SHA256
1
0
forked from pool/mbedtls

87 Commits

Author SHA256 Message Date
2b68679cb5 Accepting request 1289615 from security:tls
- Enable SRTP protocol needed by some software.
  * Add patch mbedtls-enable-srtp.patch (forwarded request 1289614 from lmulling)

OBS-URL: https://build.opensuse.org/request/show/1289615
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=48
2025-07-02 10:11:45 +00:00
f0d285db67 - Enable SRTP protocol needed by some software.
* Add patch mbedtls-enable-srtp.patch

OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=56
2025-07-01 16:56:59 +00:00
ba0aa64f5e - Update to version 3.6.4:
* Added generated files
  * Version bump 3.6.4
  * Assemble ChangeLog
  * Properly initialize SSL endpoint objects
  * Fix accidentally skipped test assertion
  * Update framework pointer (release-sync)
  * fix: additional MSVC v142 build issue with tls1.3 configuration enabled.
  * Remove blank line
  * Simplify changelog
  * Add a note about processor memory reordering
  * Add changelog
  * Replace __attribute__((nonstring)) with macro MBEDTLS_ATTRIBUTE_UNTERMINATED_STRING
  * Improve some explanations
  * Don't mutate dst_size
  * Add __attribute__ ((nonstring)) to remove unterminated-string-initialization warning
  * Note that GCM is also impacted
  * Adjust test case with invalid base64
  * Fix race condition in mbedtls_aesni_has_support
  * mbedtls_base64_decode: test dst=NULL with dlen>0
  * Explain some aspects of the tests
  * mbedtls_base64_decode: insist on correct padding
  * Added CVE's to ChangeLogs
  * lms.c: Updated documentation
  * test_suite_lms.data: Updated comments
  * Fix mbedtls_base64_decode() accepting invalid inputs with 4n+1 digits
  * mbedtls_base64_decode: assert sloppy behavior with bad number of =
  * mbedtls_base64_decode: test the reported output length
  * test_suite_lms: Added negative test for corrupted Merkle path
  * test_suite_lms: Added a test for importing invalid sized key
  * Added changelog for check return of merkle leaf
  * Added changelog for lms enum casting
  * Added changelog for lms overread
  * Fix change log entry
  * Fix build test programs in MSVC (due to a warning treated as error in winbase.h)
  * Built-in lms driver: always zeroize output-buffer in create_merkle_leaf_value
  * Built-in lms driver:Check return values of Merkle node creation
  * Built-in lms/lmots driver: Harden public key import against enum truncation
  * Built-in lms driver: Added input guard
  * Add changelog
  * Add fix for PEM underflow
  * Add test using underflow-causing PEM keyfile
  * Update framework with additional operation initialization checks
  * Fix possible UB in mbedtls_asn1_write_raw_buffer()
  * Fix psa_pake_operation_s member types
  * Move PAKE size calculation macros, cipher suite and operation structs
  * Add change log
  * Move the inclusion of crypto_sizes.h and crypto_struct.h in crypto.h
  * Add ChangeLog entry
  * Improve unit tests for mbedtls_asn1_store_named_data
  * Fix bug in mbedtls_asn1_store_named_data()
  * Add tests for bug in mbedtls_x509_string_to_names()
  * Restore standard initializers in _init tests
  * Use short initializers for multipart operation structures
  * Avoid a useless copy in cert_{req,write}
  * Mark ssl_tls12_preset_suiteb_sig_algs const
  * Mark ssl_tls12_preset_default_sig_algs const
  * Fix type in ChangeLog
  * Add comment on apparent type mismatch
  * Remove redundant free loop
  * Fix ECDSA documentation: blinding is no longer optional
  * ECDSA is a special flower
  * Note functions that store the RNG callback in a context
  * Reference mbedtls_f_rng_t in public documentation
  * Name and document the type of random generator callbacks
  * Add credit to the reporters of the PKCS7 issue
  * Grammar in comments
  * Remove .gitmodules
  * Changelog entry for the union initialization fixes
  * Test with GCC 15 with sloppy union initialization
  * Initialize MAC context in internal functions for one-shot MAC
  * Initialize MAC context in internal functions for KDF
  * Initialize driver context in setup functions
  * Add unit test for new behaviour of string_to_names()
  * Fix memory leak in cert_write & cert_req
  * Fix runtime error in cert_write & cert_req
  * Restore behaviour of mbedtls_x509write_set_foo_name()
  * Fix undocumented free() in x509_string_to_names()
  * Improve comments
  * Update framework
  * Allow gcc-15 to be in $PATH
  * Enable drivers when testing with GCC 15
  * GCC 15: Silence -Wunterminated-string-initialization
  * Test with GCC 15
  * Disable warning from gcc -pedantic on dlsym/dlopen
  * Move persistent key tests to a separate .data file
  * Move concurrent tests to a separate .data file
  * Update obsolete section title
  * Complain about a missing comma in multiline lists of strings
  * Prepare framework for pylint check-str-concat-over-line-jumps
  * framework: update reference
  * Constify cipher_wrap:mbedtls_cipher_base_lookup_table
  * Fix some test helper functions returning 0 on some failures
  * Check the status of mbedtls_ssl_set_hostname()
  * Add missing ifdef for mbedtls_ssl_tls13_exporter
  * Add label_len argument to non-PSA tls_prf_generic
  * Fix dependencies for TLS-Exporter tests
  * Fix doxygen for MBEDTLS_SSL_KEYING_MATERIAL_EXPORT
  * Fix mistake in previous comment change
  * Fix HkdfLabel comment
  * Allow maximum label length in Hkdf-Expand-Label
  * Exporter: Add min. and max. label tests
  * Fix max. label length in key material exporter
  * Document BAD_INPUT_DATA error in key material exporter
  * Fix requirements for TLS 1.3 Exporter compat test
  * Use mbedtls_calloc, not regular calloc
  * Add fixed compatibility test for TLS 1.3 Exporter
  * Remove exporter compatibility test for TLS 1.3
  * Fix openssl s_client invocation
  * Print names of new tests properly
  * Fix memory leak in example programs
  * ssl-opt.sh: Add tests for keying material export
  * mbedtls_test_ssl_do_handshake_with_endpoints: Zeroize endpoints
  * Exporter tests: Don't use unavailbable constant
  * Exporter tests: Add missing depends-ons
  * Use one maximum key_len for all exported keys
  * Exporter tests: Reduce key size in long key tests
  * Exporter tests: Free endpoints before PSA_DONE()
  * Exporter tests: Fix possible uninitialized variable use
  * Coding style cleanup
  * Exporter tests: Initialize allocated memory
  * Exportert tests: Free endpoints and options
  * Fix output size check for key material exporter
  * Increase allowed output size of HKDF-Expand-Label
  * Add more tests for keying material export
  * Mention MBEDTLS_SSL_KEYING_MATERIAL_EXPORT in change log
  * Fix #endif comment
  * Enable MBEDTLS_SSL_KEYING_MATERIAL_EXPORT by default
  * Create MBEDTLS_SSL_KEYING_MATERIAL_EXPORT option
  * Remove TLS 1.2 Exporter if we don't have randbytes
  * Revert "Store randbytes for TLS 1.2 TLS-Exporter"
  * Fix typos in comments
  * Use fewer magic numbers in TLS-Exporter functions
  * Add label length argument to tls_prf_generic()
  * Store randbytes for TLS 1.2 TLS-Exporter
  * Fix coding style
  * Fix build when one of TLS 1.2 or 1.3 is disabled
  * Fix coding style
  * Fix TLS exporter changelog entry
  * Fix doxygen comment parameter name
  * Fix typos in comment
  * Fix mismatches in function declarations
  * Fix key_len check in TLS-Exporter
  * Actually set exporter defaults in ssl_client2
  * Simplify mbedtls_ssl_tls13_exporter
  * Add test for TLS-Exporter in TLS 1.3
  * Fix commented out function declaration
  * Add changelog entry for TLS-Exporter feature
  * Add TLS-Exporter options to ssl_client2
  * Add TLS-Exporter options to ssl_server2
  * Implement TLS-Exporter feature
  * programs: demo: do not source project_detection.sh directly
  * Fix record insertion
  * programs: demo: source project_detection.sh
  * framework: update reference
  * Update feature macro for 3.6
  * Use HANDSHAKE_OVER in nominal test cases
  * Improve comments
  * Adapt dependencies to the 3.6 branch
  * Use same dependencies for helper functions
  * Tighten dependencies again
  * Improve dependency declarations
  * Tighten dependency declarations
  * Improve documentation
  * Remove redundant setup
  * Fix copypasta
  * Simulate closing the connection mid-message
  * Also test inserting non-empty, non-handshake records
  * Fix the build without MBEDTLS_DEBUG_C
  * Fix the build in PSK-only configurations
  * Fix printf of enum
  * Pacify ancient clang -Wmissing-initializer
  * Test split, coalesced-split and empty handshake records
  * Create handshake record coalescing tests
  * Document gotcha of move_handshake_to_state
  * Add a log message on every SSL state transition
  * Always call mbedtls_ssl_handshake_set_state
  * Document assumption of mbedtls_get_pkcs_padding
  * Modify ChangeLog entry to full plaintext recovery
  * Add testcase for maximum padding length
  * Remove unnecessary TEST_CF_PUBLIC macro call
  * Update to the new name in usages as well
  * Add missing credit for set_hostname issue
  * cmake: Generate test_keys.h and test_certs.h in the build tree
  * Update framework pointer
  * Revert "Add auto-generated files"
  * Restored framework as a submodule
  * Deleted flattened framework dir.
  * Appease check-names with prefix
  * Disable check-names for static padding function
  * Add ChangeLog entry for PKCS#7 side channel fix
  * Fix timing side-channel in PKCS7 padding
  * Add constant-flow testing for PKCS7 padding

OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=55
2025-07-01 16:46:37 +00:00
Martin Pluskal
f8139344df Accepting request 1276938 from home:Yoshio_Sato:branches:security:tls
Update to mbedtls 3.6.3; Change spec file to more easily pull sources

OBS-URL: https://build.opensuse.org/request/show/1276938
OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=54
2025-05-15 08:51:34 +00:00
Martin Pluskal
fe1c3e1499 Accepting request 1275003 from home:Yoshio_Sato:branches:security:tls
Enabled build with support of SRTP protocol needed by some software (in this particular case by MistServer).

OBS-URL: https://build.opensuse.org/request/show/1275003
OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=53
2025-05-07 07:39:31 +00:00
a28b97e67c Accepting request 1211119 from security:tls
OBS-URL: https://build.opensuse.org/request/show/1211119
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=47
2024-10-21 14:25:38 +00:00
Martin Pluskal
92d8bfdee3 - Update to version 3.6.2: [bsc#1231708, CVE-2024-49195]
* test_suite_pkwrite: extend coverage of wrong output buffer
    sizes in pk_write_check_common()
  * pkwrite: fix buffer overrun

OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=52
2024-10-20 15:58:21 +00:00
bc168445a2 Accepting request 1199391 from security:tls
OBS-URL: https://build.opensuse.org/request/show/1199391
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=46
2024-09-09 12:44:14 +00:00
4cbd476d6c Accepting request 1164972 from security:tls
- Update baselibs.conf

- Update to version 3.6.0 (new LTS):
  * Fix typo in psa_key_production_parameters_t doc: 65535 should be 65537
  * Record size limit support is released, so remove warning about only for testing
  * Autogenerated files for 3.6.0
  * Fix some Changelog typos
  * Version Bump for 3.6.0
  * Assemble Changelog
  * Fix #ifdef guard in driver wrapper template
  * test_suite_pk: fix guards in pk_psa_sign()
  * add changelog
  * pkwrite: add new internal symbol for the max supported public key DER length
  * test_suite_pk: uniformly generate RSA and EC keys in pk_psa_sign()
  * test_suite_pk: fix guards in pk_psa_sign()
  * test_suite_pk: test also RSA OAEP in pk_wrap_rsa_decrypt_test_vec()
  * pk_wrap: fix algorithm selection in rsa_opaque_decrypt()
  * test_suite_pk: fix guards in pk_psa_sign()
  * test_suite_pk: properly size buffers for public keys in pk_psa_sign()
  * test_suite_pk: test also RSA keys with PKCS1 v2.1 padding mode in pk_psa_sign()
  * pk_wrap: fix algorithm selection in rsa_opaque_sign_wrap()
  * test_suite_pk: fix RSA issue in pk_psa_sign() when !PK_[PARSE|WRITE]_C are defined
  * test_suite_pk: rename some variables in pk_psa_sign()
  * test_suite_pk: reshape pk_psa_sign()
  * tls13: srv: Fix potential stack buffer overread
  * test_suite_pk: always test verify_ext with opaque keys in pk_psa_wrap_sign_ext()
  * add changelog
  * Mention MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS
  * Remove 'Question' line around testing
  * Replace reference to master

