ChangeLog 65.7 KB
Newer Older
1
mbed TLS ChangeLog (Sorted per branch, date)
2

3 4 5 6 7
= mbed TLS 1.3 branch

Security

Features
8 9 10 11
   * Add support for overriding snprintf() (except on Windows) and exit() in
     the platform layer.
   * Add an option to use macros instead of function pointers in the platform
     layer (helps get rid of unwanted references).
12 13
   * Improved Makefiles for Windows targets by fixing library targets and making
     cross-compilation easier (thanks to Alon Bar-Lev).
14 15 16 17 18 19
   * The benchmark program also prints heap usage for public-key primitives
     if POLARSSL_MEMORY_BUFFER_ALLOC_C and POLARSSL_MEMORY_DEBUG are defined.
   * New script ecc-heap.sh helps measuring the impact of ECC parameters on
     speed and RAM (heap only for now) usage.
   * New script memory.sh helps measuring the ROM and RAM requirements of two
     reduced configurations (PSK-CCM and NSA suite B).
20 21

Bugfix
22 23
   * Fix hardclock() (only used in the benchmarking program) with some
     versions of mingw64 (found by kxjhlele).
24
   * Fix warnings from mingw64 in timing.c (found by kxjklele).
25 26
   * Fix potential unintended sign extension in asn1_get_len() on 64-bit
     platforms.
27 28

Changes
29 30
   * Move from SHA-1 to SHA-256 in example programs using signatures
     (suggested by Thorsten Mühlfelder).
31 32 33 34
   * Remove some unneeded inclusions of header files from the standard library
     "minimize" others (eg use stddef.h if only size_t is needed).
   * Change #include lines in test files to use double quotes instead of angle
     brackets for uniformity with the rest of the code.
35
   * Remove dependency on sscanf() in X.509 parsing modules.
36

37
= mbed TLS 1.3.10 released 2015-02-09
38 39
Security
   * NULL pointer dereference in the buffer-based allocator when the buffer is
Manuel Pégourié-Gonnard's avatar
Manuel Pégourié-Gonnard committed
40
     full and polarssl_free() is called (found by Mark Hasemeyer)
41 42
     (only possible if POLARSSL_MEMORY_BUFFER_ALLOC_C is enabled, which it is
     not by default).
43
   * Fix remotely-triggerable uninitialised pointer dereference caused by
44
     crafted X.509 certificate (TLS server is not affected if it doesn't ask for a
45
     client certificate) (found using Codenomicon Defensics).
46
   * Fix remotely-triggerable memory leak caused by crafted X.509 certificates
47 48 49 50
     (TLS server is not affected if it doesn't ask for a client certificate)
     (found using Codenomicon Defensics).
   * Fix potential stack overflow while parsing crafted X.509 certificates
     (TLS server is not affected if it doesn't ask for a client certificate)
51
     (found using Codenomicon Defensics).
52 53 54
   * Fix timing difference that could theoretically lead to a
     Bleichenbacher-style attack in the RSA and RSA-PSK key exchanges
     (reported by Sebastian Schinzel).
55

56
Features
57 58 59
   * Add support for FALLBACK_SCSV (draft-ietf-tls-downgrade-scsv).
   * Add support for Extended Master Secret (draft-ietf-tls-session-hash).
   * Add support for Encrypt-then-MAC (RFC 7366).
60
   * Add function pk_check_pair() to test if public and private keys match.
61
   * Add x509_crl_parse_der().
62 63
   * Add compile-time option POLARSSL_X509_MAX_INTERMEDIATE_CA to limit the
     length of an X.509 verification chain.
64
   * Support for renegotiation can now be disabled at compile-time
65
   * Support for 1/n-1 record splitting, a countermeasure against BEAST.
66 67
   * Certificate selection based on signature hash, prefering SHA-1 over SHA-2
     for pre-1.2 clients when multiple certificates are available.
68 69
   * Add support for getrandom() syscall on recent Linux kernels with Glibc or
     a compatible enough libc (eg uClibc).
70
   * Add ssl_set_arc4_support() to make it easier to disable RC4 at runtime
71
     while using the default ciphersuite list.
72 73
   * Added new error codes and debug messages about selection of
     ciphersuite/certificate.
74

75 76 77
Bugfix
   * Stack buffer overflow if ctr_drbg_update() is called with too large
     add_len (found by Jean-Philippe Aumasson) (not triggerable remotely).
78 79
   * Possible buffer overflow of length at most POLARSSL_MEMORY_ALIGN_MULTIPLE
     if memory_buffer_alloc_init() was called with buf not aligned and len not
80 81
     a multiple of POLARSSL_MEMORY_ALIGN_MULTIPLE (not triggerable remotely).
   * User set CFLAGS were ignored by Cmake with gcc (introduced in 1.3.9, found
82
     by Julian Ospald).
83
   * Fix potential undefined behaviour in Camellia.
84 85
   * Fix potential failure in ECDSA signatures when POLARSSL_ECP_MAX_BITS is a
     multiple of 8 (found by Gergely Budai).
86 87
   * Fix unchecked return code in x509_crt_parse_path() on Windows (found by
     Peter Vaskovic).
Manuel Pégourié-Gonnard's avatar
Manuel Pégourié-Gonnard committed
88
   * Fix assembly selection for MIPS64 (thanks to James Cowgill).
89 90
   * ssl_get_verify_result() now works even if the handshake was aborted due
     to a failed verification (found by Fredrik Axelsson).
91 92 93 94
   * Skip writing and parsing signature_algorithm extension if none of the
     key exchanges enabled needs certificates. This fixes a possible interop
     issue with some servers when a zero-length extension was sent. (Reported
     by Peter Dettman.)
Manuel Pégourié-Gonnard's avatar
Manuel Pégourié-Gonnard committed
95 96
   * On a 0-length input, base64_encode() did not correctly set output length
     (found by Hendrik van den Boogaard).
97

