Skip to content

Commit a56070c

Browse files
authored
Merge pull request #6490 from JacobBarthelmeh/release
Prepare for release 5.6.2
2 parents c59cc92 + 353a292 commit a56070c

9 files changed

Lines changed: 386 additions & 352 deletions

File tree

CMakeLists.txt

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -28,16 +28,16 @@ if("${CMAKE_SOURCE_DIR}" STREQUAL "${CMAKE_BINARY_DIR}")
2828
You must delete them, or cmake will refuse to work.")
2929
endif()
3030

31-
project(wolfssl VERSION 5.6.0 LANGUAGES C ASM)
31+
project(wolfssl VERSION 5.6.2 LANGUAGES C ASM)
3232

3333
# shared library versioning
3434
# increment if interfaces have been added, removed or changed
35-
set(LIBTOOL_CURRENT 39)
35+
set(LIBTOOL_CURRENT 40)
3636
# increment if source code has changed set to zero if current is incremented
3737
set(LIBTOOL_REVISION 0)
3838
# increment if interfaces have been added set to zero if interfaces have been
3939
# removed or changed
40-
set(LIBTOOL_AGE 4)
40+
set(LIBTOOL_AGE 5)
4141

4242
math(EXPR LIBTOOL_SO_VERSION "${LIBTOOL_CURRENT} - ${LIBTOOL_AGE}")
4343
set(LIBTOOL_FULL_VERSION ${LIBTOOL_SO_VERSION}.${LIBTOOL_AGE}.${LIBTOOL_REVISION})