OBS-URL: https://build.opensuse.org/request/show/1164972
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=45
2024-04-04 20:27:05 +00:00
Martin Pluskal
0171d2c11f - Update baselibs.conf
OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=50
2024-04-04 14:35:38 +00:00
Martin Pluskal
2a38dfcabe Accepting request 1164274 from home:Guillaume_G:branches:security:tls
- Update to version 3.6.0 (new LTS)

OBS-URL: https://build.opensuse.org/request/show/1164274
OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=49
2024-04-04 08:04:38 +00:00
493c087ef4 Accepting request 1142919 from security:tls
- Update to version 3.5.2:
  * Update BRANCHES.md
  * Bump version
  * Assemble Changelog
  * Update Marvin fix Changelog entry
  * Add warning for PKCS 1.5 decryption
  * Fix typo
  * RSA: improve readability
  * RSA: remove unneeded temporaries
  * RSA: document Montgomery trick in unblind
  * Fix style
  * Make local function static
  * Add Changelog for the Marvin attack fix
  * Extend blinding to RSA result check
  * Make RSA unblinding constant flow
  * Add Changelog for #8687
  * Add required dependency to the testcase
  * Remove unneeded testcase
  * Update test-data to use SIZE_MAX
  * Add missing newline at the end of test_suite_x509write.data
  * Update fix to be more platform-independent
  * Fix Issue #8687
  * Add tests for Issue #8687
- Resolves CVE-2024-23170 boo#1219336

OBS-URL: https://build.opensuse.org/request/show/1142919
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=44
2024-01-31 22:54:49 +00:00
Martin Pluskal
e73d121589 - Update to version 3.5.2:
* Update BRANCHES.md
  * Bump version
  * Assemble Changelog
  * Update Marvin fix Changelog entry
  * Add warning for PKCS 1.5 decryption
  * Fix typo
  * RSA: improve readability
  * RSA: remove unneeded temporaries
  * RSA: document Montgomery trick in unblind
  * Fix style
  * Make local function static
  * Add Changelog for the Marvin attack fix
  * Extend blinding to RSA result check
  * Make RSA unblinding constant flow
  * Add Changelog for #8687
  * Add required dependency to the testcase
  * Remove unneeded testcase
  * Update test-data to use SIZE_MAX
  * Add missing newline at the end of test_suite_x509write.data
  * Update fix to be more platform-independent
  * Fix Issue #8687
  * Add tests for Issue #8687
- Resolves CVE-2024-23170 boo#1219336

OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=48
2024-01-31 08:15:07 +00:00
40732d801c Accepting request 1140887 from security:tls
OBS-URL: https://build.opensuse.org/request/show/1140887
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=43
2024-01-23 21:57:21 +00:00
Martin Pluskal
b89d8be380 Accepting request 1140884 from home:lkocman:branches:security:tls
-  Mbed TLS is now released under a dual Apache-2.0 OR GPL-2.0-or-later
  * legalreview already raised this

OBS-URL: https://build.opensuse.org/request/show/1140884
OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=47
2024-01-23 11:38:57 +00:00
4b676d0b3c Accepting request 1125871 from security:tls
- Update to version 3.5.1:
  * Add docs re Everest license
  * Update Changelog with bugfix entry
  * Update BRANCHES
  * Bump version
  * Fix typos in changelog
  * Fix 3rdparty target names for custom config
  * assemble Changelog
  * README improvements to 3rdparty section
  * Update license for p256-m
  * Add Changelog for license
  * Update documentation
  * Fix some non-standard headers
  * Header updates

OBS-URL: https://build.opensuse.org/request/show/1125871
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=42
2023-11-14 20:43:40 +00:00
Martin Pluskal
ef5902081f - Update to version 3.5.1:
* Add docs re Everest license
  * Update Changelog with bugfix entry
  * Update BRANCHES
  * Bump version
  * Fix typos in changelog
  * Fix 3rdparty target names for custom config
  * assemble Changelog
  * README improvements to 3rdparty section
  * Update license for p256-m
  * Add Changelog for license
  * Update documentation
  * Fix some non-standard headers
  * Header updates

OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=46
2023-11-14 12:38:01 +00:00
3bcc65a7f9 Accepting request 1116911 from security:tls
- Update to version 3.5.0 (resolves bsc#1216078 CVE-2023-45199 and bsc#1216076 CVE-2023-43615):
  * Updated BRANCHES.MD
  * Re-assemble changelog to add missing item, plus a couple of typo fixes.
  * Bump library so-crypto, so-x509, so-tls versions.
  * Ignore tests of built-in interfaces for driver-only testing parity
  * Renaming all MBEDTLS_HAVE for curves to MBEDTLS_ECP_HAVE
  * Auto-generated files for v3.5.0
  * ChangeLog: Set release date
  * Prepare ChangeLog for 3.5.0 release
  * Bump version to 3.5.0
  * check-generated-files: Added psa_crypto_driver_wrappers_no_static.c file
  * Changelog: Added entry for psa_crypto_driver_wrappers rename
  * Remove leftover local debug line
  * ChangeLog: Added .txt extension to log entries.
  * Avoid compiler warning about size comparison
  * Improve some debug messages and error codes
  * In TLS 1.2, only servers are affected
  * Changelog entry for xxdh_psa_peerkey size validation
  * Improve robustness of ECDH public key length validation
  * Fix buffer overflow in TLS 1.2 ClientKeyExchange parsing
  * Fix buffer overflow in TLS 1.3 ECDH public key parsing
  * Add custom config logic to 3rdparty modules
  * CMake: fix build with 3rdparty module enabled through a custom config
  * Changelog entry for #7298
  * Fix ChangeLog entry for FFDH in PSA
  * Undo not-needed change
  * Remove redundant code
  * Assume get_num_ops cannot fail
  * Always call get_num_ops
  * Add MBEDTLS_TARGET_PREFIX to 3rdparty CMake

OBS-URL: https://build.opensuse.org/request/show/1116911
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=41
2023-10-11 21:56:17 +00:00
Martin Pluskal
2e80ec14d6 OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=45 2023-10-11 10:53:58 +00:00
Martin Pluskal
5ef5708e1b - Update to version 3.5.0 (resolves bsc#1216078 CVE-2023-45199 and bsc#1216076 CVE-2023-43615):
* Updated BRANCHES.MD
  * Re-assemble changelog to add missing item, plus a couple of typo fixes.
  * Bump library so-crypto, so-x509, so-tls versions.
  * Ignore tests of built-in interfaces for driver-only testing parity
  * Renaming all MBEDTLS_HAVE for curves to MBEDTLS_ECP_HAVE
  * Auto-generated files for v3.5.0
  * ChangeLog: Set release date
  * Prepare ChangeLog for 3.5.0 release
  * Bump version to 3.5.0
  * check-generated-files: Added psa_crypto_driver_wrappers_no_static.c file
  * Changelog: Added entry for psa_crypto_driver_wrappers rename
  * Remove leftover local debug line
  * ChangeLog: Added .txt extension to log entries.
  * Avoid compiler warning about size comparison
  * Improve some debug messages and error codes
  * In TLS 1.2, only servers are affected
  * Changelog entry for xxdh_psa_peerkey size validation
  * Improve robustness of ECDH public key length validation
  * Fix buffer overflow in TLS 1.2 ClientKeyExchange parsing
  * Fix buffer overflow in TLS 1.3 ECDH public key parsing
  * Add custom config logic to 3rdparty modules
  * CMake: fix build with 3rdparty module enabled through a custom config
  * Changelog entry for #7298
  * Fix ChangeLog entry for FFDH in PSA
  * Undo not-needed change
  * Remove redundant code
  * Assume get_num_ops cannot fail
  * Always call get_num_ops
  * Add MBEDTLS_TARGET_PREFIX to 3rdparty CMake

OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=44
2023-10-11 10:31:58 +00:00
fe489b0cb0 Accepting request 1102828 from security:tls
OBS-URL: https://build.opensuse.org/request/show/1102828
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=40
2023-08-08 13:55:21 +00:00
Martin Pluskal
568de537a1 Accepting request 1102713 from home:polslinux:branches:security:tls
- Update to version 3.4.1:
  * Update more test dependencies when using test-ca.key
  * Update test dependencies when using test-ca.key
  * Add _build/ and api/ to gitignore
  * Clean the breathe-apidoc files with make clean
  * Revert "Add exemption for make.bat in checks for tabs"
  * Remove make.bat for documentation
  * Improve docs Makefile to do full build
  * Improve positioning of GENERATE_XML option
  * Remove Exhale from requirements and regenerate
  * Add exemption for make.bat in checks for tabs
  * Ignore mbedtls macros causing warnings
  * Add configuration for Read The Docs
  * Add initial API doc configuration
  * Tell Doxygen to generate XML
  * Add space to appease doxygen bug
  * Announce a release for Friday
  * Prepare changelog for release
  * Bump version to 3.4.1
  * Write changelog entry for the test data update
  * Update failing unit tests to use the moved data files
  * Copy test certificates files from development
  * Add changelog entry
  * Support compilation using CLang on Windows

OBS-URL: https://build.opensuse.org/request/show/1102713
OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=43
2023-08-08 08:24:25 +00:00
32a19a5168 Accepting request 1089972 from security:tls
OBS-URL: https://build.opensuse.org/request/show/1089972
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=39
2023-05-31 19:54:57 +00:00
Martin Pluskal
35bae25b21 Accepting request 1089650 from home:adkorte:branches:server:http
- Remove obsolete CMake options as these are not used in 3.0+
  (USE_PKCS11_HELPER_LIBRARY, ENABLE_ZLIB_SUPPORT)
- Enable MBEDTLS_THREADING_C and MBEDTLS_THREADING_PTHREAD (boo#1211810)
  + mbedtls-enable-pthread.patch
- Parallel execution of ctest works just fine (no need to limit to
  one job)

OBS-URL: https://build.opensuse.org/request/show/1089650
OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=42
2023-05-31 09:12:52 +00:00
928fb5021f Accepting request 1085425 from security:tls
OBS-URL: https://build.opensuse.org/request/show/1085425
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=38
2023-05-08 15:24:30 +00:00
Martin Pluskal
bcac4aa943 Accepting request 1085353 from home:Fisiu:branches:security:tls
- Enable THREADING with PTHREAD.

OBS-URL: https://build.opensuse.org/request/show/1085353
OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=41
2023-05-08 07:21:47 +00:00
7f2aa3152f Accepting request 1083494 from security:tls
- Update to version 3.4.0:
  * psa_util: fix for correctly computing elements in array
  * Add generated files
  * Update BRANCHES.md
  * Bump library, libcrypto and libx509 versions
  * Assemble Changelog for 3.4.0 release
  * Add security entry to ChangeLog for AES-NI
  * Add security entry to ChangeLog for AES-CE
  * Add TLS1.2 Opaque ECJPAKE changelog entry
- Switch to scm service

OBS-URL: https://build.opensuse.org/request/show/1083494
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=37
2023-04-28 14:24:23 +00:00
Martin Pluskal
b3b7f6d4a7 OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=40 2023-04-28 09:04:51 +00:00
Martin Pluskal
f5edfaff57 - Update to version 3.4.0:
* psa_util: fix for correctly computing elements in array
  * Add generated files
  * Update BRANCHES.md
  * Bump library, libcrypto and libx509 versions
  * Assemble Changelog for 3.4.0 release
  * Add security entry to ChangeLog for AES-NI
  * Add security entry to ChangeLog for AES-CE
  * Add TLS1.2 Opaque ECJPAKE changelog entry
- Switch to scm service

OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=39
2023-04-28 08:36:26 +00:00
d46cee30d1 Accepting request 1070164 from security:tls
- Build AVX2 enabled hwcaps library for x86_64-v3

