mirror of
https://github.com/Mbed-TLS/mbedtls.git
synced 2025-03-25 04:43:32 +00:00
Merge pull request #5905 from gilles-peskine-arm/changelog-improvements-20220609-development
Changelog improvements before the 3.2 release
This commit is contained in:
commit
7d14c19730
@ -1,4 +1,4 @@
|
|||||||
Features
|
Features
|
||||||
* Add the function mbedtls_timing_get_final_delay() to access the private
|
* Add function mbedtls_timing_get_final_delay() to access the private
|
||||||
final delay field in an mbedtls_timing_delay_context, as requested in
|
final delay field in an mbedtls_timing_delay_context, as requested in
|
||||||
#5183
|
#5183.
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
Features
|
Features
|
||||||
* Add function mbedtls_ssl_is_handshake_over() to enable querying if the SSL
|
* Add function mbedtls_ssl_is_handshake_over() to enable querying if the SSL
|
||||||
Handshake has completed or not, and thus whether to continue calling
|
Handshake has completed or not, and thus whether to continue calling
|
||||||
mbedtls_ssl_handshake_step(), requested in #4383
|
mbedtls_ssl_handshake_step(), requested in #4383.
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
Features
|
Features
|
||||||
* Add the function mbedtls_ssl_get_own_cid() to access our own connection id
|
* Add the function mbedtls_ssl_get_own_cid() to access our own connection id
|
||||||
within mbedtls_ssl_context, as requested in #5184
|
within mbedtls_ssl_context, as requested in #5184.
|
||||||
|
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
Changes
|
Changes
|
||||||
* Add aliases for libraries so that the normal MbedTLS::* targets
|
* In CMake builds, add aliases for libraries so that the normal MbedTLS::*
|
||||||
work when MbedTLS is built as a subdirectory. Allows use of
|
targets work when MbedTLS is built as a subdirectory. This allows the
|
||||||
CMake's FetchContent, as requested in #5688.
|
use of FetchContent, as requested in #5688.
|
||||||
|
@ -1,3 +1,3 @@
|
|||||||
Changes
|
Changes
|
||||||
* cmake: Fix runtime library install location in mingw
|
* Fix runtime library install location when building with CMake and MinGW.
|
||||||
This install DLLs in bin directory instead of lib.
|
DLLs are now installed in the bin directory instead of lib.
|
||||||
|
@ -1,3 +1,3 @@
|
|||||||
New deprecations
|
New deprecations
|
||||||
* Deprecate mbedtls_cipher_setup_psa() function.
|
* Deprecate mbedtls_cipher_setup_psa(). Use psa_aead_xxx() or
|
||||||
Use psa_aead_xxx() / psa_cipher_xxx() directly instead.
|
psa_cipher_xxx() directly instead.
|
||||||
|
@ -1,3 +1,3 @@
|
|||||||
Bugfix
|
Bugfix
|
||||||
* Fix a race condition in out-of-source builds with CMake when generated data
|
* Fix a race condition in out-of-source builds with CMake when generated data
|
||||||
files are already present. Fixes #5374
|
files are already present. Fixes #5374.
|
||||||
|
@ -1,3 +1,3 @@
|
|||||||
Bugfix
|
Bugfix
|
||||||
* Fix compilation on Windows when building shared library, by setting
|
* Fix the library search path when building a shared library with CMake
|
||||||
library search path to CMAKE_CURRENT_BINARY_DIR.
|
on Windows.
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
Bugfix
|
Bugfix
|
||||||
* Fix a bug in x25519 example program where the removal of
|
* Fix a bug in the x25519 example program where the removal of
|
||||||
MBEDTLS_ECDH_LEGACY_CONTEXT caused the program not to run. Fixes #4901 and
|
MBEDTLS_ECDH_LEGACY_CONTEXT caused the program not to run. Fixes #4901 and
|
||||||
#3191.
|
#3191.
|
||||||
|
@ -1,3 +1,3 @@
|
|||||||
Features
|
Features
|
||||||
* Add mbedtls_ecp_export() function to export ECP
|
* Add function mbedtls_ecp_export() to export ECP key pair parameters.
|
||||||
keypair parameters. Fixes #4838.
|
Fixes #4838.
|
||||||
|
@ -1,2 +0,0 @@
|
|||||||
Features
|
|
||||||
* A64 SHA-2 crypto extension support for SHA-256
|
|
3
ChangeLog.d/mbedtls_sha2_a64_crypto_acceleration.txt
Normal file
3
ChangeLog.d/mbedtls_sha2_a64_crypto_acceleration.txt
Normal file
@ -0,0 +1,3 @@
|
|||||||
|
Features
|
||||||
|
* Add support for the ARMv8 SHA-2 acceleration instructions when building
|
||||||
|
for Aarch64.
