Skip to content

Commit

Permalink
Merge pull request #1413 from JacobBarthelmeh/Release
Browse files Browse the repository at this point in the history
bump version to 3.14.0
  • Loading branch information
toddouska authored Mar 2, 2018
2 parents 48cd280 + 922d65d commit a82dc1a
Show file tree
Hide file tree
Showing 5 changed files with 99 additions and 7 deletions.
43 changes: 43 additions & 0 deletions README
Original file line number Diff line number Diff line change
Expand Up @@ -75,6 +75,49 @@ before calling wolfSSL_new(); Though it's not recommended.
*** end Notes ***


********* wolfSSL Release 3.14.0 (3/02/2018)

Release 3.14.0 of wolfSSL embedded TLS has bug fixes and new features including:

- TLS 1.3 draft 22 and 23 support added
- Additional unit tests for; SHA3, AES-CMAC, Ed25519, ECC, RSA-PSS, AES-GCM
- Many additions to the OpenSSL compatibility layer were made in this release. Some of these being enhancements to PKCS12, WOLFSSL_X509 use, WOLFSSL_EVP_PKEY, and WOLFSSL_BIO operations
- AVX1 and AVX2 performance improvements with ChaCha20 and Poly1305
- Added i.MX CAAM driver support with Integrity OS support
- Improvements to logging with debugging, including exposing more API calls and adding options to reduce debugging code size
- Fix for signature type detection with PKCS7 RSA SignedData
- Public key call back functions added for DH Agree
- RSA-PSS API added for operating on non inline buffers (separate input and output buffers)
- API added for importing and exporting raw DSA parameters
- Updated DSA key generation to be FIPS 186-4 compliant
- Fix for wolfSSL_check_private_key when comparing ECC keys
- Support for AES Cipher Feedback(CFB) mode added
- Updated RSA key generation to be FIPS 186-4 compliant
- Update added for the ARM CMSIS software pack
- WOLFSSL_IGNORE_FILE_WARN macro added for avoiding build warnings when not working with autotools
- Performance improvements for AES-GCM with AVX1 and AVX2
- Fix for possible memory leak on error case with wc_RsaKeyToDer function
- Make wc_PKCS7_PadData function available
- Updates made to building SGX on Linux
- STM32 hashing algorithm improvements including clock/power optimizations and auto detection of if SHA2 is supported
- Update static memory feature for FREERTOS use
- Reverse the order that certificates are compared during PKCS12 parse to account for case where multiple certificates have the same matching private key
- Update NGINX port to version 1.13.8
- Support for HMAC-SHA3 added
- Added stricter ASN checks to enforce RFC 5280 rules. Thanks to the report from Professor Zhenhua Duan, Professor Cong Tian, and Ph.D candidate Chu Chen from Institute of Computing Theory and Technology (ICTT) of Xidian University.
- Option to have ecc_mul2add function public facing
- Getter function wc_PKCS7_GetAttributeValue added for PKCS7 attributes
- Macros NO_AES_128, NO_AES_192, NO_AES_256 added for AES key size selection at compile time
- Support for writing multiple organizations units (OU) and domain components (DC) with CSR and certificate creation
- Support for indefinite length BER encodings in PKCS7
- Added API for additional validation of prime q in a public DH key
- Added support for RSA encrypt and decrypt without padding


See INSTALL file for build instructions.
More info can be found on-line at http://wolfssl.com/wolfSSL/Docs.html