OBS-URL: https://build.opensuse.org/request/show/1070164
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=36
2023-03-08 13:54:20 +00:00
Martin Pluskal
ea12024580 - Build AVX2 enabled hwcaps library for x86_64-v3
OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=38
2023-03-08 11:38:43 +00:00
6a127bd146 Accepting request 1044169 from security:tls
OBS-URL: https://build.opensuse.org/request/show/1044169
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=35
2022-12-22 15:23:07 +00:00
Martin Pluskal
b4be9589b6 Accepting request 1044072 from home:abergmann:branches:security:tls
- Update to 2.28.2: (bsc#1206576, CVE-2022-46393)
  Security:
  * Fix potential heap buffer overread and overwrite in DTLS if
    MBEDTLS_SSL_DTLS_CONNECTION_ID is enabled and
    MBEDTLS_SSL_CID_IN_LEN_MAX > 2 * MBEDTLS_SSL_CID_OUT_LEN_MAX.
old: security:tls/mbedtls
new: home:abergmann:branches:security:tls/mbedtls rev None
Index: mbedtls.changes
===================================================================
--- mbedtls.changes (revision 36)
+++ mbedtls.changes (revision 2)
@@ -1,4 +1,75 @@
 -------------------------------------------------------------------
+Wed Dec 21 11:10:10 UTC 2022 - Alexander Bergmann <abergmann@suse.com>
+
+- Update to 2.28.2: (bsc#1206576, CVE-2022-46393)
+
+  Security:
+  * Fix potential heap buffer overread and overwrite in DTLS if
+    MBEDTLS_SSL_DTLS_CONNECTION_ID is enabled and
+    MBEDTLS_SSL_CID_IN_LEN_MAX > 2 * MBEDTLS_SSL_CID_OUT_LEN_MAX.
+  * An adversary with access to precise enough information about memory
+    accesses (typically, an untrusted operating system attacking a secure
+    enclave) could recover an RSA private key after observing the victim
+    performing a single private-key operation if the window size used for the
+    exponentiation was 3 or smaller. Found and reported by Zili KOU,
+    Wenjian HE, Sharad Sinha, and Wei ZHANG. See "Cache Side-channel Attacks
+    and Defenses of the Sliding Window Algorithm in TEEs" - Design, Automation
+    and Test in Europe 2023.
+
+  Bugfix:
+  * Fix a long-standing build failure when building x86 PIC code with old
+    gcc (4.x). The code will be slower, but will compile. We do however
+    recommend upgrading to a more recent compiler instead. Fixes #1910.
+  * Fix support for little-endian Microblaze when MBEDTLS_HAVE_ASM is defined.
+    Contributed by Kazuyuki Kimura to fix #2020.
+  * Use double quotes to include private header file psa_crypto_cipher.h.
+    Fixes 'file not found with include' error when building with Xcode.
+  * Fix handling of broken symlinks when loading certificates using
+    mbedtls_x509_crt_parse_path(). Instead of returning an error as soon as a
+    broken link is encountered, skip the broken link and continue parsing
+    other certificate files. Contributed by Eduardo Silva in #2602.
+  * Fix a compilation error when using CMake with an IAR toolchain.
+    Fixes #5964.
+  * Fix bugs and missing dependencies when building and testing
+    configurations with only one encryption type enabled in TLS 1.2.
+  * Provide the missing definition of mbedtls_setbuf() in some configurations
+    with MBEDTLS_PLATFORM_C disabled. Fixes #6118, #6196.
+  * Fix compilation errors when trying to build with
+    PSA drivers for AEAD (GCM, CCM, Chacha20-Poly1305).
+  * Fix memory leak in ssl_parse_certificate_request() caused by
+    mbedtls_x509_get_name() not freeing allocated objects in case of error.
+    Change mbedtls_x509_get_name() to clean up allocated objects on error.
+  * Fix checks on PK in check_config.h for builds with PSA and RSA. This does
+    not change which builds actually work, only moving a link-time error to
+    an early check.
+  * Fix ECDSA verification, where it was not always validating the
+    public key. This bug meant that it was possible to verify a
+    signature with an invalid public key, in some cases. Reported by
+    Guido Vranken using Cryptofuzz in #4420.
+  * Fix a possible null pointer dereference if a memory allocation fails
+    in TLS PRF code. Reported by Michael Madsen in #6516.
+  * Fix a bug in which mbedtls_x509_crt_info() would produce non-printable
+    bytes when parsing certificates containing a binary RFC 4108
+    HardwareModuleName as a Subject Alternative Name extension. Hardware
+    serial numbers are now rendered in hex format. Fixes #6262.
+  * Fix bug in error reporting in dh_genprime.c where upon failure,
+    the error code returned by mbedtls_mpi_write_file() is overwritten
+    and therefore not printed.
+  * In the bignum module, operations of the form (-A) - (+A) or (-A) - (-A)
+    with A > 0 created an unintended representation of the value 0 which was
+    not processed correctly by some bignum operations. Fix this. This had no
+    consequence on cryptography code, but might affect applications that call
+    bignum directly and use negative numbers.
+  * Fix undefined behavior (typically harmless in practice) of
+    mbedtls_mpi_add_mpi(), mbedtls_mpi_add_abs() and mbedtls_mpi_add_int()
+    when both operands are 0 and the left operand is represented with 0 limbs.
+  * Fix undefined behavior (typically harmless in practice) when some bignum
+    functions receive the most negative value of mbedtls_mpi_sint. Credit
+    to OSS-Fuzz. Fixes #6597.
+  * Fix undefined behavior (typically harmless in practice) in PSA ECB
+    encryption and decryption.
+
+-------------------------------------------------------------------
 Fri Nov  4 16:53:36 UTC 2022 - Mia Herkt <mia@0x0.st>
 
 - Update to 2.28.1: (CVE-2022-35409)
Index: mbedtls.spec
===================================================================
--- mbedtls.spec (revision 36)
+++ mbedtls.spec (revision 2)
@@ -20,7 +20,7 @@
 %define lib_crypto libmbedcrypto7
 %define lib_x509   libmbedx509-1
 Name:           mbedtls
-Version:        2.28.1
+Version:        2.28.2
 Release:        0
 Summary:        Libraries for crypto and SSL/TLS protocols
 License:        Apache-2.0
Index: mbedtls-2.28.2.tar.gz
===================================================================
Binary file mbedtls-2.28.2.tar.gz (revision 2) added
Index: mbedtls-2.28.1.tar.gz
===================================================================
Binary file mbedtls-2.28.1.tar.gz (revision 36) deleted

OBS-URL: https://build.opensuse.org/request/show/1044072
OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=37
2022-12-22 08:29:32 +00:00
14a5de7fc0 Accepting request 1033622 from security:tls
OBS-URL: https://build.opensuse.org/request/show/1033622
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=34
2022-11-05 13:46:57 +00:00
d767eaf9d9 Accepting request 1033587 from home:mia:branches:security:tls
- Update to 2.28.1: (CVE-2022-35409)
  Default behavior changes
  * mbedtls_cipher_set_iv will now fail with ChaCha20 and
    ChaCha20+Poly1305 for IV lengths other than 12. The library was
    silently overwriting this length with 12, but did not inform
    the caller about it.
    gh#Mbed-TLS/mbedtls#4301
  Features
  * When MBEDTLS_PSA_CRYPTO_CONFIG is enabled, you may list the PSA
    crypto feature requirements in the file named by the new macro
    MBEDTLS_PSA_CRYPTO_CONFIG_FILE instead of the default
    psa/crypto_config.h. Furthermore you may name an additional
    file to include after the main file with the macro
    MBEDTLS_PSA_CRYPTO_USER_CONFIG_FILE.
  Security
  * Zeroize dynamically-allocated buffers used by the PSA Crypto
    key storage module before freeing them. These buffers contain
    secret key material, and could thus potentially leak the key
    through freed heap.
  * Fix a potential heap buffer overread in TLS 1.2 server-side
    when MBEDTLS_USE_PSA_CRYPTO is enabled, an opaque key (created
    with mbedtls_pk_setup_opaque()) is provisioned, and a static
    ECDH ciphersuite is selected. This may result in an application
    crash or potentially an information leak.
  * Fix a buffer overread in DTLS ClientHello parsing in servers
    with MBEDTLS_SSL_DTLS_CLIENT_PORT_REUSE enabled.
    An unauthenticated client or a man-in-the-middle could cause a
    DTLS server to read up to 255 bytes after the end of the SSL
    input buffer. The buffer overread only happens when
    MBEDTLS_SSL_IN_CONTENT_LEN is less than a threshold that
    depends on the exact configuration: 258 bytes if using
    mbedtls_ssl_cookie_check(), and possibly up to 571 bytes with
    a custom cookie check function.
    Reported by the Cybeats PSI Team.
  Bugfix
  * Fix a memory leak if mbedtls_ssl_config_defaults() is called
    twice.
  * Fix several bugs (warnings, compiler and linker errors, test
    failures) in reduced configurations when MBEDTLS_USE_PSA_CRYPTO
    is enabled.
  * Fix a bug in (D)TLS curve negotiation: when
    MBEDTLS_USE_PSA_CRYPTO was enabled and an ECDHE-ECDSA or
    ECDHE-RSA key exchange was used, the client would fail to check
    that the curve selected by the server for ECDHE was indeed one
    that was offered. As a result, the client would accept any
    curve that it supported, even if that curve was not allowed
    according to its configuration.
    gh#Mbed-TLS/mbedtls#5291
  * Fix unit tests that used 0 as the file UID. This failed on some
    implementations of PSA ITS.
    gh#Mbed-TLS/mbedtls#3838
  * Fix API violation in mbedtls_md_process() test by adding a call
    to mbedtls_md_starts().
    gh#Mbed-TLS/mbedtls#2227
  * Fix compile errors when MBEDTLS_HAVE_TIME is not defined.
    Add tests to catch bad uses of time.h.
  * Fix bug in the alert sending function
    mbedtls_ssl_send_alert_message() potentially leading to
    corrupted alert messages being sent in case the function needs
    to be re-called after initially returning
    MBEDTLS_SSL_WANT_WRITE.
    gh#Mbed-TLS/mbedtls#1916
  * In configurations with MBEDTLS_SSL_DTLS_CONNECTION_ID enabled
    but none of MBEDTLS_SSL_HW_RECORD_ACCEL,
    MBEDTLS_SSL_EXPORT_KEYS or MBEDTLS_DEBUG_C, DTLS handshakes
    using CID would crash due to a null pointer dereference.
    Fix this.
    gh#Mbed-TLS/mbedtls#3998
  * Fix incorrect documentation of mbedtls_x509_crt_profile. The
    previous documentation stated that the allowed_pks field
    applies to signatures only, but in fact it does apply to the
    public key type of the end entity certificate, too.
    gh#Mbed-TLS/mbedtls#1992
  * Fix PSA cipher multipart operations using ARC4. Previously, an
    IV was required but discarded. Now, an IV is rejected, as it
    should be.
  * Fix undefined behavior in mbedtls_asn1_find_named_data(), where
    val is not NULL and val_len is zero. psa_raw_key_agreement()
    now returns PSA_ERROR_BUFFER_TOO_SMALL when applicable.
    gh#Mbed-TLS/mbedtls#5735
  * Fix a bug in the x25519 example program where the removal of
    MBEDTLS_ECDH_LEGACY_CONTEXT caused the program not to run.
    gh#Mbed-TLS/mbedtls#4901
    gh#Mbed-TLS/mbedtls#3191
  * Encode X.509 dates before 1/1/2000 as UTCTime rather than
    GeneralizedTime.
    gh#Mbed-TLS/mbedtls#5465
  * Fix order value of curve x448.
  * Fix string representation of DNs when outputting values
    containing commas and other special characters, conforming to
    RFC 1779.
    gh#Mbed-TLS/mbedtls#769
  * Silence a warning from GCC 12 in the selftest program.
    gh#Mbed-TLS/mbedtls#5974
  * Fix mbedtls_asn1_write_mpi() writing an incorrect encoding of
    0.
  * Fix resource leaks in mbedtls_pk_parse_public_key() in low
    memory conditions.
  * Fix server connection identifier setting for outgoing encrypted
    records on DTLS 1.2 session resumption. After DTLS 1.2 session
    resumption with connection identifier, the Mbed TLS client now
    properly sends the server connection identifier in encrypted
    record headers.
    gh#Mbed-TLS/mbedtls#5872
  * Fix a null pointer dereference when performing some operations
    on zero represented with 0 limbs (specifically
    mbedtls_mpi_mod_int() dividing by 2, and
    mbedtls_mpi_write_string() in base 2).
  * Fix record sizes larger than 16384 being sometimes accepted
    despite being non-compliant. This could not lead to a buffer
    overflow. In particular, application data size was already
    checked correctly.