98 99 100
Changes
   * Use deterministic nonces for AEAD ciphers in TLS by default (possible to
     switch back to random with POLARSSL_SSL_AEAD_RANDOM_IV in config.h).
101
   * Blind RSA private operations even when POLARSSL_RSA_NO_CRT is defined.
102
   * ssl_set_own_cert() now returns an error on key-certificate mismatch.
103
   * Forbid repeated extensions in X.509 certificates.
104
   * debug_print_buf() now prints a text view in addition to hexadecimal.
105 106
   * A specific error is now returned when there are ciphersuites in common
     but none of them is usable due to external factors such as no certificate
107
     with a suitable (extended)KeyUsage or curve or no PSK set.
108
   * It is now possible to disable negotiation of truncated HMAC server-side
109
     at runtime with ssl_set_truncated_hmac().
110 111
   * Example programs for SSL client and server now disable SSLv3 by default.
   * Example programs for SSL client and server now disable RC4 by default.
Manuel Pégourié-Gonnard's avatar
Manuel Pégourié-Gonnard committed
112
   * Use platform.h in all test suites and programs.
113

Paul Bakker's avatar
Paul Bakker committed
114
= PolarSSL 1.3.9 released 2014-10-20
115 116 117
Security
   * Lowest common hash was selected from signature_algorithms extension in
     TLS 1.2 (found by Darren Bane) (introduced in 1.3.8).
118
   * Remotely-triggerable memory leak when parsing some X.509 certificates
Paul Bakker's avatar
Paul Bakker committed
119 120
     (server is not affected if it doesn't ask for a client certificate)
     (found using Codenomicon Defensics).
121
   * Remotely-triggerable memory leak when parsing crafted ClientHello
Paul Bakker's avatar
Paul Bakker committed
122 123
     (not affected if ECC support was compiled out) (found using Codenomicon
     Defensics).
124

125 126
Bugfix
   * Support escaping of commas in x509_string_to_names()
127
   * Fix compile error in ssl_pthread_server (found by Julian Ospald).
128
   * Fix net_accept() regarding non-blocking sockets (found by Luca Pesce).
129
   * Don't print uninitialised buffer in ssl_mail_client (found by Marc Abel).
130
   * Fix warnings from Clang's scan-build (contributed by Alfred Klomp).
131 132
   * Fix compile error in timing.c when POLARSSL_NET_C and POLARSSL_SELFTEST
     are defined but not POLARSSL_HAVE_TIME (found by Stephane Di Vito).
133
   * Remove non-existent file from VS projects (found by Peter Vaskovic).
134 135
   * ssl_read() could return non-application data records on server while
     renegotation was pending, and on client when a HelloRequest was received.
136 137
   * Server-initiated renegotiation would fail with non-blocking I/O if the
     write callback returned WANT_WRITE when requesting renegotiation.
138 139
   * ssl_close_notify() could send more than one message in some circumstances
     with non-blocking I/O.
140
   * Fix compiler warnings on iOS (found by Sander Niemeijer).
141
   * x509_crt_parse() did not increase total_failed on PEM error
142
   * Fix compile error with armcc in mpi_is_prime()
143 144
   * Fix potential bad read in parsing ServerHello (found by Adrien
     Vialletelle).
145

146 147 148
Changes
   * Ciphersuites using SHA-256 or SHA-384 now require TLS 1.x (there is no
     standard defining how to use SHA-2 with SSL 3.0).
149 150
   * Ciphersuites using RSA-PSK key exchange new require TLS 1.x (the spec is
     ambiguous on how to encode some packets with SSL 3.0).
151 152
   * Made buffer size in pk_write_(pub)key_pem() more dynamic, eg smaller if
     RSA is disabled, larger if POLARSSL_MPI_MAX_SIZE is larger.
153 154
   * ssl_read() now returns POLARSSL_ERR_NET_WANT_READ rather than
     POLARSSL_ERR_SSL_UNEXPECTED_MESSAGE on harmless alerts.
155 156
   * POLARSSL_MPI_MAX_SIZE now defaults to 1024 in order to allow 8192 bits
     RSA keys.
157
   * Accept spaces at end of line or end of buffer in base64_decode().
158 159
   * X.509 certificates with more than one AttributeTypeAndValue per
     RelativeDistinguishedName are not accepted any more.
160

Paul Bakker's avatar
Paul Bakker committed
161
= PolarSSL 1.3.8 released 2014-07-11
162 163 164 165 166
Security
   * Fix length checking for AEAD ciphersuites (found by Codenomicon).
     It was possible to crash the server (and client) using crafted messages
     when a GCM suite was chosen.

Paul Bakker's avatar
Paul Bakker committed
167 168 169
Features
   * Add CCM module and cipher mode to Cipher Layer
   * Support for CCM and CCM_8 ciphersuites
170 171
   * Support for parsing and verifying RSASSA-PSS signatures in the X.509
     modules (certificates, CRLs and CSRs).
172
   * Blowfish in the cipher layer now supports variable length keys.
173 174
   * Add example config.h for PSK with CCM, optimized for low RAM usage.
   * Optimize for RAM usage in example config.h for NSA Suite B profile.
175 176
   * Add POLARSSL_REMOVE_ARC4_CIPHERSUITES to allow removing RC4 ciphersuites
     from the default list (inactive by default).
Paul Bakker's avatar
Paul Bakker committed
177 178
   * Add server-side enforcement of sent renegotiation requests
     (ssl_set_renegotiation_enforced())
179 180
   * Add SSL_CIPHERSUITES config.h flag to allow specifying a list of
     ciphersuites to use and save some memory if the list is small.
Paul Bakker's avatar
Paul Bakker committed
181

182 183 184
Changes
   * Add LINK_WITH_PTHREAD option in CMake for explicit linking that is
     required on some platforms (e.g. OpenBSD)
185 186
   * Migrate zeroizing of data to polarssl_zeroize() instead of memset()
     against unwanted compiler optimizations
187
   * md_list() now returns hashes strongest first
188 189
   * Selection of hash for signing ServerKeyExchange in TLS 1.2 now picks
     strongest offered by client.
Paul Bakker's avatar
Paul Bakker committed
190 191
   * All public contexts have _init() and _free() functions now for simpler
     usage pattern
192