********* wolfSSL (Formerly CyaSSL) Release 3.13.0 (12/21/2017)

wolfSSL 3.13.0 includes bug fixes and new features, including support for
Expand Down
43 changes: 43 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -66,6 +66,49 @@ wolfSSL_CTX_set_verify(ctx, SSL_VERIFY_NONE, 0);
before calling wolfSSL_new(); Though it's not recommended.
```

# wolfSSL Release 3.14.0 (3/02/2018)

Release 3.14.0 of wolfSSL embedded TLS has bug fixes and new features including:

* TLS 1.3 draft 22 and 23 support added
* Additional unit tests for; SHA3, AES-CMAC, Ed25519, ECC, RSA-PSS, AES-GCM
* Many additions to the OpenSSL compatibility layer were made in this release. Some of these being enhancements to PKCS12, WOLFSSL_X509 use, WOLFSSL_EVP_PKEY, and WOLFSSL_BIO operations
* AVX1 and AVX2 performance improvements with ChaCha20 and Poly1305
* Added i.MX CAAM driver support with Integrity OS support
* Improvements to logging with debugging, including exposing more API calls and adding options to reduce debugging code size
* Fix for signature type detection with PKCS7 RSA SignedData
* Public key call back functions added for DH Agree
* RSA-PSS API added for operating on non inline buffers (separate input and output buffers)
* API added for importing and exporting raw DSA parameters
* Updated DSA key generation to be FIPS 186-4 compliant
* Fix for wolfSSL_check_private_key when comparing ECC keys
* Support for AES Cipher Feedback(CFB) mode added
* Updated RSA key generation to be FIPS 186-4 compliant
* Update added for the ARM CMSIS software pack
* WOLFSSL_IGNORE_FILE_WARN macro added for avoiding build warnings when not working with autotools
* Performance improvements for AES-GCM with AVX1 and AVX2
* Fix for possible memory leak on error case with wc_RsaKeyToDer function
* Make wc_PKCS7_PadData function available
* Updates made to building SGX on Linux
* STM32 hashing algorithm improvements including clock/power optimizations and auto detection of if SHA2 is supported
* Update static memory feature for FREERTOS use
* Reverse the order that certificates are compared during PKCS12 parse to account for case where multiple certificates have the same matching private key
* Update NGINX port to version 1.13.8
* Support for HMAC-SHA3 added
* Added stricter ASN checks to enforce RFC 5280 rules. Thanks to the report from Professor Zhenhua Duan, Professor Cong Tian, and Ph.D candidate Chu Chen from Institute of Computing Theory and Technology (ICTT) of Xidian University.
* Option to have ecc_mul2add function public facing
* Getter function wc_PKCS7_GetAttributeValue added for PKCS7 attributes
* Macros NO_AES_128, NO_AES_192, NO_AES_256 added for AES key size selection at compile time
* Support for writing multiple organizations units (OU) and domain components (DC) with CSR and certificate creation
* Support for indefinite length BER encodings in PKCS7
* Added API for additional validation of prime q in a public DH key
* Added support for RSA encrypt and decrypt without padding


See INSTALL file for build instructions.
More info can be found on-line at http://wolfssl.com/wolfSSL/Docs.html


# wolfSSL (Formerly CyaSSL) Release 3.13.0 (12/21/2017)

wolfSSL 3.13.0 includes bug fixes and new features, including support for
Expand Down
4 changes: 2 additions & 2 deletions configure.ac
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@
#
#

AC_INIT([wolfssl],[3.13.0],[https://github.com/wolfssl/wolfssl/issues],[wolfssl],[http://www.wolfssl.com])