OBS-URL: https://build.opensuse.org/request/show/1033587
OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=36
2022-11-04 20:48:59 +00:00
0e46ef09f9 Accepting request 947118 from security:tls
OBS-URL: https://build.opensuse.org/request/show/947118
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=33
2022-01-18 23:35:13 +00:00
Martin Pluskal
80ff478794 Accepting request 946956 from home:Guillaume_G:branches:security:tls
- Fix baselib.conf

OBS-URL: https://build.opensuse.org/request/show/946956
OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=35
2022-01-18 07:55:10 +00:00
Martin Pluskal
bd5d1ffda0 Accepting request 946391 from home:Guillaume_G:branches:security:tls
- Update to 2.28.0: (bsc#1193979, CVE-2021-45450)

OBS-URL: https://build.opensuse.org/request/show/946391
OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=34
2022-01-14 13:58:34 +00:00
ada45403e1 Accepting request 922415 from security:tls
- Update to 2.26.0: [bsc#1189589, CVE-2021-24119]

OBS-URL: https://build.opensuse.org/request/show/922415
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=32
2021-10-01 20:29:03 +00:00
Martin Pluskal
c00ddd30dd osc copypac from project:home:pmonrealgonzalez:branches:security:tls package:mbedtls revision:2
OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=33
2021-09-30 16:03:16 +00:00
642c085072 Accepting request 909961 from security:tls
OBS-URL: https://build.opensuse.org/request/show/909961
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=31
2021-08-05 18:47:52 +00:00
Martin Pluskal
9b7046063e Accepting request 907287 from home:pmonrealgonzalez:branches:security:tls
- Update to 2.27.0:
  API changes:
   * Update AEAD output size macros to bring them in line with the PSA Crypto
     API version 1.0 spec. This version of the spec parameterizes them on the
     key type used, as well as the key bit-size in the case of
     PSA_AEAD_TAG_LENGTH.
     The old versions of these macros were renamed and deprecated as follows:
     - PSA_AEAD_TAG_LENGTH          -> PSA_AEAD_TAG_LENGTH_1_ARG
     - PSA_AEAD_ENCRYPT_OUTPUT_SIZE -> PSA_AEAD_ENCRYPT_OUTPUT_SIZE_2_ARG
     - PSA_AEAD_DECRYPT_OUTPUT_SIZE -> PSA_AEAD_DECRYPT_OUTPUT_SIZE_2_ARG
     - PSA_AEAD_UPDATE_OUTPUT_SIZE  -> PSA_AEAD_UPDATE_OUTPUT_SIZE_2_ARG
     - PSA_AEAD_FINISH_OUTPUT_SIZE  -> PSA_AEAD_FINISH_OUTPUT_SIZE_1_ARG
     - PSA_AEAD_VERIFY_OUTPUT_SIZE  -> PSA_AEAD_VERIFY_OUTPUT_SIZE_1_ARG
   * Implement one-shot cipher functions, psa_cipher_encrypt and
     psa_cipher_decrypt, according to the PSA Crypto API 1.0.0
     specification.
  Features:
   * Add mbedtls_rsa_rsassa_pss_sign_ext() function allowing to generate a
     signature with a specific salt length. This function allows to validate
     test cases provided in the NIST's CAVP test suite.
   * Added support for built-in driver keys through the PSA opaque crypto
     driver interface. Refer to the documentation of
     MBEDTLS_PSA_CRYPTO_BUILTIN_KEYS for more information.
   * Implement psa_sign_message() and psa_verify_message().
   * The new function mbedtls_mpi_random() generates a random value in a
     given range uniformly.
   * Implement psa_mac_compute() and psa_mac_verify() as defined in the
     PSA Cryptograpy API 1.0.0 specification.
   * MBEDTLS_ECP_MAX_BITS is now determined automatically from the configured
     curves and no longer needs to be configured explicitly to save RAM.

OBS-URL: https://build.opensuse.org/request/show/907287
OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=31
2021-08-03 11:25:35 +00:00
01f51682ce Accepting request 885737 from security:tls
-  Workaround for building with gcc-11 boo#1181876

OBS-URL: https://build.opensuse.org/request/show/885737
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=30
2021-04-18 19:45:10 +00:00
Martin Pluskal
c72ede0254 - Workaround for building with gcc-11 boo#1181876
OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=29
2021-04-15 16:00:58 +00:00
Richard Brown
9226adbd26 Accepting request 880715 from security:tls
- Update to 2.26.0:
  * * This release of Mbed TLS provides bug fixes, minor enhancements and new
  features. This release includes fixes for security issues.
  * see https://github.com/ARMmbed/mbedtls/releases/tag/v2.26.0
- Fix build with patch from https://github.com/ARMmbed/mbedtls/pull/4237
  mbedtls-4237.patch

OBS-URL: https://build.opensuse.org/request/show/880715
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=29
2021-03-29 16:21:29 +00:00
Martin Pluskal
96005743cb mbedtls-4237.patch
OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=27
2021-03-23 11:39:07 +00:00
Martin Pluskal
3df51e185e Accepting request 880551 from home:Guillaume_G:branches:security:tls
- Update to 2.26.0:
  * * This release of Mbed TLS provides bug fixes, minor enhancements and new
  features. This release includes fixes for security issues.
  * see https://github.com/ARMmbed/mbedtls/releases/tag/v2.26.0
- Fix build with patch from https://github.com/ARMmbed/mbedtls/pull/4237

OBS-URL: https://build.opensuse.org/request/show/880551
OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=26
2021-03-23 07:12:35 +00:00
05b05e083e Accepting request 864545 from security:tls
OBS-URL: https://build.opensuse.org/request/show/864545
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=28
2021-01-22 20:49:24 +00:00
Martin Pluskal
4cc712ceaf Accepting request 864424 from home:alois:branches:security:tls
- Fix build for Leap targets
- Use upstream tarball name

OBS-URL: https://build.opensuse.org/request/show/864424
OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=24
2021-01-20 07:18:23 +00:00
270a0e4b51 Accepting request 858120 from security:tls
OBS-URL: https://build.opensuse.org/request/show/858120
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=27
2020-12-23 13:21:24 +00:00
Martin Pluskal
32885839d9 Accepting request 858114 from home:dirkmueller:branches:security:tls
- update to 2.25.0:
  * This release of Mbed TLS provides bug fixes, minor enhancements and new
  features. This release includes fixes for security issues. 
  * see https://github.com/ARMmbed/mbedtls/releases/tag/v2.25.0
  * The functions mbedtls_cipher_auth_encrypt() and
  mbedtls_cipher_auth_decrypt() would write past the minimum documented size
  of the output buffer when used with NIST_KW. As a result, code using those
  functions as documented with NIST_KW could have a buffer overwrite of up to
  15 bytes, with consequences ranging up to arbitrary code execution
  depending on the location of the output buffer.
  * Limit the size of calculations performed by mbedtls_mpi_exp_mod to
  MBEDTLS_MPI_MAX_SIZE to prevent a potential denial of service when generating
  Diffie-Hellman key pairs. Credit to OSS-Fuzz.
  
  * A failure of the random generator was ignored in mbedtls_mpi_fill_random(),
  which is how most uses of randomization in asymmetric cryptography (including
  key generation, intermediate value randomization and blinding) are implemented.
  This could cause failures or the silent use of non-random values. A random
  generator can fail if it needs reseeding and cannot not obtain entropy, or due
  to an internal failure (which, for Mbed TLS's own CTR_DRBG or HMAC_DRBG, can
  only happen due to a misconfiguration).
  
  * Fix a compliance issue whereby we were not checking the tag on the algorithm
  parameters (only the size) when comparing the signature in the description part
  of the cert to the real signature. This meant that a NULL algorithm parameters
  entry would look identical to an array of REAL (size zero) to the library and
  thus the certificate would be considered valid. However, if the parameters do
  not match in any way then the certificate should be considered invalid, and
  indeed OpenSSL marks these certs as invalid when mbedtls did not. Many thanks
  to guidovranken who found this issue via differential fuzzing and reported it

OBS-URL: https://build.opensuse.org/request/show/858114
OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=22
2020-12-22 10:24:25 +00:00
4a365114f6 Accepting request 838417 from security:tls
OBS-URL: https://build.opensuse.org/request/show/838417
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=26
2020-10-03 16:55:47 +00:00
Martin Pluskal
874cecdf09 Accepting request 837996 from home:dirkmueller:branches:security:tls
- update to 2.24.0:
  * see https://github.com/ARMmbed/mbedtls/releases/tag/v2.24.0
  * Fix a vulnerability in the verification of X.509 certificates when matching
  the expected common name (the cn argument of mbedtls_x509_crt_verify())
  with the actual certificate name: when the subjecAltName extension is
  present, the expected name was compared to any name in that extension
  regardless of its type. This means that an attacker could for example
  impersonate a 4-bytes or 16-byte domain by getting a certificate for the
  corresponding IPv4 or IPv6 (this would require the attacker to control that
  IP address, though). Similar attacks using other subjectAltName name types
  might be possible.
  * When checking X.509 CRLs, a certificate was only considered as revoked if
  its revocationDate was in the past according to the local clock if
  available. In particular, on builds without MBEDTLS_HAVE_TIME_DATE,
  certificates were never considered as revoked. On builds with
  MBEDTLS_HAVE_TIME_DATE, an attacker able to control the local clock (for
  example, an untrusted OS attacking a secure enclave) could prevent
  revocation of certificates via CRLs. Fixed by no longer checking the
  revocationDate field, in accordance with RFC 5280. Reported by yuemonangong
  in #3340. Reported independently and fixed by Raoul Strackx and Jethro
  * In (D)TLS record decryption, when using a CBC ciphersuites without the
  Encrypt-then-Mac extension, use constant code flow memory access patterns
  to extract and check the MAC. This is an improvement to the existing
  countermeasure against Lucky 13 attacks. The previous countermeasure was
  effective against network-based attackers, but less so against local
  attackers. The new countermeasure defends against local attackers, even if
  they have access to fine-grained measurements. In particular, this fixes a
  local Lucky 13 cache attack found and reported by Tuba Yavuz, Farhaan
  Fowze, Ken (Yihan) Bai, Grant Hernandez, and Kevin Butler (University of
  Florida) and Dave Tian (Purdue University).

OBS-URL: https://build.opensuse.org/request/show/837996
OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=20
2020-09-29 05:57:17 +00:00
70fce9faf4 Accepting request 832675 from security:tls
OBS-URL: https://build.opensuse.org/request/show/832675
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=25
2020-09-09 15:46:56 +00:00
Martin Pluskal
6a77a4ff04 Accepting request 832637 from home:StefanBruens:branches:security:tls
- Add workaround for failing builds (Python not found) due to
  https://gitlab.kitware.com/cmake/cmake/-/issues/21168

OBS-URL: https://build.opensuse.org/request/show/832637
OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=18
2020-09-07 06:46:16 +00:00
51b1b25a44 Accepting request 830740 from security:tls
- Do not run testsuite in parallel - its not reliable

- update to 2.23.0:
  a lot of changes see https://github.com/ARMmbed/mbedtls/releases/tag/v2.23.0
  * Fix a side channel vulnerability in modular exponentiation that could reveal an RSA private key used in a secure enclave. Noticed by Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim and Hyesoon Kim (Georgia Institute of Technology); and Marcus Peinado (Microsoft Research). Reported by Raoul Strackx (Fortanix) in #3394.
  * Fix side channel in mbedtls_ecp_check_pub_priv() and mbedtls_pk_parse_key() / mbedtls_pk_parse_keyfile() (when loading a private key that didn't include the uncompressed public key), as well as mbedtls_ecp_mul() / mbedtls_ecp_mul_restartable() when called with a NULL f_rng argument. An attacker with access to precise enough timing and memory access information (typically an untrusted operating system attacking a secure enclave) could fully recover the ECC private key. Found and reported by Alejandro Cabrera Aldaya and Billy Brumley.
  * Fix issue in Lucky 13 counter-measure that could make it ineffective when hardware accelerators were used (using one of the MBEDTLS_SHAxxx_ALT macros). This would cause the original Lucky 13 attack to be possible in those configurations, allowing an active network attacker to recover plaintext after repeated timing measurements under some conditions. Reported and fix suggested by Luc Perneel in #3246.