|
@ -1,2 +0,0 @@
|
|||||||
Features
|
|
||||||
* A64 crypto extension support for SHA-512
|
|
@ -1,2 +1,2 @@
|
|||||||
Bugfix
|
Bugfix
|
||||||
* Fix memory leak if mbedtls_ssl_config_defaults() call is repeated
|
* Fix a memory leak if mbedtls_ssl_config_defaults() is called twice.
|
||||||
|
@ -1,4 +1,2 @@
|
|||||||
Features
|
Features
|
||||||
* Add ALPN support in tls13 client. Client is able to write ALPN extension
|
* Add ALPN support in TLS 1.3 clients.
|
||||||
in client hello, and able to parse the response from server encrypted
|
|
||||||
extension.
|
|
||||||
|
@ -1,6 +1,10 @@
|
|||||||
|
New deprecations
|
||||||
|
* Deprecate mbedtls_ssl_conf_max_version() and
|
||||||
|
mbedtls_ssl_conf_min_version() in favor of
|
||||||
|
mbedtls_ssl_conf_max_tls_version() and
|
||||||
|
mbedtls_ssl_conf_min_tls_version().
|
||||||
|
|
||||||
Features
|
Features
|
||||||
* Unify internal/external TLS protocol version enums
|
* Add functions mbedtls_ssl_conf_max_tls_version() and
|
||||||
* Deprecate mbedtls_ssl_conf_max_version()
|
mbedtls_ssl_conf_min_tls_version() that use a single value to specify
|
||||||
Replaced with mbedtls_ssl_conf_max_tls_version()
|
the protocol version.
|
||||||
* Deprecate mbedtls_ssl_conf_min_version()
|
|
||||||
Replaced with mbedtls_ssl_conf_min_tls_version()
|
|
||||||
|
@ -1,3 +1,3 @@
|
|||||||
Features
|
Features
|
||||||
* Add a function to extract message digest information from a message
|
* Add function mbedtls_md_info_from_ctx() to recall the message digest
|
||||||
digest context.
|
information that was used to set up a message digest context.
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
Changes
|
Changes
|
||||||
* Return PSA_ERROR_INVALID_ARGUMENT if the algorithm passed to singleshot
|
* Return PSA_ERROR_INVALID_ARGUMENT if the algorithm passed to one-shot
|
||||||
AEAD functions is not an AEAD algorithm. This aligns them with the
|
AEAD functions is not an AEAD algorithm. This aligns them with the
|
||||||
multipart functions, and the PSA Crypto API 1.1 spec.
|
multipart functions, and the PSA Crypto API 1.1 specification.
|
||||||
|
@ -1,5 +0,0 @@
|
|||||||
Changes
|
|
||||||
* Automatically enable MBEDTLS_PK_WRITE_C if MBEDTLS_PK_C and
|
|
||||||
MBEDTLS_USE_PSA_CRYPTO are enabled. This is due to ecdsa_verify_wrap
|
|
||||||
requirements, but will also probably be needed by RSA soon, hence the
|
|
||||||
broader PK_C requirement.
|
|
@ -1,4 +1,4 @@
|
|||||||
Features
|
Features
|
||||||
* Extend the existing PSA_ALG_TLS12_PSK_TO_MS() algorithm to support
|
* Extend the existing PSA_ALG_TLS12_PSK_TO_MS() algorithm to support
|
||||||
mixed-psk. Add an optional input PSA_KEY_DERIVATION_INPUT_OTHER_SECRET
|
mixed-PSK. Add an optional input PSA_KEY_DERIVATION_INPUT_OTHER_SECRET
|
||||||
holding the other secret.
|
holding the other secret.
|
||||||
|
@ -1,3 +0,0 @@
|
|||||||
Bugfix
|
|
||||||
* Add missing key slot destruction calls when a raw key agreement or
|
|
||||||
a public key export fails in ssl_write_client_key_exchange.
|
|
@ -1,5 +1,3 @@
|
|||||||
Bugfix
|
Bugfix
|
||||||
* Fix handshake failure when the peer Finished message has not been received
|
* Fix a TLS 1.3 handshake failure when the peer Finished message has not
|
||||||
yet when we first try to fetch it. The fetching is moved before the
|
been received yet when we first try to fetch it.
|
||||||
preprocessing computations to avoid doing them multiple times, which was
|
|
||||||
causing the handshake to fail.
|
|
||||||
|
@ -4,4 +4,4 @@ Bugfix
|
|||||||
client would fail to check that the curve selected by the server for
|
client would fail to check that the curve selected by the server for
|
||||||
ECDHE was indeed one that was offered. As a result, the client would
|
ECDHE was indeed one that was offered. As a result, the client would
|
||||||
accept any curve that it supported, even if that curve was not allowed
|
accept any curve that it supported, even if that curve was not allowed
|
||||||
according to its configuration.