Paul Bakker's avatar
Paul Bakker committed
193 194
Bugfix
   * Fix in debug_print_msg()
Paul Bakker's avatar
Paul Bakker committed
195
   * Enforce alignment in the buffer allocator even if buffer is not aligned
Paul Bakker's avatar
Paul Bakker committed
196
   * Remove less-than-zero checks on unsigned numbers
197 198
   * Stricter check on SSL ClientHello internal sizes compared to actual packet
     size (found by TrustInSoft)
199 200 201 202
   * Fix WSAStartup() return value check (found by Peter Vaskovic)
   * Other minor issues (found by Peter Vaskovic)
   * Fix symlink command for cross compiling with CMake (found by Andre
     Heinecke)
203
   * Fix DER output of gen_key app (found by Gergely Budai)
Manuel Pégourié-Gonnard's avatar
Manuel Pégourié-Gonnard committed
204
   * Very small records were incorrectly rejected when truncated HMAC was in
205 206
     use with some ciphersuites and versions (RC4 in all versions, CBC with
     versions < TLS 1.1).
Manuel Pégourié-Gonnard's avatar
Manuel Pégourié-Gonnard committed
207 208 209 210
   * Very large records using more than 224 bytes of padding were incorrectly
     rejected with CBC-based ciphersuites and TLS >= 1.1
   * Very large records using less padding could cause a buffer overread of up
     to 32 bytes with CBC-based ciphersuites and TLS >= 1.1
211 212
   * Restore ability to use a v1 cert as a CA if trusted locally. (This had
     been removed in 1.3.6.)
213 214 215
   * Restore ability to locally trust a self-signed cert that is not a proper
     CA for use as an end entity certificate. (This had been removed in
     1.3.6.)
216
   * Fix preprocessor checks for bn_mul PPC asm (found by Barry K. Nathan).
217 218
   * Use \n\t rather than semicolons for bn_mul asm, since some assemblers
     interpret semicolons as comment delimiters (found by Barry K. Nathan).
219 220
   * Fix off-by-one error in parsing Supported Point Format extension that
     caused some handshakes to fail.
221 222 223
   * Fix possible miscomputation of the premaster secret with DHE-PSK key
     exchange that caused some handshakes to fail with other implementations.
     (Failure rate <= 1/255 with common DHM moduli.)
224
   * Disable broken Sparc64 bn_mul assembly (found by Florian Obser).
225 226
   * Fix base64_decode() to return and check length correctly (in case of
     tight buffers)
227 228
   * Fix mpi_write_string() to write "00" as hex output for empty MPI (found
     by Hui Dong)
Paul Bakker's avatar
Paul Bakker committed
229

230
= PolarSSL 1.3.7 released on 2014-05-02
231
Features
232 233
   * debug_set_log_mode() added to determine raw or full logging
   * debug_set_threshold() added to ignore messages over threshold level
234 235
   * version_check_feature() added to check for compile-time options at
     run-time
236

237 238 239
Changes
   * POLARSSL_CONFIG_OPTIONS has been removed. All values are individually
     checked and filled in the relevant module headers
240
   * Debug module only outputs full lines instead of parts
241
   * Better support for the different Attribute Types from IETF PKIX (RFC 5280)
242
   * AES-NI now compiles with "old" assemblers too
243
   * Ciphersuites based on RC4 now have the lowest priority by default
244

Paul Bakker's avatar
Paul Bakker committed
245 246 247
Bugfix
   * Only iterate over actual certificates in ssl_write_certificate_request()
     (found by Matthew Page)
Paul Bakker's avatar
Paul Bakker committed
248 249
   * Typos in platform.c and pkcs11.c (found by Daniel Phillips and Steffan
     Karger)
250
   * cert_write app should use subject of issuer certificate as issuer of cert
251 252
   * Fix false reject in padding check in ssl_decrypt_buf() for CBC
     ciphersuites, for full SSL frames of data.
253 254
   * Improve interoperability by not writing extension length in ClientHello /
     ServerHello when no extensions are present (found by Matthew Page)
255
   * rsa_check_pubkey() now allows an E up to N
256
   * On OpenBSD, use arc4random_buf() instead of rand() to prevent warnings
257 258
   * mpi_fill_random() was creating numbers larger than requested on
     big-endian platform when size was not an integer number of limbs
259
   * Fix dependencies issues in X.509 test suite.
260
   * Some parts of ssl_tls.c were compiled even when the module was disabled.
261
   * Fix detection of DragonflyBSD in net.c (found by Markus Pfeiffer)
262 263
   * Fix detection of Clang on some Apple platforms with CMake
     (found by Barry K. Nathan)
Paul Bakker's avatar
Paul Bakker committed
264

Paul Bakker's avatar
Paul Bakker committed
265
= PolarSSL 1.3.6 released on 2014-04-11
266

267 268
Features
   * Support for the ALPN SSL extension
269
   * Add option 'use_dev_random' to gen_key application
270
   * Enable verification of the keyUsage extension for CA and leaf
271
     certificates (POLARSSL_X509_CHECK_KEY_USAGE)
272 273
   * Enable verification of the extendedKeyUsage extension
     (POLARSSL_X509_CHECK_EXTENDED_KEY_USAGE)
274

275 276
Changes
   * x509_crt_info() now prints information about parsed extensions as well
277 278
   * pk_verify() now returns a specific error code when the signature is valid
     but shorter than the supplied length.
279
   * Use UTC time to check certificate validity.
280
   * Reject certificates with times not in UTC, per RFC 5280.
281