OBS-URL: https://build.opensuse.org/request/show/830740
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=24
2020-09-04 08:51:34 +00:00
Martin Pluskal
85984f4eca - Do not run testsuite in parallel - its not reliable
OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=16
2020-08-31 10:41:37 +00:00
Martin Pluskal
ddd7fc109e Accepting request 827276 from home:dirkmueller:branches:security:tls
- update to 2.23.0:
  a lot of changes see https://github.com/ARMmbed/mbedtls/releases/tag/v2.23.0
  * Fix a side channel vulnerability in modular exponentiation that could reveal an RSA private key used in a secure enclave. Noticed by Sangho Lee, Ming-Wei Shih, Prasun Gera, Taesoo Kim and Hyesoon Kim (Georgia Institute of Technology); and Marcus Peinado (Microsoft Research). Reported by Raoul Strackx (Fortanix) in #3394.
  * Fix side channel in mbedtls_ecp_check_pub_priv() and mbedtls_pk_parse_key() / mbedtls_pk_parse_keyfile() (when loading a private key that didn't include the uncompressed public key), as well as mbedtls_ecp_mul() / mbedtls_ecp_mul_restartable() when called with a NULL f_rng argument. An attacker with access to precise enough timing and memory access information (typically an untrusted operating system attacking a secure enclave) could fully recover the ECC private key. Found and reported by Alejandro Cabrera Aldaya and Billy Brumley.
  * Fix issue in Lucky 13 counter-measure that could make it ineffective when hardware accelerators were used (using one of the MBEDTLS_SHAxxx_ALT macros). This would cause the original Lucky 13 attack to be possible in those configurations, allowing an active network attacker to recover plaintext after repeated timing measurements under some conditions. Reported and fix suggested by Luc Perneel in #3246.

OBS-URL: https://build.opensuse.org/request/show/827276
OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=15
2020-08-17 10:36:14 +00:00
5aeac1e8bc Accepting request 790837 from security:tls
- Update to version 2.16.5:
  * Security improvements and bugfixes

OBS-URL: https://build.opensuse.org/request/show/790837
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=23
2020-04-07 08:23:11 +00:00
Martin Pluskal
4f3728d555 - Update to version 2.16.5:
* Security improvements and bugfixes

OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=13
2020-04-02 10:17:32 +00:00
1677a8dfc9 Accepting request 748322 from security:tls
- Update to version 2.16.3:
  * Security improvements and bugfixes

OBS-URL: https://build.opensuse.org/request/show/748322
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=22
2019-11-18 19:00:44 +00:00
Martin Pluskal
d2badd0cc7 OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=11 2019-11-13 14:17:05 +00:00
Martin Pluskal
8027af5a7c - Update to version 2.16.3:
* Security improvements and bugfixes

OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=10
2019-11-13 13:56:17 +00:00
9b8edb4baf Accepting request 728035 from security:tls
- Update to version 2.16.2:
  * Security improvements and bugfixes
- Use ninja to for build

OBS-URL: https://build.opensuse.org/request/show/728035
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=21
2019-09-07 10:35:09 +00:00
Martin Pluskal
ad3ba32890 - Update to version 2.16.2:
* Security improvements and bugfixes
- Use ninja to for build

OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=8
2019-09-03 15:04:20 +00:00
31fb0ed8a1 Accepting request 663383 from security:tls
- Update to version 2.16.0:

OBS-URL: https://build.opensuse.org/request/show/663383
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=20
2019-01-15 12:13:45 +00:00
Martin Pluskal
9769394294 - Update to version 2.16.0:
OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=6
2019-01-07 15:23:33 +00:00
2f4ce5bdae Accepting request 657256 from security:tls
OBS-URL: https://build.opensuse.org/request/show/657256
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=19
2018-12-19 12:27:41 +00:00
Tomáš Chvátal
1791b616af Accepting request 657220 from home:pmonrealgonzalez:branches:security:tls
- Library package version bumped to libmbedtls12

- Update to version 2.14.1: [bsc#1118727, CVE-2018-19608]
  Security
   * Fix timing variations and memory access variations in RSA PKCS#1 v1.5
     decryption that could lead to a Bleichenbacher-style padding oracle
     attack. In TLS, this affects servers that accept ciphersuites based on
     RSA decryption (i.e. ciphersuites whose name contains RSA but not
     (EC)DH(E)). Discovered by Eyal Ronen (Weizmann Institute),  Robert Gillham
     (University of Adelaide), Daniel Genkin (University of Michigan),
     Adi Shamir (Weizmann Institute), David Wong (NCC Group), and Yuval Yarom
     (University of Adelaide, Data61). The attack is described in more detail
     in the paper available here: http://cat.eyalro.net/cat.pdf  CVE-2018-19608
   * In mbedtls_mpi_write_binary(), don't leak the exact size of the number
     via branching and memory access patterns. An attacker who could submit
     a plaintext for RSA PKCS#1 v1.5 decryption but only observe the timing
     of the decryption and not its result could nonetheless decrypt RSA
     plaintexts and forge RSA signatures. Other asymmetric algorithms may
     have been similarly vulnerable. Reported by Eyal Ronen, Robert Gillham,
     Daniel Genkin, Adi Shamir, David Wong and Yuval Yarom.
   * Wipe sensitive buffers on the stack in the CTR_DRBG and HMAC_DRBG
     modules.
  API Changes
   * The new functions mbedtls_ctr_drbg_update_ret() and
     mbedtls_hmac_drbg_update_ret() are similar to mbedtls_ctr_drbg_update()
     and mbedtls_hmac_drbg_update() respectively, but the new functions
     report errors whereas the old functions return void. We recommend that
     applications use the new functions.
- Version 2.14.0:
  Security

OBS-URL: https://build.opensuse.org/request/show/657220
OBS-URL: https://build.opensuse.org/package/show/security:tls/mbedtls?expand=0&rev=4
2018-12-11 15:42:05 +00:00
c11c7d3c29 Accepting request 631028 from security:tls
- Update to version 2.12.0:
  * Security
    + Fixed a vulnerability in the TLS ciphersuites based on use of CBC and SHA-384 in DTLS/TLS 1.0 to 1.2, that allowed an active network attacker to partially recover the plaintext of messages under certains conditions by exploiting timing side-channels.
    + Fixed a vulnerability in TLS ciphersuites based on CBC, in DTLS/TLS 1.0 to 1.2, that allowed a local attacker, with the ability to execute code on the local machine as well as to manipulate network packets, to partially recover the plaintext of messages under certain conditions by using a cache attack targetting an internal MD/SHA buffer.
    + Added a counter-measure against a vulnerability in TLS ciphersuites based on CBC, in DTLS/TLS 1.0 to 1.2, that allowed a local attacker with the ability to execute code on the local machine as well as manipulate network packets, to partially recover the plaintext of messages certain conditions (see previous entry) by using a cache attack targeting the SSL input record buffer.
  * Features
    + Added new cryptographic primitives, the stream cipher Chacha20, one-time authenticator Poly1305 and AEAD construct Chacha20-Poly1305, as defined in RFC 7539. Contributed by Daniel King.
    + Added support for the CHACHA20-POLY1305 ciphersuites from RFC 7905.
    + Made the receive and transmit buffers independently configurable in size, for situations where the outgoing buffer can be fixed at a smaller size than the incoming buffer
    + Added support for the AES based key wrapping modes defined by NIST SP 800-38F algorithms KW and KWP and by RFC's 3394 and 5649.
    + Added platform support for the Haiku OS.
  * Bugfix
    + Fixed the key_app_writer example which was creating an invalid ASN.1 tag by writing an additional leading zero byte. Found by Aryeh R. #1257.
    + Fixed a C++ compilation error, caused by a variable named new. Found and fixed by Hirotaka Niisato. #1783.
    + Fixed the "no symbols" warning issued by ranlib when building on Mac OS X. Fix contributed by tabascoeye.
    + Clarified documentation for mbedtls_ssl_write() to include 0 as a valid return value. Found by @davidwu2000. #839.
    + Fixed a memory leak in mbedtls_x509_csr_parse(). Found and fixed by catenacyber, Philippe Antoine. #1623.
    + Added length checks to some TLS parsing functions. Found and fixed by Philippe Antoine from Catena cyber. #1663.
    + Remove unused headers included in x509.c. Found by Chris Hanson and fixed by Brendan Shanks. #992.
    + Fixed compilation error when MBEDTLS_ARC4_C is disabled and MBEDTLS_CIPHER_NULL_CIPHER is enabled. Found by TrinityTonic in #1719.
    + Fixed the inline assembly for the MPI multiply helper function for i386 and i386 with SSE2. Found by László Langó. #1550.
    + Fixed the namespacing in header files. Remove the mbedtls namespacing in the #include in the header files. #857.
    + Fixed a compiler warning of 'use before initialisation' in mbedtls_pk_parse_key(). Found by Martin Boye Petersen and fixed by Dawid Drozd.#1098.
    + Fixed decryption of zero length messages (which contain all padding) when a CBC based ciphersuite was used together with Encrypt-then-MAC.
    + Fixed the ssl_client2 example to send application data with 0-length content when the request_size argument is set to 0 as stated in the documentation. #1833.
    + Corrected the documentation for mbedtls_ssl_get_session(). This API has deep copy of the session, and the peer certificate is not lost. #926.
    + Fixed issues when building to the C99 standard, using -std=c99. Fixed by Nick Wilson.
  * Changes
    + Fails when receiving a TLS alert message with an invalid length, or invalid zero-length messages when using TLS 1.2. Contributed by Espressif Systems.
    + Changed the default behaviour of mbedtls_hkdf_extract() to return an error when calling with a NULL salt and non-zero salt length. Contributed by Brian J Murray

OBS-URL: https://build.opensuse.org/request/show/631028
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=18
2018-09-11 15:08:20 +00:00
79546094fd Accepting request 621852 from devel:libraries:c_c++
OBS-URL: https://build.opensuse.org/request/show/621852
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=17
2018-07-13 08:19:30 +00:00
806db72ddc Accepting request 593915 from devel:libraries:c_c++
- Update to version 2.8.0:
  * Security:
    + Defend against Bellcore glitch attacks by verifying the results of RSA private key operations.
    + Fix implementation of the truncated HMAC extension. The previous implementation allowed an offline 2^80 brute force attack on the HMAC key of a single, uninterrupted connection (with no resumption of the session).
    + Reject CRLs containing unsupported critical extensions. Found by Falko Strenzke and Evangelos Karatsiolis.
    + Fix a buffer overread in ssl_parse_server_key_exchange() that could cause a crash on invalid input.
    + Fix a buffer overread in ssl_parse_server_psk_hint() that could cause a crash on invalid input.
  * Features:
    + Enable reading encrypted PEM files produced by software that uses PBKDF2-SHA2, such as OpenSSL 1.1. Submitted by Antonio Quartulli, OpenVPN Inc. Fixes #1339
    + Support public keys encoded in PKCS#1 format. #1122
  * New deprecations:
    + Compression and crypto don't mix. We don't recommend using compression and cryptography, and have deprecated support for record compression (configuration option MBEDTLS_ZLIB_SUPPORT).
  * Bugfix:
    + Fix mbedtls_x509_crt_profile_suiteb, which used to reject all certificates with flag MBEDTLS_X509_BADCERT_BAD_PK even when the key type was correct. In the context of SSL, this resulted in handshake failure. Reported by daniel in the Mbed TLS forum. #1351
    + Fix setting version TLSv1 as minimal version, even if TLS 1 is not enabled. Set MBEDTLS_SSL_MIN_MAJOR_VERSION and MBEDTLS_SSL_MIN_MINOR_VERSION instead of MBEDTLS_SSL_MAJOR_VERSION_3 and MBEDTLS_SSL_MINOR_VERSION_1. #664
    + Fix compilation error on Mingw32 when _TRUNCATE is defined. Use _TRUNCATE only if __MINGW32__ is not defined. Fix suggested by Thomas Glanzmann and Nick Wilson on issue #355
    + Fix memory allocation corner cases in memory_buffer_alloc.c module. Found by Guido Vranken. #639
    + Don't accept an invalid tag when parsing X.509 subject alternative names in some circumstances.
    + Fix a possible arithmetic overflow in ssl_parse_server_key_exchange() that could cause a key exchange to fail on valid data.
    + Fix a possible arithmetic overflow in ssl_parse_server_psk_hint() that could cause a key exchange to fail on valid data.
    + Fix a 1-byte heap buffer overflow (read-only) during private key parsing. Found through fuzz testing.
  * Changes
    + Fix tag lengths and value ranges in the documentation of CCM encryption. Contributed by Mathieu Briand.
    + Fix a typo in a comment in ctr_drbg.c. Contributed by Paul Sokolovsky.
    + Remove support for the library reference configuration for picocoin.
    + MD functions deprecated in 2.7.0 are no longer inline, to provide a migration path for those depending on the library's ABI.
    + Use (void) when defining functions with no parameters. Contributed by Joris Aerts. #678

