ChangeLog.d/fix-aes-cbc-iv-corruption
Normal file
@@ -0,0 +1,3 @@
|
||||
Bugfix
|
||||
* Fix a potential corruption of the passed-in IV when mbedtls_aes_crypt_cbc()
|
||||
is called with zero length and padlock is not enabled.
|
3
ChangeLog.d/fix-empty-enum.txt
Normal file
3
ChangeLog.d/fix-empty-enum.txt
Normal file
@@ -0,0 +1,3 @@
|
||||
Bugfix
|
||||
* Fix compile failure due to empty enum in cipher_wrap.c, when building
|
||||
with a very minimal configuration. Fixes #7625.
|
2
ChangeLog.d/fix-iar-compiler-warnings.txt
Normal file
2
ChangeLog.d/fix-iar-compiler-warnings.txt
Normal file
@@ -0,0 +1,2 @@
|
||||
Bugfix
|
||||
* Fix IAR compiler warnings.
|
@@ -0,0 +1,3 @@
|
||||
Features
|
||||
* The documentation of mbedtls_ecp_group now describes the optimized
|
||||
representation of A for some curves. Fixes #8045.
|
2
ChangeLog.d/inject-entropy.txt
Normal file
2
ChangeLog.d/inject-entropy.txt
Normal file
@@ -0,0 +1,2 @@
|
||||
Bugfix
|
||||
* Fix the build with MBEDTLS_PSA_INJECT_ENTROPY. Fixes #7516.
|
3
ChangeLog.d/misc-from-psa-crypto.txt
Normal file
3
ChangeLog.d/misc-from-psa-crypto.txt
Normal file
@@ -0,0 +1,3 @@
|
||||
Bugfix
|
||||
* Fix CCM* with no tag being not supported in a build with CCM as the only
|
||||
symmetric encryption algorithm and the PSA configuration enabled.
|
3
ChangeLog.d/psa_crypto_user_config_file.txt
Normal file
3
ChangeLog.d/psa_crypto_user_config_file.txt
Normal file
@@ -0,0 +1,3 @@
|
||||
Bugfix
|
||||
* Don't try to include MBEDTLS_PSA_CRYPTO_USER_CONFIG_FILE when
|
||||
MBEDTLS_PSA_CRYPTO_CONFIG is disabled.
|
3
ChangeLog.d/ssl_premaster_secret-empty.txt
Normal file
3
ChangeLog.d/ssl_premaster_secret-empty.txt
Normal file
@@ -0,0 +1,3 @@
|
||||
Bugfix
|
||||
* Fix a compilation error on some platforms when including mbedtls/ssl.h
|
||||
with all TLS support disabled. Fixes #6628.
|
4
ChangeLog.d/use_heap_rsa_signature.txt
Normal file
4
ChangeLog.d/use_heap_rsa_signature.txt
Normal file
@@ -0,0 +1,4 @@
|
||||
Changes
|
||||
* Use heap memory to allocate DER encoded RSA private key.
|
||||
This reduces stack usage significantly for RSA signature
|
||||
operations when MBEDTLS_PSA_CRYPTO_C is defined.
|
4
ChangeLog.d/x509-ec-algorithm-identifier-fix.txt
Normal file
4
ChangeLog.d/x509-ec-algorithm-identifier-fix.txt
Normal file
@@ -0,0 +1,4 @@
|
||||
Bugfix
|
||||
* Fix x509 certificate generation to conform to RFC 5480 / RFC 5758 when
|
||||
using ECC key. The certificate was rejected by some crypto frameworks.
|
||||
Fixes #2924.
|
Reference in New Issue
Block a user