ChangeLog.md

Lines changed: 133 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,136 @@
1+
# wolfSSL Release 5.6.2 (Jun 09, 2023)
2+
3+
Release 5.6.2 has been developed according to wolfSSL's development and QA process (see link below) and successfully passed the quality criteria.
4+
https://www.wolfssl.com/about/wolfssl-software-development-process-quality-assurance
5+
6+
NOTE: * --enable-heapmath is being deprecated and will be removed by 2024
7+
8+
Release 5.6.2 of wolfSSL embedded TLS has bug fixes and new features including:
9+
10+
## Vulnerabilities
11+
* [Low] In cases where a malicious agent could analyze cache timing at a very detailed level, information about the AES key used could be leaked during T/S Box lookups. One such case was shown on RISC-V hardware using the MicroWalk tool (https://github.com/microwalk-project/Microwalk). A hardened version of T/S Box lookups was added in wolfSSL to help mitigate this potential attack and is now on by default with RISC-V builds and can be enabled on other builds if desired by compiling wolfSSL with the macro WOLFSSL_AES_TOUCH_LINES. Thanks to Jan Wichelmann, Christopher Peredy, Florian Sieck, Anna Pätschke, Thomas Eisenbarth (University of Lübeck): MAMBO-V: Dynamic Side-Channel Leakage Analysis on RISC-V. Fixed in the following GitHub pull request https://github.com/wolfSSL/wolfssl/pull/6309
12+
* [High] In previous versions of wolfSSL if a TLS 1.3 client gets neither a PSK (pre shared key) extension nor a KSE (key share extension) when connecting to a malicious server, a default predictable buffer gets used for the IKM value when generating the session master secret. Using a potentially known IKM value when generating the session master secret key compromises the key generated, allowing an eavesdropper to reconstruct it and potentially allowing surreptitious access to or meddling with message contents in the session. This issue does not affect client validation of connected servers, nor expose private key information, but could result in an insecure TLS 1.3 session when not controlling both sides of the connection. We recommend that TLS 1.3 client side users update the version of wolfSSL used. Thanks to Johannes from Sectra Communications and Linköping University for the report. Fixed in the following GitHub pull request https://github.com/wolfSSL/wolfssl/pull/6412
13+
14+
## New Feature Additions
15+
16+
### New Ports and Expansions
17+
* Add support for STM32H5
18+
* Add support for Renesas TSIP v1.17
19+
* Add Renesas SCE RSA crypto-only support
20+
* STARCORE DSP port and example builds added
21+
* Add the function wc_PKCS7_SetDefaultSignedAttribs for setting PKCS7 signed attributes to use with PKCS7 bundle creation
22+
* NXP IMX6Q CAAM port with QNX and performance optimizations for AES-CTR
23+
24+
### New Build Options
25+
* ASN.1 print utility to decode ASN.1 syntax and print out human readable text --enable-asn-print. Utility app is located in the directory ./examples/asn1/
26+
* Add introspection for math build, wc_GetMathInfo() to get information about the math library compiled into the linked wolfSSL library
27+
* Implement TLS recommendations from RFC 9325 for hardening TLS/DTLS security. Enabled with the autoconf flag --enable-harden-tls.
28+
* Add option to support disabling thread local storage, --disable-threadlocal
29+
* Added wc_DsaSign_ex() and wc_DsaVerify_ex() for handling alternative digest algorithms with DSA Sign/Verify
30+
* Implement atomic operations interface. Macros auto-detect if atomic operations are expected to be available, can be turned off with the macro WOLFSSL_NO_ATOMICS
31+
* Added support for DTLS 1.3 Authentication and Integrity-Only Cipher Suites
32+
* Expand crypto callback to have a device ID find callback function with wc_CryptoCb_SetDeviceFindCb. Enabled with the macro WOLF_CRYPTO_CB_FIND
33+
34+
## Enhancements and Optimizations
35+
36+
### Optimizations
37+
* Increased performance with ChaCha20 C implementation and general XOR operations
38+
* Added integer type to the ASN.1 sequencing with ASN.1 Integer sequence
39+
* With wolfSSL_get_x509_next_altname reset alt name list to head once cycled through if compiling with the macro WOLFSSL_MULTICIRCULATE_ALTNAMELIST
40+
* Additional key validity sanity checks on input to wolfSSL_EC_KEY_set_private_key
41+
* adds support for TLSv1.3 stateful session tickets when using SSL_OP_NO_TICKET
42+
43+
### Memory Optimizations
44+
* Improvements to stack usage and management with SP int math library
45+
* Optimization to TLS 1.3 server to remove caching messages for Ed25519/Ed448
46+
* Added a HAVE_CURL macro build for building a subset of the wolfSSL library when linking with cURL
47+
* Memory usage improvement with reducing the size of alignment needed with AES
48+
* Reduce run time memory used with ECC operations and ALT_ECC_SIZE
49+
* Fixes and improvements for building edge cases such as crypto callback without hash-drbg with low footprint options
50+
* Support HAVE_SESSION_TICKET build option without depending on realloc
51+
52+
### Documentation
53+
* Instructions for GPDMA on STM32 configuration added
54+
* Add in instructions for compiling with zephyr on STM32
55+
* Documentation fixup for wolfSSL_get_chain_cert()
56+
* Fix the file pointed to in the TI RTOS documentation that we maintain
57+
* Documentation for wolfSSL_CertManagerFreeCRL
58+
* Updates made to AES and Chacha documentation
59+
* Update Japanese comments for Ed25519, AES, and other miscellaneous items
60+
61+
### Tests
62+
* Add in an option for easily testing malloc failures when building with WOLFSSL_MEM_FAIL_COUNT macro
63+
* Updated in process for using Expect vs Assert to facilitate more malloc failure tests
64+
* Enhance wolfCrypt test for builds that do not have ECC SECP curves enabled
65+
* ESP32 platform-specific VisualGDB test & benchmark projects
66+
* Update to dependencies in docker container file used for tests
67+
* Fix up for base 10 output with bundled benchmark application
68+
69+
### Port Updates
70+
* Zephyr port update, compile time warning fixes, misc. fixes when used with TLS and update of includes
71+
* Update RIOT-OS to not compile out use of writev by default
72+
* Update Micrium port to enable use of STM32_RNG
73+
* Micrium updates for XMEMOVE and XSTRTOK use
74+
* Various Espressif HW crypto, SHA2, AES, MP updates
75+
* Added in ASIO build option with CMake builds
76+
77+
### General Enhancements
78+
* Global codebase cleanup for C89 compliance and wolfCrypt -Wconversion hygiene
79+
* PKCS#11 enhancement adding a callback for RSA key size when using a hardware key, by default 2048 bit key is used
80+
* Allow for unknown OIDs in extensions in wolfSSL_X509_set_ext()
81+
* Allow user to override XSTAT by defining the macro XSTAT when compiling
82+
* Support UPN and SID with x509 certificate extensions and custom OID build
83+
* Write next IV in wolfSSL_DES_ede3_cbc_encrypt for better handling of inline encryption
84+
* Adding NO_ASN_TIME_CHECK build option for compiling out certificate before/after checks
85+
* Improve different peer recvfrom handling and error reporting with ipv4 vs ipv6
86+
87+
## Fixes
88+
* Fix for STM32 ECC sign and verify out of bounds buffer write when the hash length passed in is larger than the key size. Thanks to Maximilian for the report.
89+
* Fix to skip Async_DevCtxInit when using init rsa/ecc label/id api's
90+
* Revert WOLFSSL_NO_ASN_STRICT macro guard around alternate names directory list
91+
* In async mode, don't retry decrypting if a valid error is encountered on a packet parse attempt
92+
* Add additional sanity check on PKCS7 index value in wc_PKCS7_DecryptKekri
93+
* Fix for padding when using an AuthEnvelope PKCS7 type with GCM/CCM stream ciphers
94+
* Fix siphash assembly so that no register is left behind
95+
* Fix to not send a TLS 1.3 session ID resume response when resuming and downgrading to a protocol less than TLS 1.3
96+
* Fix overwriting serialNumber by favouriteDrink when generating a certificate using Cert struct
97+
* Fix for the default realloc used with EspressIf builds
98+
* Track SetDigest usage to avoid invalid free under error conditions
99+
* DTLS v1.3 fix for epoch 0 check on plaintext message
100+
* Fix for session ticket memory leak in wolfSSL_Cleanup
101+
* Fixes for propagating SendAlert errors when the peer disconnects
102+
* Replace XMEMCPY with XMEMMOVE to fix valgrind-3.15.0 reports "Source and destination overlap in memcpy" when using --enable-aesgcm-stream
103+
* Fix for potential out-of-bounds write edge case in fp_mod_2d with --enable-fastmath math library
104+
* Fix getting ECC key size in stm32_ecc_sign_hash_ex
105+
* Fix for case where wc_PeekErrorNodeLineData was not unlocking error queue on error
106+
* Fix for async ECC shared secret state
107+
* Fix for better error checking with sp_gcd with SP int math library
108+
* Fix memory leak in TLSX_KeyShare_Setup when handling an error case
109+
* Fix for double free edge case in InitOCSPRequest when handling a memory allocation failure
110+
* X509 NAME Entry fix for leaking memory on error case
111+
* Fix wolfssl_asn1_time_to_tm setting unexpected fields in tm struct
112+
* Fix for FIPS ECC integrity check with crypto callback set
113+
* BN_to_ASN1_INTEGER fix for handling leading zero byte padding when needed
114+
* Fix a typo in PP macro and add a ceiling to guard against implementation bugs
115+
* DTLS 1.3 fix for using the correct label when deriving the resumption key
116+
* OCSP fix for GetDateInfo edge case with non ASN template builds
117+
* Allow a user set certificate callback function to override the skipAddCA flag when parsing a certificate
118+
* SP int: sp_radix_size when radix 10 fix temp size for handling edge case
119+
* Fixes and improvements for handling failures with memory allocations
120+
* Fix for DecodeECC_DSA_Sig to handle r and s being initialized
121+
* Fix for wc_ecc_is_point to ensure that the x and y are in range [0, p-1] and z is one (affine ordinates)
122+
123+
### Build Fixes
124+
* Fix for building on Windows with CMake and using USER_SETTINGS and fix for options.h creation with CMake when using USER_SETTINGS
125+
* CMake fixes and improvements for use with mingw32
126+
* Fix for building with wpas and x509 small options
127+
* Check if colrm is available for options.h creation when using autoconf
128+
* Clean up NO_BIG_INT build, removing WOLFSSL_SP_MATH macro and heapmath compile
129+
* Fix PKCS#7 build with NO_PKCS7_STREAM
130+
* Fix compilation error in CC-RX and remove unnecessary public key import
131+
* SP Build fixes for ARM assembly with ARMv6 clz and ARM thumb debug build
132+
* For to not advertise support for RSA in TLS extensions when compiled with NO_RSA
133+
1134
# wolfSSL Release 5.6.0 (Mar 24, 2023)
2135