OBS-URL: https://build.opensuse.org/request/show/593915
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=16
2018-04-07 18:53:14 +00:00
57b6639daf Accepting request 584224 from devel:libraries:c_c++
- Use more cmake macros
- Update spec file using spec-cleaner

OBS-URL: https://build.opensuse.org/request/show/584224
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=15
2018-03-12 11:07:47 +00:00
b19ab02e4a Accepting request 576327 from devel:libraries:c_c++
OBS-URL: https://build.opensuse.org/request/show/576327
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=14
2018-02-15 12:21:52 +00:00
8e9dc53b27 Accepting request 523556 from devel:libraries:c_c++
1

OBS-URL: https://build.opensuse.org/request/show/523556
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=13
2017-09-13 19:34:45 +00:00
a258e86dc4 Accepting request 509216 from devel:libraries:c_c++
- Update to version 2.5.1:

OBS-URL: https://build.opensuse.org/request/show/509216
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=12
2017-07-21 20:37:14 +00:00
a9fd66514d Accepting request 478689 from devel:libraries:c_c++
- Update to version 2.4.2:

OBS-URL: https://build.opensuse.org/request/show/478689
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=11
2017-03-15 00:04:37 +00:00
e3558034c2 Accepting request 440145 from devel:libraries:c_c++
- Update to version 2.4.0:

OBS-URL: https://build.opensuse.org/request/show/440145
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=10
2016-11-15 16:53:02 +00:00
6e59b5513a Accepting request 423405 from devel:libraries:c_c++
- Merge changes from home:X0F:HSF
- Add mbedtls_fix522.patch which fixes building of dpendant
  libraries

- Update description

- Split shared libraries to subpackages

- update to 2.3.0:
  * adding libmbedcrypto, libmbedx509
  * headers moved to /usr/include/mbedtls
  * remove compatibility symlink
  * source compatibility header /usr/include/mbedtls/compat-1.3.h
  * Use primary upstream license (Apache-2.0)

OBS-URL: https://build.opensuse.org/request/show/423405
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=9
2016-09-30 13:22:53 +00:00
547a91b29f Accepting request 408503 from devel:libraries:c_c++
- Update to version 1.3.17 (boo#988956):

OBS-URL: https://build.opensuse.org/request/show/408503
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=8
2016-07-21 05:52:59 +00:00
dc276d9720 Accepting request 352824 from devel:libraries:c_c++
- Update to 1.3.16

OBS-URL: https://build.opensuse.org/request/show/352824
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=7
2016-01-15 09:38:38 +00:00
Stephan Kulow
217a612d5a Accepting request 345044 from devel:libraries:c_c++
- Update to 1.3.15

OBS-URL: https://build.opensuse.org/request/show/345044
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=6
2015-11-24 21:31:51 +00:00
Stephan Kulow
22197980c8 Accepting request 337106 from devel:libraries:c_c++
- Update to 1.3.14
  * Added fix for CVE-2015-5291 (boo#949380) to prevent heap corruption due to buffer
    overflow of the hostname or session ticket. Found by Guido Vranken,
    Intelworks.

OBS-URL: https://build.opensuse.org/request/show/337106
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=5
2015-10-17 14:38:09 +00:00
5679e57a39 Accepting request 319258 from devel:libraries:c_c++
1

OBS-URL: https://build.opensuse.org/request/show/319258
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=4
2015-08-10 07:11:21 +00:00
79ddc99b19 Accepting request 312209 from devel:libraries:c_c++
1

OBS-URL: https://build.opensuse.org/request/show/312209
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=3
2015-06-24 18:24:54 +00:00
658f3b29c4 Accepting request 293983 from devel:libraries:c_c++
1

OBS-URL: https://build.opensuse.org/request/show/293983
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=2
2015-04-02 14:04:15 +00:00
a811e8daf5 Accepting request 293450 from devel:libraries:c_c++
Polarssl replacement

OBS-URL: https://build.opensuse.org/request/show/293450
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/mbedtls?expand=0&rev=1
2015-03-30 17:33:01 +00:00
9 changed files with 871 additions and 14 deletions

View File

@@ -1,11 +1,11 @@
<services>
<service name="obs_scm" mode="manual">
<param name="versionformat">3.6.1</param>
<param name="url">https://github.com/Mbed-TLS/mbedtls.git</param>
<param name="scm">git</param>
<param name="versionformat">@PARENT_TAG@</param>
<param name="revision">refs/tags/v3.6.4</param>
<param name="versionrewrite-pattern">v(.*)</param>
<param name="changesgenerate">enable</param>
<param name="exclude">.*</param>
<param name="revision">refs/tags/v3.6.1</param>
</service>
<service name="tar" mode="buildtime"/>
<service name="recompress" mode="buildtime">

View File

@@ -1,4 +1,4 @@
<servicedata>
<service name="tar_scm">
<param name="url">https://github.com/Mbed-TLS/mbedtls.git</param>
<param name="changesrevision">71c569d44bf3a8bd53d874c81ee8ac644dd6e9e3</param></service></servicedata>
<param name="changesrevision">c765c831e5c2a0971410692f92f7a81d6ec65ec2</param></service></servicedata>

View File

@@ -1,3 +0,0 @@
version https://git-lfs.github.com/spec/v1
oid sha256:a5dba8daab0f28e6a5b99734f7f562bbe68c8853b3df5234a03a3cc59b6d7aba
size 44750861

View File

@@ -1,3 +0,0 @@
version https://git-lfs.github.com/spec/v1
oid sha256:7a8c0377c4550810ca5dd168844533899606965ca614c5a63b484eac3557d0c4
size 45245453

3
mbedtls-3.6.4.obscpio Normal file
View File

@@ -0,0 +1,3 @@
version https://git-lfs.github.com/spec/v1
oid sha256:c3a49794f7649f6e32c58e0fb7c4c3993367c7d10ec4ec7974970dafb07d515d
size 46485517

11
mbedtls-enable-srtp.patch Normal file
View File

@@ -0,0 +1,11 @@
--- mbedtls-3.6.2.orig/include/mbedtls/mbedtls_config.h 2025-05-06 19:21:15.440302375 +0300
+++ mbedtls-3.6.2/include/mbedtls/mbedtls_config.h 2025-05-06 19:22:15.156469574 +0300
@@ -2024,7 +2024,7 @@
*
* Uncomment this to enable support for use_srtp extension.
*/
-//#define MBEDTLS_SSL_DTLS_SRTP
+#define MBEDTLS_SSL_DTLS_SRTP
/**
* \def MBEDTLS_SSL_DTLS_CLIENT_PORT_REUSE