282 283 284
Security
   * Avoid potential timing leak in ecdsa_sign() by blinding modular division.
     (Found by Watson Ladd.)
285 286 287 288
   * The notAfter date of some certificates was no longer checked since 1.3.5.
     This affects certificates in the user-supplied chain except the top
     certificate. If the user-supplied chain contains only one certificates,
     it is not affected (ie, its notAfter date is properly checked).
289 290
   * Prevent potential NULL pointer dereference in ssl_read_record() (found by
     TrustInSoft)
291

292 293
Bugfix
   * The length of various ClientKeyExchange messages was not properly checked.
294
   * Some example server programs were not sending the close_notify alert.
295 296
   * Potential memory leak in mpi_exp_mod() when error occurs during
     calculation of RR.
297
   * Fixed malloc/free default #define in platform.c (found by Gergely Budai).
298 299
   * Fixed type which made POLARSSL_ENTROPY_FORCE_SHA256 uneffective (found by
     Gergely Budai).
300 301
   * Fix #include path in ecdsa.h which wasn't accepted by some compilers.
     (found by Gergely Budai)
302 303
   * Fix compile errors when POLARSSL_ERROR_STRERROR_BC is undefined (found by
     Shuo Chen).
304 305
   * oid_get_numeric_string() used to truncate the output without returning an
     error if the output buffer was just 1 byte too small.
306
   * dhm_parse_dhm() (hence dhm_parse_dhmfile()) did not set dhm->len.
307 308
   * Calling pk_debug() on an RSA-alt key would segfault.
   * pk_get_size() and pk_get_len() were off by a factor 8 for RSA-alt keys.
309 310
   * Potential buffer overwrite in pem_write_buffer() because of low length
     indication (found by Thijs Alkemade)
311 312
   * EC curves constants, which should be only in ROM since 1.3.3, were also
     stored in RAM due to missing 'const's (found by Gergely Budai).
313

Paul Bakker's avatar
Paul Bakker committed
314
= PolarSSL 1.3.5 released on 2014-03-26
Paul Bakker's avatar
Paul Bakker committed
315 316
Features
   * HMAC-DRBG as a separate module
317
   * Option to set the Curve preference order (disabled by default)
318
   * Single Platform compatilibity layer (for memory / printf / fprintf)
319
   * Ability to provide alternate timing implementation
320 321
   * Ability to force the entropy module to use SHA-256 as its basis
     (POLARSSL_ENTROPY_FORCE_SHA256)
322 323
   * Testing script ssl-opt.sh added for testing 'live' ssl option
     interoperability against OpenSSL and PolarSSL
Manuel Pégourié-Gonnard's avatar
Manuel Pégourié-Gonnard committed
324
   * Support for reading EC keys that use SpecifiedECDomain in some cases.
325
   * Entropy module now supports seed writing and reading
326 327 328

Changes
   * Deprecated the Memory layer
329 330
   * entropy_add_source(), entropy_update_manual() and entropy_gather()
     now thread-safe if POLARSSL_THREADING_C defined
331
   * Improvements to the CMake build system, contributed by Julian Ospald.
332 333
   * Work around a bug of the version of Clang shipped by Apple with Mavericks
     that prevented bignum.c from compiling. (Reported by Rafael Baptista.)
334 335
   * Revamped the compat.sh interoperatibility script to include support for
     testing against GnuTLS
336
   * Deprecated ssl_set_own_cert_rsa() and ssl_set_own_cert_rsa_alt()
337
   * Improvements to tests/Makefile, contributed by Oden Eriksson.
Paul Bakker's avatar
Paul Bakker committed
338

339 340
Security
   * Forbid change of server certificate during renegotiation to prevent
341
     "triple handshake" attack when authentication mode is 'optional' (the
342
     attack was already impossible when authentication is required).
343
   * Check notBefore timestamp of certificates and CRLs from the future.
344
   * Forbid sequence number wrapping
345
   * Fixed possible buffer overflow with overlong PSK
346 347
   * Possible remotely-triggered out-of-bounds memory access fixed (found by
     TrustInSoft)
348

349 350 351
Bugfix
   * ecp_gen_keypair() does more tries to prevent failure because of
     statistics
352
   * Fixed bug in RSA PKCS#1 v1.5 "reversed" operations
353
   * Fixed testing with out-of-source builds using cmake
354
   * Fixed version-major intolerance in server
355
   * Fixed CMake symlinking on out-of-source builds
356
   * Fixed dependency issues in test suite
357
   * Programs rsa_sign_pss and rsa_verify_pss were not using PSS since 1.3.0
358 359
   * Bignum's MIPS-32 assembly was used on MIPS-64, causing chaos. (Found by
     Alex Wilson.)
360 361
   * ssl_cache was creating entries when max_entries=0 if TIMING_C was enabled.
   * m_sleep() was sleeping twice too long on most Unix platforms.
362
   * Fixed bug with session tickets and non-blocking I/O in the unlikely case
Paul Bakker's avatar
Paul Bakker committed
363
     send() would return an EAGAIN error when sending the ticket.
364
   * ssl_cache was leaking memory when reusing a timed out entry containing a
Paul Bakker's avatar
Paul Bakker committed
365
     client certificate.
366
   * ssl_srv was leaking memory when client presented a timed out ticket
Paul Bakker's avatar
Paul Bakker committed
367
     containing a client certificate
368 369
   * ssl_init() was leaving a dirty pointer in ssl_context if malloc of
     out_ctr failed
370 371
   * ssl_handshake_init() was leaving dirty pointers in subcontexts if malloc
     of one of them failed
372
   * Fix typo in rsa_copy() that impacted PKCS#1 v2 contexts
373
   * x509_get_current_time() uses localtime_r() to prevent thread issues
374

Paul Bakker's avatar
Paul Bakker committed
375
= PolarSSL 1.3.4 released on 2014-01-27
376
Features
377
   * Support for the Koblitz curves: secp192k1, secp224k1, secp256k1
Paul Bakker's avatar
Paul Bakker committed
378
   * Support for RIPEMD-160
Paul Bakker's avatar
Paul Bakker committed
379
   * Support for AES CFB8 mode
380
   * Support for deterministic ECDSA (RFC 6979)
381 382 383 384