|
according to its configuration. Fixes #5291.
|
||||||
|
@ -2813,9 +2813,9 @@
|
|||||||
/**
|
/**
|
||||||
* \def MBEDTLS_SHA256_USE_A64_CRYPTO_IF_PRESENT
|
* \def MBEDTLS_SHA256_USE_A64_CRYPTO_IF_PRESENT
|
||||||
*
|
*
|
||||||
* Enable acceleration of the SHA-256 cryptographic hash algorithm with the
|
* Enable acceleration of the SHA-256 and SHA-224 cryptographic hash algorithms
|
||||||
* Arm A64 cryptographic extensions if they are available at runtime. If not,
|
* with the ARMv8 cryptographic extensions if they are available at runtime.
|
||||||
* it will fall back to the C implementation.
|
* If not, the library will fall back to the C implementation.
|
||||||
*
|
*
|
||||||
* \note If MBEDTLS_SHA256_USE_A64_CRYPTO_IF_PRESENT is defined when building
|
* \note If MBEDTLS_SHA256_USE_A64_CRYPTO_IF_PRESENT is defined when building
|
||||||
* for a non-Aarch64 build it will be silently ignored.
|
* for a non-Aarch64 build it will be silently ignored.
|
||||||
@ -2838,9 +2838,9 @@
|
|||||||
/**
|
/**
|
||||||
* \def MBEDTLS_SHA256_USE_A64_CRYPTO_ONLY
|
* \def MBEDTLS_SHA256_USE_A64_CRYPTO_ONLY
|
||||||
*
|
*
|
||||||
* Enable acceleration of the SHA-256 cryptographic hash algorithm with the
|
* Enable acceleration of the SHA-256 and SHA-224 cryptographic hash algorithms
|
||||||
* Arm A64 cryptographic extensions, which must be available at runtime (or
|
* with the ARMv8 cryptographic extensions, which must be available at runtime
|
||||||
* an illegal instruction fault will occur).
|
* or else an illegal instruction fault will occur.
|
||||||
*
|
*
|
||||||
* \note This allows builds with a smaller code size than with
|
* \note This allows builds with a smaller code size than with
|
||||||
* MBEDTLS_SHA256_USE_A64_CRYPTO_IF_PRESENT
|
* MBEDTLS_SHA256_USE_A64_CRYPTO_IF_PRESENT
|
||||||
@ -2896,9 +2896,9 @@
|
|||||||
/**
|
/**
|
||||||
* \def MBEDTLS_SHA512_USE_A64_CRYPTO_IF_PRESENT
|
* \def MBEDTLS_SHA512_USE_A64_CRYPTO_IF_PRESENT
|
||||||
*
|
*
|
||||||
* Enable acceleration of the SHA-512 cryptographic hash algorithm with the
|
* Enable acceleration of the SHA-512 and SHA-384 cryptographic hash algorithms
|
||||||
* Arm A64 cryptographic extensions if they are available at runtime. If not,
|
* with the ARMv8 cryptographic extensions if they are available at runtime.
|
||||||
* it will fall back to the C implementation.
|
* If not, the library will fall back to the C implementation.
|
||||||
*
|
*
|
||||||
* \note If MBEDTLS_SHA512_USE_A64_CRYPTO_IF_PRESENT is defined when building
|
* \note If MBEDTLS_SHA512_USE_A64_CRYPTO_IF_PRESENT is defined when building
|
||||||
* for a non-Aarch64 build it will be silently ignored.
|
* for a non-Aarch64 build it will be silently ignored.
|
||||||
@ -2923,9 +2923,9 @@
|
|||||||
/**
|
/**
|
||||||
* \def MBEDTLS_SHA512_USE_A64_CRYPTO_ONLY
|
* \def MBEDTLS_SHA512_USE_A64_CRYPTO_ONLY
|
||||||
*
|
*
|
||||||
* Enable acceleration of the SHA-512 cryptographic hash algorithm with the
|
* Enable acceleration of the SHA-512 and SHA-384 cryptographic hash algorithms
|
||||||
* Arm A64 cryptographic extensions, which must be available at runtime (or
|
* with the ARMv8 cryptographic extensions, which must be available at runtime
|
||||||
* an illegal instruction fault will occur).
|
* or else an illegal instruction fault will occur.
|
||||||
*
|
*
|
||||||
* \note This allows builds with a smaller code size than with
|
* \note This allows builds with a smaller code size than with
|
||||||
* MBEDTLS_SHA512_USE_A64_CRYPTO_IF_PRESENT
|
* MBEDTLS_SHA512_USE_A64_CRYPTO_IF_PRESENT
|
||||||
|
Loading…
x
Reference in New Issue
Block a user