View File

@@ -1,3 +1,850 @@
-------------------------------------------------------------------
Tue Jul 01 14:39:38 UTC 2025 - Jaime Marquínez Ferrándiz <jaime.marquinez.ferrandiz@fastmail.net>
- Update to version 3.6.4:
* Added generated files
* Version bump 3.6.4
* Assemble ChangeLog
* Properly initialize SSL endpoint objects
* Fix accidentally skipped test assertion
* Update framework pointer (release-sync)
* fix: additional MSVC v142 build issue with tls1.3 configuration enabled.
* Remove blank line
* Simplify changelog
* Add a note about processor memory reordering
* Add changelog
* Replace __attribute__((nonstring)) with macro MBEDTLS_ATTRIBUTE_UNTERMINATED_STRING
* Improve some explanations
* Don't mutate dst_size
* Add __attribute__ ((nonstring)) to remove unterminated-string-initialization warning
* Note that GCM is also impacted
* Adjust test case with invalid base64
* Fix race condition in mbedtls_aesni_has_support
* mbedtls_base64_decode: test dst=NULL with dlen>0
* Explain some aspects of the tests
* mbedtls_base64_decode: insist on correct padding
* Added CVE's to ChangeLogs
* lms.c: Updated documentation
* test_suite_lms.data: Updated comments
* Fix mbedtls_base64_decode() accepting invalid inputs with 4n+1 digits
* mbedtls_base64_decode: assert sloppy behavior with bad number of =
* mbedtls_base64_decode: test the reported output length
* test_suite_lms: Added negative test for corrupted Merkle path
* test_suite_lms: Added a test for importing invalid sized key
* Added changelog for check return of merkle leaf
* Added changelog for lms enum casting
* Added changelog for lms overread
* Fix change log entry
* Fix build test programs in MSVC (due to a warning treated as error in winbase.h)
* Built-in lms driver: always zeroize output-buffer in create_merkle_leaf_value
* Built-in lms driver:Check return values of Merkle node creation
* Built-in lms/lmots driver: Harden public key import against enum truncation
* Built-in lms driver: Added input guard
* Add changelog
* Add fix for PEM underflow
* Add test using underflow-causing PEM keyfile
* Update framework with additional operation initialization checks
* Fix possible UB in mbedtls_asn1_write_raw_buffer()
* Fix psa_pake_operation_s member types
* Move PAKE size calculation macros, cipher suite and operation structs
* Add change log
* Move the inclusion of crypto_sizes.h and crypto_struct.h in crypto.h
* Add ChangeLog entry
* Improve unit tests for mbedtls_asn1_store_named_data
* Fix bug in mbedtls_asn1_store_named_data()
* Add tests for bug in mbedtls_x509_string_to_names()
* Restore standard initializers in _init tests
* Use short initializers for multipart operation structures
* Avoid a useless copy in cert_{req,write}
* Mark ssl_tls12_preset_suiteb_sig_algs const
* Mark ssl_tls12_preset_default_sig_algs const
* Fix type in ChangeLog
* Add comment on apparent type mismatch
* Remove redundant free loop
* Fix ECDSA documentation: blinding is no longer optional
* ECDSA is a special flower
* Note functions that store the RNG callback in a context
* Reference mbedtls_f_rng_t in public documentation
* Name and document the type of random generator callbacks
* Add credit to the reporters of the PKCS7 issue
* Grammar in comments
* Remove .gitmodules
* Changelog entry for the union initialization fixes
* Test with GCC 15 with sloppy union initialization
* Initialize MAC context in internal functions for one-shot MAC
* Initialize MAC context in internal functions for KDF
* Initialize driver context in setup functions
* Add unit test for new behaviour of string_to_names()
* Fix memory leak in cert_write & cert_req
* Fix runtime error in cert_write & cert_req
* Restore behaviour of mbedtls_x509write_set_foo_name()
* Fix undocumented free() in x509_string_to_names()
* Improve comments
* Update framework
* Allow gcc-15 to be in $PATH
* Enable drivers when testing with GCC 15
* GCC 15: Silence -Wunterminated-string-initialization
* Test with GCC 15
* Disable warning from gcc -pedantic on dlsym/dlopen
* Move persistent key tests to a separate .data file
* Move concurrent tests to a separate .data file
* Update obsolete section title
* Complain about a missing comma in multiline lists of strings
* Prepare framework for pylint check-str-concat-over-line-jumps
* framework: update reference
* Constify cipher_wrap:mbedtls_cipher_base_lookup_table
* Fix some test helper functions returning 0 on some failures
* Check the status of mbedtls_ssl_set_hostname()
* Add missing ifdef for mbedtls_ssl_tls13_exporter
* Add label_len argument to non-PSA tls_prf_generic
* Fix dependencies for TLS-Exporter tests
* Fix doxygen for MBEDTLS_SSL_KEYING_MATERIAL_EXPORT
* Fix mistake in previous comment change
* Fix HkdfLabel comment
* Allow maximum label length in Hkdf-Expand-Label
* Exporter: Add min. and max. label tests
* Fix max. label length in key material exporter
* Document BAD_INPUT_DATA error in key material exporter
* Fix requirements for TLS 1.3 Exporter compat test
* Use mbedtls_calloc, not regular calloc
* Add fixed compatibility test for TLS 1.3 Exporter
* Remove exporter compatibility test for TLS 1.3
* Fix openssl s_client invocation
* Print names of new tests properly
* Fix memory leak in example programs
* ssl-opt.sh: Add tests for keying material export
* mbedtls_test_ssl_do_handshake_with_endpoints: Zeroize endpoints
* Exporter tests: Don't use unavailbable constant
* Exporter tests: Add missing depends-ons
* Use one maximum key_len for all exported keys
* Exporter tests: Reduce key size in long key tests
* Exporter tests: Free endpoints before PSA_DONE()
* Exporter tests: Fix possible uninitialized variable use
* Coding style cleanup
* Exporter tests: Initialize allocated memory
* Exportert tests: Free endpoints and options
* Fix output size check for key material exporter
* Increase allowed output size of HKDF-Expand-Label
* Add more tests for keying material export
* Mention MBEDTLS_SSL_KEYING_MATERIAL_EXPORT in change log
* Fix #endif comment
* Enable MBEDTLS_SSL_KEYING_MATERIAL_EXPORT by default
* Create MBEDTLS_SSL_KEYING_MATERIAL_EXPORT option
* Remove TLS 1.2 Exporter if we don't have randbytes
* Revert "Store randbytes for TLS 1.2 TLS-Exporter"
* Fix typos in comments
* Use fewer magic numbers in TLS-Exporter functions
* Add label length argument to tls_prf_generic()
* Store randbytes for TLS 1.2 TLS-Exporter
* Fix coding style
* Fix build when one of TLS 1.2 or 1.3 is disabled
* Fix coding style
* Fix TLS exporter changelog entry
* Fix doxygen comment parameter name
* Fix typos in comment
* Fix mismatches in function declarations
* Fix key_len check in TLS-Exporter
* Actually set exporter defaults in ssl_client2
* Simplify mbedtls_ssl_tls13_exporter
* Add test for TLS-Exporter in TLS 1.3
* Fix commented out function declaration
* Add changelog entry for TLS-Exporter feature
* Add TLS-Exporter options to ssl_client2
* Add TLS-Exporter options to ssl_server2
* Implement TLS-Exporter feature
* programs: demo: do not source project_detection.sh directly
* Fix record insertion
* programs: demo: source project_detection.sh
* framework: update reference
* Update feature macro for 3.6
* Use HANDSHAKE_OVER in nominal test cases
* Improve comments
* Adapt dependencies to the 3.6 branch
* Use same dependencies for helper functions
* Tighten dependencies again
* Improve dependency declarations
* Tighten dependency declarations
* Improve documentation
* Remove redundant setup
* Fix copypasta
* Simulate closing the connection mid-message
* Also test inserting non-empty, non-handshake records
* Fix the build without MBEDTLS_DEBUG_C
* Fix the build in PSK-only configurations
* Fix printf of enum
* Pacify ancient clang -Wmissing-initializer
* Test split, coalesced-split and empty handshake records
* Create handshake record coalescing tests
* Document gotcha of move_handshake_to_state
* Add a log message on every SSL state transition
* Always call mbedtls_ssl_handshake_set_state
* Document assumption of mbedtls_get_pkcs_padding
* Modify ChangeLog entry to full plaintext recovery
* Add testcase for maximum padding length
* Remove unnecessary TEST_CF_PUBLIC macro call
* Update to the new name in usages as well
* Add missing credit for set_hostname issue
* cmake: Generate test_keys.h and test_certs.h in the build tree
* Update framework pointer
* Revert "Add auto-generated files"
* Restored framework as a submodule
* Deleted flattened framework dir.
* Appease check-names with prefix
* Disable check-names for static padding function
* Add ChangeLog entry for PKCS#7 side channel fix
* Fix timing side-channel in PKCS7 padding
* Add constant-flow testing for PKCS7 padding
-------------------------------------------------------------------
Wed May 07 22:09:39 UTC 2025 - Yoshio Sato <vasua.ukraine@gmail.com>
- Update _service file to easier obtain new sources.
- Update to version 3.6.3:
* Add auto-generated files
* Added framework as a flattened directory
* Unlinked framework as a submodule.
* Updated BRANCHES.md
* Finalise ChangeLog
* Version Bump for 3.6.3
* Assemble Changelog
* Changelog: Added CVE.
* ssl-opt: Added 4 and 128 bytes tests to HS defragmentation for server initiated reneg
* ssl-opt: Fixed a minor typo.
* Reword slightly to be more tentative
* Re-introduce log asserts on positive cases
* Improve a test assertion
* Fix a typo
* Add test cases for EOF in the middle of fragments
* Adjust logic around log pattern
* Add test for length larger than 2^16
* Adapt "large ClientHello" tests to incremental
* Cleanly reject non-HS in-between HS fragments
* Reduce the level of logging used in tests
* Move new tests to their own data file
* Fix dependency issues
* New test function for large ClientHello
* Fix hash dependencies for TLS 1.2 tests
* Fix curve dependencies
* Add missing dependency declaration
* Fix dependency issues
* Add test with non-HS record in-between HS fragments
* Add test to TLS 1.3 ClientHello fragmentation
* Add reference tests with 1.3 ClientHello
* Add supported_curves/groups extension
* New test function inject_client_content_on_the_wire()
* ssl-opt: Disabled the renegotiation delay for fragmented HS renegotiation.
* ssl-opt: Updated documentation.
* ssl-opt: Added client-initiated server-rejected renegotation test.
* ssl-opt: Updated O_NEXT_CLI_RENEGOTIATE used by fragmented HS renegotiation with certificates.
* ssl-opt: Fragmented HS renegotiation, removed -legacy_renegotiation argument.
* ssl-opt: Fragmented HS renegotiation, removed requires_certificate_authentication dependency.
* ssl-opt: Fragmented HS renegotiation, removed requires_openssl_3_x dependency.
* ssl-opt: Fragmented HS renegotiation, adjusted test names for consistency.
* ssl-opt: Fragmented HS renegotiation, updated matching regex
* ssl-opt: Added coverage for client-initiated fragmented HS renegotiation tests.
* ssl-opt: Refactored fragmented HS renegotiation tests.
* ssl-opt: Fragmented HS renegotiation, updated documentation.
* ssl-opt: Removed mock-tests from HS renegotiation.
* sll-opt: Added refence fix for the Mock HS Defrag test using renegotitiation delay
* programs -> ssl_client2.c: Added option renego_delay to set record buffer depth.
* Added Mock Renegotiation negative test for testing.
* ssl-opt: Added fragmented HS tests for server-initiated renegotiation.
* ssl-opt: Added fragmented HS tests for client-initiated renegotiation.
* ssl-opt: Added fragmented HS tests for SSL_VARIABLE_BUFFER_LENGTH.
* Add note about MBEDTLS_PRIVATE() in 3.6
* Fix typos in the 3.0 migration guide
* mbedtls_net_send API description typo fix
* Use an array of strings instead of pointer smuggling
* Use dummy typedef instead of macro
* Clarify changelog
* Updated framework pointer.
* Update the location of defragmentation limitations
* State globally that the limitations don't apply to DTLS
* Clarify DTLS
* ClientHello may be fragmented in renegotiation
* Move the defragmentation documentation to mbedtls_ssl_handshake
* Refer to the API documentation for details
* Document the limitations of TLS handshake message defragmentation
* Add changelog entry for TLS 1.2 Finished fix
* More generally, what needs psa_crypto_init also needs threading
* PSA core: Allow enabling one volatile/builtin key
* Cleanly reject non-HS in-between HS fragments
* Replace zero by PSA_ALG_NONE in key derivation input functions
* Fix comments
* Update changelog to call out MinGW
* TLS1.2: Check for failures in Finished calculation
* Never use %zu on MinGW
* Remove Everest VS2010 compatibility headers
* Fix MSVC version guard for C99 format size specifiers
* Disable fatal assertions in Windows printf tests
* Add testcase for MBEDTLS_PRINTF_MS_TIME
* Test handling of format macros defined in debug.h
* Run test_suite_debug without MBEDTLS_SSL_TLS_C
* Fix a log message
* Note unused variables when debugging is disabled
* Pacify uncrustify
* Fix uninitialized variable
* Unify handshake fragment log messages
* Fix handshake defragmentation when the record has multiple messages
* Fix end check before memmove
* Zeroize temporary heap buffers used when deriving an ECC key
* Zeroize temporary heap buffers used in PSA operations
* Update framework
* Make conversion explicit to silence MSVC warning
* Fix dodgy printf calls
* Handshake defragmentation: reassemble incrementally
* mbedtls_ssl_prepare_handshake_record(): log offsets after decryption
* mbedtls_ssl_prepare_handshake_record(): refactor first fragment prep
* Tweak handshake fragment log message
* Tweak "waiting for more handshake fragments" log message
* Fix Doxygen markup
* Update framework
* Generate handshake defragmentation test cases: update analyze_outcomes
* Switch to generated handshake tests
* Normalize requirements in defragmentation test cases
* Normalize messages in defragmentation test cases
* Normalize whitespace in defragmentation test cases
* Move most TLS handshake defragmentation tests to a separate file
* New generated file: tests/opt-testcases/handshake-generated.sh
* Fix code style for key derivation input function
* Replace zero by PSA_ALG_NONE in key derivation test function
* Replace zero by PSA_ALG_NONE in key derivation testing
* Simplify testing psa_key_derivation_input_*() bad state
* Fix psa_key_derivation_input_integer() not detecting bad state
* framework: update reference
* ssl-opt: Re-introduce certificate dependency for HS negative tests.
* ssl-opt: Removed dependencies for HS defrag negative tests.
* ssl-opt: Adjusted reference hs defragmentation tests.
* ssl-opt: Minor typos and documentation fixes.
* analyze_outcomes: Temporary disabled 3 HS Degragmentation tests.
* ssl-opt: Updated documentation of HS-Defrag tests.
* ssl-opt: Removed redundant dependencies: requires_openssl_3_x
* ssl-opt.sh: Disabled HS Defrag Tests for TLS1.2 where len < 16
* ssl-opt: Replaced max_send_frag with split_send_frag
* ssl-opt: Added coverage for hs defragmentation TLS 1.2 tests.
* ChangeLog: Updated the entry for tls-hs-defragmentation
* ssl-opt: Updated documentation.
* ssl-opt: Added negative tests for handshake fragmentation.
* ssl-opt: Added handshake fragmentation tests for 4 byte fragments.
* ssl-opt: Added negative-assertion testing, (HS Fragmentation disabled)
* ssl-opt: Added tls 1.2 tests for HS defragmentation.