Bugfix
   * Potential memory leak in bignum_selftest()
   * Replaced expired test certificate
385
   * ssl_mail_client now terminates lines with CRLF, instead of LF
386 387
   * net module handles timeouts on blocking sockets better (found by Tilman
     Sauerbeck)
388 389 390
   * Assembly format fixes in bn_mul.h

Security
391 392
   * Missing MPI_CHK calls added around unguarded mpi calls (found by
     TrustInSoft)
393

Paul Bakker's avatar
Paul Bakker committed
394
= PolarSSL 1.3.3 released on 2013-12-31
Paul Bakker's avatar
Paul Bakker committed
395 396
Features
   * EC key generation support in gen_key app
397 398
   * Support for adhering to client ciphersuite order preference
     (POLARSSL_SSL_SRV_RESPECT_CLIENT_PREFERENCE)
Paul Bakker's avatar
Paul Bakker committed
399
   * Support for Curve25519
400
   * Support for ECDH-RSA and ECDH-ECDSA key exchanges and ciphersuites
401
   * Support for IPv6 in the NET module
402
   * AES-NI support for AES, AES-GCM and AES key scheduling
403
   * SSL Pthread-based server example added (ssl_pthread_server)
Paul Bakker's avatar
Paul Bakker committed
404

405 406 407 408
Changes
   * gen_prime() speedup
   * Speedup of ECP multiplication operation
   * Relaxed some SHA2 ciphersuite's version requirements
409
   * Dropped use of readdir_r() instead of readdir() with threading support
410
   * More constant-time checks in the RSA module
411
   * Split off curves from ecp.c into ecp_curves.c
412
   * Curves are now stored fully in ROM
413
   * Memory usage optimizations in ECP module
414
   * Removed POLARSSL_THREADING_DUMMY
415

416
Bugfix
417
   * Fixed bug in mpi_set_bit() on platforms where t_uint is wider than int
418
   * Fixed X.509 hostname comparison (with non-regular characters)
419
   * SSL now gracefully handles missing RNG
420 421
   * Missing defines / cases for RSA_PSK key exchange
   * crypt_and_hash app checks MAC before final decryption
422
   * Potential memory leak in ssl_ticket_keys_init()
423
   * Memory leak in benchmark application
424
   * Fixed x509_crt_parse_path() bug on Windows platforms
425 426
   * Added missing MPI_CHK() around some statements in mpi_div_mpi() (found by
     TrustInSoft)
427 428
   * Fixed potential overflow in certificate size verification in
     ssl_write_certificate() (found by TrustInSoft)
429

430 431 432 433
Security
   * Possible remotely-triggered out-of-bounds memory access fixed (found by
     TrustInSoft)

Paul Bakker's avatar
Paul Bakker committed
434
= PolarSSL 1.3.2 released on 2013-11-04
Paul Bakker's avatar
Paul Bakker committed
435 436
Features
   * PK tests added to test framework
437
   * Added optional optimization for NIST MODP curves (POLARSSL_ECP_NIST_OPTIM)
438
   * Support for Camellia-GCM mode and ciphersuites
Paul Bakker's avatar
Paul Bakker committed
439

440 441
Changes
   * Padding checks in cipher layer are now constant-time
442
   * Value comparisons in SSL layer are now constant-time
443
   * Support for serialNumber, postalAddress and postalCode in X509 names
444
   * SSL Renegotiation was refactored
445

446
Bugfix
447
   * More stringent checks in cipher layer
448
   * Server does not send out extensions not advertised by client
449
   * Prevent possible alignment warnings on casting from char * to 'aligned *'
Paul Bakker's avatar
Paul Bakker committed
450
   * Misc fixes and additions to dependency checks
Paul Bakker's avatar
Paul Bakker committed
451
   * Const correctness
452
   * cert_write with selfsign should use issuer_name as subject_name
453
   * Fix ECDSA corner case: missing reduction mod N (found by DualTachyon)
454
   * Defines to handle UEFI environment under MSVC
455
   * Server-side initiated renegotiations send HelloRequest
456

Paul Bakker's avatar
Paul Bakker committed
457
= PolarSSL 1.3.1 released on 2013-10-15
458 459
Features
   * Support for Brainpool curves and TLS ciphersuites (RFC 7027)
Paul Bakker's avatar
Paul Bakker committed
460
   * Support for ECDHE-PSK key-exchange and ciphersuites
461
   * Support for RSA-PSK key-exchange and ciphersuites
462

Paul Bakker's avatar
Paul Bakker committed
463 464
Changes
   * RSA blinding locks for a smaller amount of time
465
   * TLS compression only allocates working buffer once
466
   * Introduced POLARSSL_HAVE_READDIR_R for systems without it
Paul Bakker's avatar
Paul Bakker committed
467
   * config.h is more script-friendly
Paul Bakker's avatar
Paul Bakker committed
468 469 470 471 472

Bugfix
   * Missing MSVC defines added
   * Compile errors with POLARSSL_RSA_NO_CRT
   * Header files with 'polarssl/'
Paul Bakker's avatar
Paul Bakker committed
473
   * Const correctness
474
   * Possible naming collision in dhm_context
Paul Bakker's avatar
Paul Bakker committed
475
   * Better support for MSVC
476
   * threading_set_alt() name
477
   * Added missing x509write_crt_set_version()
Paul Bakker's avatar
Paul Bakker committed
478

