From 97693942942fa7f594e034d255f87d209e0d8eef74203aa8066d6f22e385f9d9 Mon Sep 17 00:00:00 2001 From: Martin Pluskal Date: Mon, 7 Jan 2019 15:23:33 +0000 Subject: [PATCH] - Update to version 2.16.0: OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=6 --- mbedtls-2.14.1-apache.tgz | 3 --- mbedtls-2.16.0-apache.tgz | 3 +++ mbedtls.changes | 21 +++++++++++++++++++++ mbedtls.spec | 4 ++-- 4 files changed, 26 insertions(+), 5 deletions(-) delete mode 100644 mbedtls-2.14.1-apache.tgz create mode 100644 mbedtls-2.16.0-apache.tgz diff --git a/mbedtls-2.14.1-apache.tgz b/mbedtls-2.14.1-apache.tgz deleted file mode 100644 index 62e3398..0000000 --- a/mbedtls-2.14.1-apache.tgz +++ /dev/null @@ -1,3 +0,0 @@ -version https://git-lfs.github.com/spec/v1 -oid sha256:f189cbd58c9b1933e4e4460b592664447f3694ad2de882a1332d177e8eedc61d -size 2468132 diff --git a/mbedtls-2.16.0-apache.tgz b/mbedtls-2.16.0-apache.tgz new file mode 100644 index 0000000..ed9a9a1 --- /dev/null +++ b/mbedtls-2.16.0-apache.tgz @@ -0,0 +1,3 @@ +version https://git-lfs.github.com/spec/v1 +oid sha256:e3dab56e9093c790b7d5e0f7eb19451010fe680649d25cf1dcca9d5441669ae2 +size 2506425 diff --git a/mbedtls.changes b/mbedtls.changes index 1ba0371..3c03b28 100644 --- a/mbedtls.changes +++ b/mbedtls.changes @@ -1,3 +1,24 @@ +------------------------------------------------------------------- +Mon Jan 7 15:18:11 UTC 2019 - Martin Pluskal + +- Update to version 2.16.0: + Features + * Add a new config.h option of MBEDTLS_CHECK_PARAMS that enables validation of parameters in the API. This allows detection of obvious misuses of the API, such as passing NULL pointers. The API of existing functions hasn't changed, but requirements on parameters have been made more explicit in the documentation. See the corresponding API documentation for each function to see for which parameter values it is defined. This feature is disabled by default. See its API documentation in config.h for additional steps you have to take when enabling it. +API Changes + * The following functions in the random generator modules have been deprecated and replaced as shown below. The new functions change the return type from void to int to allow returning error codes when using MBEDTLS__ALT for the underlying AES or message digest primitive. Fixes #1798. mbedtls_ctr_drbg_update() -> mbedtls_ctr_drbg_update_ret() mbedtls_hmac_drbg_update() -> mbedtls_hmac_drbg_update_ret() + * Extend ECDH interface to enable alternative implementations. + * Deprecate error codes of the form MBEDTLS_ERR_xxx_INVALID_KEY_LENGTH for ARIA, CAMELLIA and Blowfish. These error codes will be replaced by the more generic per-module error codes MBEDTLS_ERR_xxx_BAD_INPUT_DATA. + * Additional parameter validation checks have been added for the following modules - AES, ARIA, Blowfish, CAMELLIA, CCM, GCM, DHM, ECP, ECDSA, ECDH, ECJPAKE, SHA, Chacha20 and Poly1305, cipher, pk, RSA, and MPI. Where modules have had parameter validation added, existing parameter checks may have changed. Some modules, such as Chacha20 had existing parameter validation whereas other modules had little. This has now been changed so that the same level of validation is present in all modules, and that it is now optional with the MBEDTLS_CHECK_PARAMS flag which by default is off. That means that checks which were previously present by default will no longer be. + New deprecations + * Deprecate mbedtls_ctr_drbg_update() and mbedtls_hmac_drbg_update() in favor of functions that can return an error code. + Bugfix + * Fix for Clang, which was reporting a warning for the bignum.c inline assembly for AMD64 targets creating string literals greater than those permitted by the ISO C99 standard. Found by Aaron Jones. Fixes #482. + * Fix runtime error in mbedtls_platform_entropy_poll() when run through qemu user emulation. Reported and fix suggested by randombit. Fixes #1212. + * Fix an unsafe bounds check when restoring an SSL session from a ticket. This could lead to a buffer overflow, but only in case ticket authentication was broken. Reported and fix suggested by Guido Vranken in #659. + * Add explicit integer to enumeration type casts to example program programs/pkey/gen_key which previously led to compilation failure on some toolchains. Reported by phoenixmcallister. Fixes #2170. + * Clarify documentation of mbedtls_ssl_set_own_cert() regarding the absence of check for certificate/key matching. Reported by Attila Molnar, #507. + * Fix double initialization of ECC hardware that made some accelerators hang. + ------------------------------------------------------------------- Tue Dec 11 14:07:44 UTC 2018 - Pedro Monreal Gonzalez diff --git a/mbedtls.spec b/mbedtls.spec index c94b6e6..833f047 100644 --- a/mbedtls.spec +++ b/mbedtls.spec @@ -1,7 +1,7 @@ # # spec file for package mbedtls # -# Copyright (c) 2018 SUSE LINUX GmbH, Nuernberg, Germany. +# Copyright (c) 2019 SUSE LINUX GmbH, Nuernberg, Germany. # # All modifications and additions to the file contributed by third parties # remain the property of their copyright owners, unless otherwise agreed @@ -20,7 +20,7 @@ %define lib_crypto libmbedcrypto3 %define lib_x509 libmbedx509-0 Name: mbedtls -Version: 2.14.1 +Version: 2.16.0 Release: 0 Summary: Libraries for crypto and SSL/TLS protocols License: Apache-2.0