3136
Release 5.6.0 has been developed according to wolfSSL's development and QA process (see link below) and successfully passed the quality criteria.

IDE/WIN10/wolfssl-fips.rc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -51,8 +51,8 @@ END
5151
//
5252

5353
VS_VERSION_INFO VERSIONINFO
54-
FILEVERSION 5,6,0,0
55-
PRODUCTVERSION 5,6,0,0
54+
FILEVERSION 5,6,2,0
55+
PRODUCTVERSION 5,6,2,0
5656
FILEFLAGSMASK 0x3fL
5757
#ifdef _DEBUG
5858
FILEFLAGS 0x1L
@@ -69,12 +69,12 @@ BEGIN
6969
BEGIN
7070
VALUE "CompanyName", "wolfSSL Inc."
7171
VALUE "FileDescription", "The wolfSSL FIPS embedded SSL library is a lightweight, portable, C-language-based SSL/TLS library targeted at IoT, embedded, and RTOS environments primarily because of its size, speed, and feature set."
72-
VALUE "FileVersion", "5.6.0.0"
72+
VALUE "FileVersion", "5.6.2.0"
7373
VALUE "InternalName", "wolfssl-fips"
7474
VALUE "LegalCopyright", "Copyright (C) 2022"
7575
VALUE "OriginalFilename", "wolfssl-fips.dll"
7676
VALUE "ProductName", "wolfSSL FIPS"
77-
VALUE "ProductVersion", "5.6.0.0"
77+
VALUE "ProductVersion", "5.6.2.0"
7878
END
7979
END
8080
BLOCK "VarFileInfo"

0 commit comments

Comments
 (0)