Paul Bakker's avatar
Paul Bakker committed
479
= PolarSSL 1.3.0 released on 2013-10-01
480 481 482 483 484
Features
   * Elliptic Curve Cryptography module added
   * Elliptic Curve Diffie Hellman module added
   * Ephemeral Elliptic Curve Diffie Hellman support for SSL/TLS
    (ECDHE-based ciphersuites)
485 486
   * Ephemeral Elliptic Curve Digital Signature Algorithm support for SSL/TLS
    (ECDSA-based ciphersuites)
487
   * Ability to specify allowed ciphersuites based on the protocol version.
488
   * PSK and DHE-PSK based ciphersuites added
489 490
   * Memory allocation abstraction layer added
   * Buffer-based memory allocator added (no malloc() / free() / HEAP usage)
491
   * Threading abstraction layer added (dummy / pthread / alternate)
Paul Bakker's avatar
Paul Bakker committed
492
   * Public Key abstraction layer added
493 494 495 496
   * Parsing Elliptic Curve keys
   * Parsing Elliptic Curve certificates
   * Support for max_fragment_length extension (RFC 6066)
   * Support for truncated_hmac extension (RFC 6066)
497 498
   * Support for zeros-and-length (ANSI X.923) padding, one-and-zeros
     (ISO/IEC 7816-4) padding and zero padding in the cipher layer
499
   * Support for session tickets (RFC 5077)
500 501
   * Certificate Request (CSR) generation with extensions (key_usage,
     ns_cert_type)
502 503
   * X509 Certificate writing with extensions (basic_constraints,
     issuer_key_identifier, etc)
Paul Bakker's avatar
Paul Bakker committed
504
   * Optional blinding for RSA, DHM and EC
505 506
   * Support for multiple active certificate / key pairs in SSL servers for
   	 the same host (Not to be confused with SNI!)
507

508
Changes
509 510
   * Ability to enable / disable SSL v3 / TLS 1.0 / TLS 1.1 / TLS 1.2
     individually
511 512
   * Introduced separate SSL Ciphersuites module that is based on
     Cipher and MD information
513 514
   * Internals for SSL module adapted to have separate IV pointer that is
     dynamically set (Better support for hardware acceleration)
515 516
   * Moved all OID functionality to a separate module. RSA function
     prototypes for the RSA sign and verify functions changed as a result
517
   * Split up the GCM module into a starts/update/finish cycle
518 519
   * Client and server now filter sent and accepted ciphersuites on minimum
     and maximum protocol version
520
   * Ability to disable server_name extension (RFC 6066)
521 522
   * Renamed error_strerror() to the less conflicting polarssl_strerror()
     (Ability to keep old as well with POLARSSL_ERROR_STRERROR_BC)
523
   * SHA2 renamed to SHA256, SHA4 renamed to SHA512 and functions accordingly
524
   * All RSA operations require a random generator for blinding purposes
525 526
   * X509 core refactored
   * x509_crt_verify() now case insensitive for cn (RFC 6125 6.4)
Paul Bakker's avatar
Paul Bakker committed
527
   * Also compiles / runs without time-based functions (!POLARSSL_HAVE_TIME)
528 529
   * Support faulty X509 v1 certificates with extensions
     (POLARSSL_X509_ALLOW_EXTENSIONS_NON_V3)
530

531
Bugfix
532
   * Fixed parse error in ssl_parse_certificate_request()
533
   * zlib compression/decompression skipped on empty blocks
534
   * Support for AIX header locations in net.c module
535
   * Fixed file descriptor leaks
536

537 538 539 540
Security
   * RSA blinding on CRT operations to counter timing attacks
     (found by Cyril Arnaud and Pierre-Alain Fouque)

541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567
= Version 1.2.12 released 2014-10-24

Security
   * Remotely-triggerable memory leak when parsing some X.509 certificates
     (server is not affected if it doesn't ask for a client certificate).
     (Found using Codenomicon Defensics.)

Bugfix
   * Fix potential bad read in parsing ServerHello (found by Adrien
     Vialletelle).
   * ssl_close_notify() could send more than one message in some circumstances
     with non-blocking I/O.
   * x509_crt_parse() did not increase total_failed on PEM error
   * Fix compiler warnings on iOS (found by Sander Niemeijer).
   * Don't print uninitialised buffer in ssl_mail_client (found by Marc Abel).
   * Fix net_accept() regarding non-blocking sockets (found by Luca Pesce).
   * ssl_read() could return non-application data records on server while
     renegotation was pending, and on client when a HelloRequest was received.
   * Fix warnings from Clang's scan-build (contributed by Alfred Klomp).

Changes
   * X.509 certificates with more than one AttributeTypeAndValue per
     RelativeDistinguishedName are not accepted any more.
   * ssl_read() now returns POLARSSL_ERR_NET_WANT_READ rather than
     POLARSSL_ERR_SSL_UNEXPECTED_MESSAGE on harmless alerts.
   * Accept spaces at end of line or end of buffer in base64_decode().

Paul Bakker's avatar
Paul Bakker committed
568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637
= Version 1.2.11 released 2014-07-11
Features
   * Entropy module now supports seed writing and reading

Changes
   * Introduced POLARSSL_HAVE_READDIR_R for systems without it
   * Improvements to the CMake build system, contributed by Julian Ospald.
   * Work around a bug of the version of Clang shipped by Apple with Mavericks
     that prevented bignum.c from compiling. (Reported by Rafael Baptista.)
   * Improvements to tests/Makefile, contributed by Oden Eriksson.
   * Use UTC time to check certificate validity.
   * Reject certificates with times not in UTC, per RFC 5280.
   * Migrate zeroizing of data to polarssl_zeroize() instead of memset()
     against unwanted compiler optimizations

Security
   * Forbid change of server certificate during renegotiation to prevent
     "triple handshake" attack when authentication mode is optional (the
     attack was already impossible when authentication is required).
   * Check notBefore timestamp of certificates and CRLs from the future.
   * Forbid sequence number wrapping
   * Prevent potential NULL pointer dereference in ssl_read_record() (found by
     TrustInSoft)
   * Fix length checking for AEAD ciphersuites (found by Codenomicon).
     It was possible to crash the server (and client) using crafted messages
     when a GCM suite was chosen.