AC_INIT([wolfssl],[3.14.0],[https://github.com/wolfssl/wolfssl/issues],[wolfssl],[http://www.wolfssl.com])

AC_CONFIG_AUX_DIR([build-aux])

Expand Down Expand Up @@ -35,7 +35,7 @@ AC_CONFIG_MACRO_DIR([m4])
AC_CONFIG_HEADERS([config.h:config.in])dnl Keep filename to 8.3 for MS-DOS.

#shared library versioning
WOLFSSL_LIBRARY_VERSION=15:0:0
WOLFSSL_LIBRARY_VERSION=16:0:0
# | | |
# +------+ | +---+
# | | |
Expand Down
12 changes: 9 additions & 3 deletions rpm/spec.in
Original file line number Diff line number Diff line change
Expand Up @@ -69,11 +69,12 @@ mkdir -p $RPM_BUILD_ROOT/
%{_docdir}/wolfssl/example/sctp-server.c
%{_docdir}/wolfssl/example/sctp-client-dtls.c
%{_docdir}/wolfssl/example/sctp-server-dtls.c
%{_docdir}/wolfssl/example/tls_bench.c
%{_docdir}/wolfssl/README.txt
%{_libdir}/libwolfssl.la
%{_libdir}/libwolfssl.so
%{_libdir}/libwolfssl.so.15
%{_libdir}/libwolfssl.so.15.0.0
%{_libdir}/libwolfssl.so.16
%{_libdir}/libwolfssl.so.16.0.0

%files devel
%defattr(-,root,root,-)
Expand Down Expand Up @@ -196,6 +197,7 @@ mkdir -p $RPM_BUILD_ROOT/
%{_includedir}/wolfssl/wolfcrypt/ed25519.h
%{_includedir}/wolfssl/wolfcrypt/error-crypt.h
%{_includedir}/wolfssl/wolfcrypt/fe_operations.h
%{_includedir}/wolfssl/wolfcrypt/fips.h
%{_includedir}/wolfssl/wolfcrypt/fips_test.h
%{_includedir}/wolfssl/wolfcrypt/ge_operations.h
%{_includedir}/wolfssl/wolfcrypt/hash.h
Expand All @@ -221,7 +223,6 @@ mkdir -p $RPM_BUILD_ROOT/
%{_includedir}/wolfssl/wolfcrypt/random.h
%{_includedir}/wolfssl/wolfcrypt/ripemd.h
%{_includedir}/wolfssl/wolfcrypt/rsa.h
%{_includedir}/wolfssl/wolfcrypt/selftest.h
%{_includedir}/wolfssl/wolfcrypt/settings.h
%{_includedir}/wolfssl/wolfcrypt/signature.h
%{_includedir}/wolfssl/wolfcrypt/sha.h
Expand All @@ -241,6 +242,7 @@ mkdir -p $RPM_BUILD_ROOT/
%{_includedir}/wolfssl/openssl/asn1.h
%{_includedir}/wolfssl/openssl/bio.h
%{_includedir}/wolfssl/openssl/bn.h
%{_includedir}/wolfssl/openssl/buffer.h
%{_includedir}/wolfssl/openssl/conf.h
%{_includedir}/wolfssl/openssl/crypto.h
%{_includedir}/wolfssl/openssl/des.h
Expand All @@ -259,12 +261,14 @@ mkdir -p $RPM_BUILD_ROOT/
%{_includedir}/wolfssl/openssl/md4.h
%{_includedir}/wolfssl/openssl/md5.h
%{_includedir}/wolfssl/openssl/ocsp.h
%{_includedir}/wolfssl/openssl/objects.h
%{_includedir}/wolfssl/openssl/opensslconf.h
%{_includedir}/wolfssl/openssl/opensslv.h
%{_includedir}/wolfssl/openssl/ossl_typ.h
%{_includedir}/wolfssl/openssl/pem.h
%{_includedir}/wolfssl/openssl/pkcs12.h
%{_includedir}/wolfssl/openssl/rand.h
%{_includedir}/wolfssl/openssl/rc4.h
%{_includedir}/wolfssl/openssl/ripemd.h
%{_includedir}/wolfssl/openssl/rsa.h
%{_includedir}/wolfssl/openssl/sha.h
Expand All @@ -283,6 +287,8 @@ mkdir -p $RPM_BUILD_ROOT/
%{_libdir}/pkgconfig/wolfssl.pc

%changelog
* Fri Mar 02 2018 Jacob Barthelmeh <[email protected]>
- Added headder files fips.h, buffer.h, objects.h, rc4.h and example tls_bench.c
* Fri Sep 08 2017 Jacob Barthelmeh <[email protected]>
- Change name for header wolfssl/io.h to wolfssl/wolfio.h
* Fri Aug 04 2017 Jacob Barthelmeh <[email protected]>
Expand Down
4 changes: 2 additions & 2 deletions wolfssl/version.h
Original file line number Diff line number Diff line change
Expand Up @@ -28,8 +28,8 @@
extern "C" {
#endif

#define LIBWOLFSSL_VERSION_STRING "3.13.0"
#define LIBWOLFSSL_VERSION_HEX 0x03013000
#define LIBWOLFSSL_VERSION_STRING "3.14.0"
#define LIBWOLFSSL_VERSION_HEX 0x03014000

#ifdef __cplusplus
}
Expand Down

0 comments on commit a82dc1a

Please sign in to comment.