Bugfix
   * Fixed X.509 hostname comparison (with non-regular characters)
   * SSL now gracefully handles missing RNG
   * crypt_and_hash app checks MAC before final decryption
   * Fixed x509_crt_parse_path() bug on Windows platforms
   * Added missing MPI_CHK() around some statements in mpi_div_mpi() (found by
     TrustInSoft)
   * Fixed potential overflow in certificate size verification in
     ssl_write_certificate() (found by TrustInSoft)
   * Fix ASM format in bn_mul.h
   * Potential memory leak in bignum_selftest()
   * Replaced expired test certificate
   * ssl_mail_client now terminates lines with CRLF, instead of LF
   * Fix bug in RSA PKCS#1 v1.5 "reversed" operations
   * Fixed testing with out-of-source builds using cmake
   * Fixed version-major intolerance in server
   * Fixed CMake symlinking on out-of-source builds
   * Bignum's MIPS-32 assembly was used on MIPS-64, causing chaos. (Found by
     Alex Wilson.)
   * ssl_init() was leaving a dirty pointer in ssl_context if malloc of
     out_ctr failed
   * ssl_handshake_init() was leaving dirty pointers in subcontexts if malloc
     of one of them failed
   * x509_get_current_time() uses localtime_r() to prevent thread issues
   * Some example server programs were not sending the close_notify alert.
   * Potential memory leak in mpi_exp_mod() when error occurs during
     calculation of RR.
   * Improve interoperability by not writing extension length in ClientHello
     when no extensions are present (found by Matthew Page)
   * rsa_check_pubkey() now allows an E up to N
   * On OpenBSD, use arc4random_buf() instead of rand() to prevent warnings
   * mpi_fill_random() was creating numbers larger than requested on
     big-endian platform when size was not an integer number of limbs
   * Fix detection of DragonflyBSD in net.c (found by Markus Pfeiffer)
   * Stricter check on SSL ClientHello internal sizes compared to actual packet
     size (found by TrustInSoft)
   * Fix preprocessor checks for bn_mul PPC asm (found by Barry K. Nathan).
   * Use \n\t rather than semicolons for bn_mul asm, since some assemblers
     interpret semicolons as comment delimiters (found by Barry K. Nathan).
   * Disable broken Sparc64 bn_mul assembly (found by Florian Obser).
   * Fix base64_decode() to return and check length correctly (in case of
     tight buffers)

Paul Bakker's avatar
Paul Bakker committed
638 639 640 641 642 643 644 645 646
= Version 1.2.10 released 2013-10-07
Changes
   * Changed RSA blinding to a slower but thread-safe version

Bugfix
   * Fixed memory leak in RSA as a result of introduction of blinding
   * Fixed ssl_pkcs11_decrypt() prototype
   * Fixed MSVC project files

Paul Bakker's avatar
Paul Bakker committed
647
= Version 1.2.9 released 2013-10-01
Paul Bakker's avatar
Paul Bakker committed
648 649 650 651 652 653 654 655 656 657 658 659 660 661
Changes
   * x509_verify() now case insensitive for cn (RFC 6125 6.4)

Bugfix
   * Fixed potential memory leak when failing to resume a session
   * Fixed potential file descriptor leaks (found by Remi Gacogne)
   * Minor fixes

Security
   * Fixed potential heap buffer overflow on large hostname setting
   * Fixed potential negative value misinterpretation in load_file()
   * RSA blinding on CRT operations to counter timing attacks
     (found by Cyril Arnaud and Pierre-Alain Fouque)

662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709
= Version 1.2.8 released 2013-06-19
Features
   * Parsing of PKCS#8 encrypted private key files
   * PKCS#12 PBE and derivation functions
   * Centralized module option values in config.h to allow user-defined
     settings without editing header files by using POLARSSL_CONFIG_OPTIONS

Changes
   * HAVEGE random generator disabled by default
   * Internally split up x509parse_key() into a (PEM) handler function
     and specific DER parser functions for the PKCS#1 and unencrypted
     PKCS#8 private key formats
   * Added mechanism to provide alternative implementations for all
     symmetric cipher and hash algorithms (e.g. POLARSSL_AES_ALT in
	 config.h)
   * PKCS#5 module added. Moved PBKDF2 functionality inside and deprecated
     old PBKDF2 module

Bugfix
   * Secure renegotiation extension should only be sent in case client
     supports secure renegotiation
   * Fixed offset for cert_type list in ssl_parse_certificate_request()
   * Fixed const correctness issues that have no impact on the ABI
   * x509parse_crt() now better handles PEM error situations
   * ssl_parse_certificate() now calls x509parse_crt_der() directly
     instead of the x509parse_crt() wrapper that can also parse PEM
	 certificates
   * x509parse_crtpath() is now reentrant and uses more portable stat()
   * Fixed bignum.c and bn_mul.h to support Thumb2 and LLVM compiler
   * Fixed values for 2-key Triple DES in cipher layer
   * ssl_write_certificate_request() can handle empty ca_chain

Security
   * A possible DoS during the SSL Handshake, due to faulty parsing of
     PEM-encoded certificates has been fixed (found by Jack Lloyd)

= Version 1.2.7 released 2013-04-13
Features
   * Ability to specify allowed ciphersuites based on the protocol version.

Changes
   * Default Blowfish keysize is now 128-bits
   * Test suites made smaller to accommodate Raspberry Pi

Bugfix
   * Fix for MPI assembly for ARM
   * GCM adapted to support sizes > 2^29

710
= Version 1.2.6 released 2013-03-11
711 712
Bugfix
   * Fixed memory leak in ssl_free() and ssl_reset() for active session
713 714
   * Corrected GCM counter incrementation to use only 32-bits instead of
     128-bits (found by Yawning Angel)
715
   * Fixes for 64-bit compilation with MS Visual Studio
716
   * Fixed net_bind() for specified IP addresses on little endian systems
717
   * Fixed assembly code for ARM (Thumb and regular) for some compilers
718

719 720 721 722
Changes
   * Internally split up rsa_pkcs1_encrypt(), rsa_pkcs1_decrypt(),
     rsa_pkcs1_sign() and rsa_pkcs1_verify() to separate PKCS#1 v1.5 and
     PKCS#1 v2.1 functions
723 724
   * Added support for custom labels when using rsa_rsaes_oaep_encrypt()
     or rsa_rsaes_oaep_decrypt()
725 726
   * Re-added handling for SSLv2 Client Hello when the define
     POLARSSL_SSL_SRV_SUPPORT_SSLV2_CLIENT_HELLO is set
727 728
   * The SSL session cache module (ssl_cache) now also retains peer_cert
     information (not the entire chain)
729

730 731 732
Security
   * Removed further timing differences during SSL message decryption in
     ssl_decrypt_buf()
733 734 735
   * Removed timing differences due to bad padding from
     rsa_rsaes_pkcs1_v15_decrypt() and rsa_pkcs1_decrypt() for PKCS#1 v1.5
     operations
736

Paul Bakker's avatar
Paul Bakker committed
737
= Version 1.2.5 released 2013-02-02
738 739
Changes
   * Allow enabling of dummy error_strerror() to support some use-cases
740 741
   * Debug messages about padding errors during SSL message decryption are
     disabled by default and can be enabled with POLARSSL_SSL_DEBUG_ALL 
742 743
   * Sending of security-relevant alert messages that do not break
     interoperability can be switched on/off with the flag
Paul Bakker's avatar
Paul Bakker committed
744
     POLARSSL_SSL_ALL_ALERT_MESSAGES
745

746 747 748 749
Security
   * Removed timing differences during SSL message decryption in
     ssl_decrypt_buf() due to badly formatted padding

Paul Bakker's avatar
Paul Bakker committed
750
= Version 1.2.4 released 2013-01-25
751
Changes
752 753
   * More advanced SSL ciphersuite representation and moved to more dynamic
     SSL core
754 755
   * Added ssl_handshake_step() to allow single stepping the handshake process

756 757
Bugfix
   * Memory leak when using RSA_PKCS_V21 operations fixed
758
   * Handle future version properly in ssl_write_certificate_request()
759 760
   * Correctly handle CertificateRequest message in client for <= TLS 1.1
     without DN list
761

Paul Bakker's avatar
Paul Bakker committed
762 763 764 765
= Version 1.2.3 released 2012-11-26
Bugfix
   * Server not always sending correct CertificateRequest message

Paul Bakker's avatar
Paul Bakker committed
766
= Version 1.2.2 released 2012-11-24
767 768 769
Changes
   * Added p_hw_data to ssl_context for context specific hardware acceleration
     data
Paul Bakker's avatar
Paul Bakker committed
770
   * During verify trust-CA is only checked for expiration and CRL presence  
771

772
Bugfixes
Paul Bakker's avatar
Paul Bakker committed
773 774
   * Fixed client authentication compatibility
   * Fixed dependency on POLARSSL_SHA4_C in SSL modules
775

Paul Bakker's avatar
Paul Bakker committed
776
= Version 1.2.1 released 2012-11-20
777 778 779 780
Changes
   * Depth that the certificate verify callback receives is now numbered
     bottom-up (Peer cert depth is 0)

Paul Bakker's avatar
Paul Bakker committed
781 782
Bugfixes
   * Fixes for MSVC6
783
   * Moved mpi_inv_mod() outside POLARSSL_GENPRIME
784 785
   * Allow R and A to point to same mpi in mpi_div_mpi (found by Manuel
     Pégourié-Gonnard)
786 787
   * Fixed possible segfault in mpi_shift_r() (found by Manuel
     Pégourié-Gonnard)
788
   * Added max length check for rsa_pkcs1_sign with PKCS#1 v2.1
Paul Bakker's avatar
Paul Bakker committed
789

Paul Bakker's avatar
Paul Bakker committed
790
= Version 1.2.0 released 2012-10-31
791 792 793 794
Features
   * Added support for NULL cipher (POLARSSL_CIPHER_NULL_CIPHER) and weak
     ciphersuites (POLARSSL_ENABLE_WEAK_CIPHERSUITES). They are disabled by
     default!
795 796 797
   * Added support for wildcard certificates
   * Added support for multi-domain certificates through the X509 Subject
     Alternative Name extension
798 799 800 801
   * Added preliminary ASN.1 buffer writing support
   * Added preliminary X509 Certificate Request writing support
   * Added key_app_writer example application
   * Added cert_req example application
802
   * Added base Galois Counter Mode (GCM) for AES
803
   * Added TLS 1.2 support (RFC 5246)
804
   * Added GCM suites to TLS 1.2 (RFC 5288)
805
   * Added commandline error code convertor (util/strerror)
806
   * Added support for Hardware Acceleration hooking in SSL/TLS
807
   * Added OpenSSL / PolarSSL compatibility script (tests/compat.sh) and
Paul Bakker's avatar
Paul Bakker committed
808
     example application (programs/ssl/o_p_test) (requires OpenSSL)
Paul Bakker's avatar
Paul Bakker committed
809
   * Added X509 CA Path support
810
   * Added Thumb assembly optimizations
811
   * Added DEFLATE compression support as per RFC3749 (requires zlib)
812
   * Added blowfish algorithm (Generic and cipher layer)
813
   * Added PKCS#5 PBKDF2 key derivation function
814
   * Added Secure Renegotiation (RFC 5746)
815
   * Added predefined DHM groups from RFC 5114
816
   * Added simple SSL session cache implementation
817
   * Added ServerName extension parsing (SNI) at server side
818
   * Added option to add minimum accepted SSL/TLS protocol version
819

820 821
Changes
   * Removed redundant POLARSSL_DEBUG_MSG define
822
   * AES code only check for Padlock once
823 824
   * Fixed const-correctness mpi_get_bit()
   * Documentation for mpi_lsb() and mpi_msb()
825
   * Moved out_msg to out_hdr + 32 to support hardware acceleration
826
   * Changed certificate verify behaviour to comply with RFC 6125 section 6.3
Paul Bakker's avatar
Paul Bakker committed
827
     to not match CN if subjectAltName extension is present (Closes ticket #56)
828 829