* ssl-opt: Dependency resolving set to use to requires_protocol_version HS deframentation tests.
* ssl-opt: Adjusted the wording on handshake fragmentation tests.
* ssl-opt: Added requires_openssl_3_x to defragmentation tests.
* ssl-opt: Updated the keywords to look up during handshake fragmentation tests.
* Add missing client certificate check in handshake defragmentation tests
* Test Handshake defragmentation only for TLS 1.3 only for small values
* Add guard to handshake defragmentation tests for client certificate
* Add a comment to elaborate using split_send_frag in handshake defragmentation tests
* Enforce client authentication in handshake fragmentation tests
* Remove unneeded mtu option from handshake fragmentation tests
* Add client authentication to handshake defragmentation tests
* Require openssl to support TLS 1.3 in handshake defragmentation tests
* Remove unnecessary string check in handshake defragmentation tests
* Fix typo in TLS Handshake defrafmentation tests
* Improve TLS handshake defragmentation tests
* Add TLS Hanshake defragmentation tests
* Document the need to call mbedtls_ssl_set_hostname
* Improve documentation of mbedtls_ssl_set_hostname
* Expand and rectify the documentation of mbedtls_ssl_context::hostname
* Changelog entries for requiring mbedls_ssl_set_hostname() in TLS clients
* Add a note about calling mbedtls_ssl_set_hostname to mbedtls_ssl_setup
* Run part of ssl-opt.sh in full_no_deprecated
* changelog: add note for MD changes
* crypto_extra: improve description of psa_can_do_hash()
* psa: move definition of psa_can_do_hash() to crypto_extra.h
* docs: update md-cipher-dispatch
* adjust_legacy_crypto: improve enablement of MBEDTLS_MD_xxx_VIA_PSA
* md: allow dispatch to PSA whenever CRYPTO_CLIENT is enabled
* adjust_legacy_crypto: move auto-enabling of CRYPTO_CLIENT when CRYPTO_C
* Document PSA's need for threading
* Update framework pointer
* Update documentation regarding metatest
* Update documentation regarding test_zeroize
* Update path to demo_common.sh
* Update path for moved test_zeroize.gdb script
* Update paths for moved programs in generate_visualc_files.pl
* Update paths for moved dlopen_demo.sh
* Update paths for moved program files in CMakeLists
* Update include paths in C files
* Update paths for moved program files in makefiles
* Remove unused variable in ssl_server.c
* Update the changelog message
* Remove obselete checks due to the introduction of handhsake defragmen...
* Add a note about badmac_seen's new name in ssl_context_info
* Fix Doxygen misuse
* Add MBEDTLS_FRAMEWORK_DIR variable to CMake
* Don't reset badmac_seen on a DTLS client reconnect
* Merge in_hsfraglen with badmac_seen_or_in_hsfraglen
* Change the type of in_hsfraglen to unsigned
* Rename badmac_seen to badmac_seen_or_in_hsfraglen
* Minor readability improvement
* Remove in_hshdr
* Add a safety check for in_hsfraglen
* Allow fragments less HS msg header size (4 bytes)
* Remove mbedtls_ssl_reset_in_out_pointers
* Review comments
* Update ChangeLog.d/tls-hs-defrag-in.txt
* Defragment incoming TLS handshake messages
* Move programs out of Mbed TLS
* mbedtls_ssl_set_hostname tests: add tests with CA callback
* Call mbedtls_ssl_set_hostname in the generic endpoint setup in unit tests
* Require calling mbedtls_ssl_set_hostname() for security
* Create configuration option to bypass the mbedtls_ssl_set_hostname check
* Create error code for mbedtls_ssl_set_hostname not called
* Keep track of whether mbedtls_ssl_set_hostname() has been called
* Update the documentation of ssl->hostname
* Access ssl->hostname through abstractions
* mbedtls_ssl_set_hostname tests: baseline
* Automate MBEDTLS_X509_TRUSTED_CERTIFICATE_CALLBACK dependency
* Make guards more consistent between X.509-has-certs and SSL-has-certs
* Fix Doxygen markup
* framework: update reference
* components-compliance.sh: update references to test_psa_compliance.py
* components-configuration.sh: update references to test_psa_constant_names.py
* Move files out of Mbed TLS
* test_suite_ssl: update description for conf_curve and conf_gruop tests
* test_suite_ssl: add ECDHE-RSA case for handshake_fragmentation()
* test_suite_ssl: add new ECDHE-RSA tests
* Update tf-psa-crypto/drivers/builtin/src/ecp.c
* Fix missing-word typo
* Add paragraph on undefined behaviour
* Add X.509 formatting validation to SECURITY.md
* Fix incorrect test function
* Remove useless dependency from test function
* Add ignore list entries for ECDH/FFDH algorithm without key type
* Remove test coverage exceptions that are no longer needed
* Update framework
* Update framework pointer
* Stop recommended deprecated function in migration guide
* config.py: Simplify crypto config default path setting
* framework: update reference
* components-build-system.sh: align component_test_cmake_as_package
* Move files out of Mbed TLS
* framework: update reference
* scripts: add new min_requirements.py script
* Move files out of Mbed TLS
* PSA interruptible sign/verify: detect invalid curve family in start
* framework: update reference
* component-basic-checks: fix paths of files moved to framework
* Move files out of Mbed TLS
* framework: updated reference
* scripts: fix paths for files moved to framework
* Move files out of Mbed TLS
* Update framework submodule
* Remove test coverage exceptions that are no longer needed
* crypto_config.h: Don't list mechanisms that are not implemented
* Update submodule
* Update submodule with the merge
* Update submodule
* Adujst paths
* Move files out of Mbed TLS
* Update submodule with the merge
* Update submodule
* Adjust paths
* Move files out of Mbed TLS
* Add change log entry on AES-NI asm block fixes
* Specify previously missed XMM register clobbers in AES-NI asm blocks
* Specify register clobbers in mbedtls_aesni_crypt_ecb()
* Update framework to the merge of #99
* Update framework
* Create a new Python module used by generate_psa_tests.py
* Fix `make dir/file` not rebuilding existing files
* Remove Invalid import/export key test
* Fix export public-key opaque key test paramters
* make: Add missing dependency
* Move test_keys.h to include/test
* Fix incorrect submodule error message in CMake
* Fix incorrect submodule error message in Makefile
* Update submodule with the merge
* Added debug print in tls13 ssl_tls13_write_key_share_ext
* Update submodule
* Adapt paths for scripts/quiet
* Adapt paths for output_env.sh
* Move files out of Mbed TLS
* Refactor scripts to use config.py instead of config.pl
* Remove obsolete tcp_client.pl
* Remove obsolete Travis CI scripts
* Remove obsolete Docker CI scripts
* Distinguish between MBEDTLS_PSA_CRYPTO_C and MBEDTLS_PSA_CRYPTO_CLIENT
* FFDH in TLS: it's only a limitation for TLS 1.2, not TLS 1.3
* Fix copypasta
* reworked changelog according to suggestion
* Added changelog
* Make mbedTLS compile with MS-DOS DJGPP
* Update submodule to point to main
* Define FRAMEWORK
* Fix paths
* Use new functions
* Add project and branch detection in shell
* p256-m: allow deterministic ECDSA verification
* PSA interruptible sign/verify: detect unsupported mechanism in start
* Add missing resource cleanup on test failure
* Fix edge case with half-supported ECDSA (manual test cases)
* Move back *config_test_driver* headers from the framework
* Add some missing test case dependencies
* Update framework submodule
* import_not_supported: edge case of unsupported curves
* PSA sign/verify: more uniform error on an unsupported hash
* Update framework to add ported test helper changes
* Update framework submodule
* Update framework submodule
* Update framework submodule
* Properly clean instrument_record_status.h
* Reverse accidental docs PSA test wrappers path
* Add missing dependency to hash testsuite
* Disable test hooks when checking missing symbols
* Move mbedtls_test_hook_error_add from error.c to helpers.c
* Add missing include path to visual C script
* Update test_keys.h path on Windows
* Update paths to generated PSA test wrappers
* Update generate path to instrument_record_status.h
* Update path to PSA crypto alt headers
* Add extra paths to generate_visualc_files.pl
* Update make clean target with moved test helpers
* Update test_keys.h generation in Makefile
* Update libtestdriver paths in tests/Makefile
* Add tests/Makefile targets for moved test helpers
* Update common.mk with test helper object paths
* Add framework test include path to common.mk
* Add SSL-related test includes to ssl programs
* Add the framework/tests/include path to testsuites
* Re-add tests/include and tests/src paths to tests
* Add missing extra include path to fuzzer programs
* Re-add tests/include path for test helpers
* Update references to test helpers
* Move some test helpers out of Mbed TLS
* Update framework pointer
* Fix documentation for GCM decryption functions
* Fix issue where input data could be length 0
* Fix check_names errorr for MBEDTLS_GCM_ALT comment
* Update path to all-core.sh
* Update framework pointer
* Move all-{core,helpers}.sh out of Mbed TLS
* Fix TEST_CALLOC issues with GCM buffer overlap tests
* Add test cases for AES GCM input and output buffer overlap
* Update GCM buffer overlap documentation
* Fix MD_PSA_INIT called before initializing some data structures
* Update submodule with the merge
* all.sh: improve check for clean config files
* all.sh: rationalize relative path usage
* Fix undefined variable in CMakeLists.txt
* Fix undefined variable in makefile
* Improve makefile error message
* Improve submodule error messages for Github archives
* Add a Python utility function to get the 3.6 feature macro
* Skip slowest FFDH tests against GnuTLS with MSan or Valgrind
* Don't use Unicode in .function file
* More explanation of what we do and do not test
* Add changelog entry
* mbedtls_psa_ecp_generate_key: don't calculate the public key
* Basic statistical tests for mbedtls_psa_ecp_generate_key()
* Unit tests for mbedtls_psa_ecp_generate_key()
* Rm forgotten armc5
* Drop building with armcc5 in all.sh
* Add override arguments for new gcc targets
* Clarify GCC version requirement
* Split up the Thumb-1 test component
* Remove superfluous invocations of make clean
* Update component speed estimates
* Initialize result caching variables
* Use true/false in place of integers
* Ignore missing temporary files during cleanup
* Fix copypasta in gcc_version
* Add AArch64 default config test
* Add Arm eabi default config tests
* Changelog entry for ECDSA conversion functions called with bits=0
* Remove unreachable assignments
* Assert non-empty data when needed
* Initialize CCM context before doing anything fallible
* mbedtls_ecdsa_raw_to_der and mbedtls_ecdsa_der_to_raw: reject bits==0
* Document errors for mbedtls_ecdsa_raw_to_der and mbedtls_ecdsa_der_to_raw
* mbedtls_mpi_write_binary{,_le}: test 0-size output
* Modernize mpi_write_binary and mpi_write_binary_le
* Disentangle 3.6/4.0 *_PSA_INIT/DONE variants
* Pair inits with declarations
* Move AES_PSA_INIT to after drbg init
* CMakeLists: use -O2 as ASAN_FLAG only in GCC versions before 7.0
* Revert "Temporarily comment out tests that are clogging the CI"
* Fix double free in case of test failure
* Add missing check of return
* Add const specifiers to pacify armclang
* Fix tests where tests were done prior to init
* Harmonise names of MBEDTLS_TEST_HAVE_ macros
* Tidy up header guards
* net/mbedtls_net_connect: Preventing double close problem
* fix PR9302 backporting issues
* changelog: fix typo
* changelog: updated description
* changelog: updated description
* changelog: describe support for static key slot buffers
* Documentation: fix some nits
* psa: move definition of MBEDTLS_PSA_KEY_BUFFER_MAX_SIZE
* test_suite_psa_crypto.data: fix some depends_on
* psa_crypto_helpers: add guard for MBEDTLS_TEST_STATIC_KEY_SLOTS_SUPPORT_RSA_xxx
* components-basic-checks: add new exception for MBEDTLS_CTR_DRBG_MAX_REQUEST
* test_suite_psa_crypto: use finer grained checks on the key slot buffer size
* psa_crypto_helpers: enhance definitions for static key slot related test symbols
* psa_crypto_helpers: add MBEDTLS_TEST_ prefix to newly created symbols
* psa: move default definition of MBEDTLS_PSA_STATIC_KEY_SLOT_BUFFER_SIZE
* test: disable dynamic key store in test_crypto_with_static_key_slots
* check_config: prevent fully dynamic and static key stores to be enabled simultaneously
* psa: zeroize static key buffer content when key slot is freed
* test_suite_psa_crypto_storage_format: improve input bit length specification for static key buffer
* test: properly select MBEDTLS_PSA_STATIC_KEY_SLOT_BUFFER_SIZE value
* mbedtls_config: fix/improve descriptions of PSA_STATIC_KEY_SLOT symbols
* psa: fix some macro definition
* test: add test with persitent key whose length is larger than MBEDTLS_PSA_STATIC_KEY_SLOT_BUFFER_SIZE
* test: extend component_test_crypto_with_static_key_slots
* psa-core: remove unnecessary element in psa_key_slot_t
* psa_crypto_core: take also cipher's key length into account when sizing static key buffer
* test: revert fixes for PSA entropy
* test_suite_psa_crypto_driver_wrappers: revert changes and fix validate_key()
* psa-core: properly set PSA_CRYPTO_MAX_STORAGE_SIZE
* test: disable all legacy symbols in test_psa_crypto_without_heap
* test: minor fixes to test_psa_crypto_without_heap and test_crypto_with_static_key_slots
* mbedtls_config: fix descriptions for PSA static key slots
* mbedtls_config: move MBEDTLS_PSA_STATIC_KEY_SLOT_BUFFER_SIZE to the correct place
* test: add new component to test core library without calloc/free
* test: add new component to test MBEDTLS_PSA_STATIC_KEY_SLOTS
* psa: allow to use static key buffers instead of dynamic ones
* Re-add special case for 3.6
* Only guard with CRYPTO_CLIENT when version >= 4
* Regenerate PSA test wrappers
* Align 3.6 tests/{src,include} with development PR
* Update framework
* Fix a typo in a comment
* all.sh: fix missing quotes
* Update framework to main
* Update submodule after the merge
* all.sh: adjust for when tf-psa-crypto is absent
* all.sh: re-instate 3.6-specific code
* all.sh: update documentation
* all.sh: move top-level code to a function
* all.sh: document new file structure
* all.sh: move definitions to all-core.sh
* all.sh: wrap main code into main() function
* all.sh: move clang_version() to helpers file
* all.sh: move component helpers to separate file
* all.sh: Move some functions to the right section
* all.sh: rename a helper function
* all.sh: extract repeated code to a function
* all.sh: group psasim helpers
* all.sh: rm obsolete functions
* all.sh: first define functions, then call them.
* all.sh: temporary alignment with development
* all.sh: align-dev: PSAsim functions
* all.sh: align-dev: tf-psa-crypto stuff
* all.sh: align-dev: move functions to the right place
* all.sh: align with development: whitespace
* Add "common.h"
* Update submodule
* Adjust file path for translate_ciphers.py
* Adjust file path for generate_tls13_compat_tests.py
* Adjust file path for generate_ssl_debug_helpers.py
* Move some files to framework repository
* Declare a generated file that was added after 3.6.1
* Revert "Add generated files"
* Temporarily comment out tests that are clogging the CI
* Work around GCC 5 performance problem with Asan+UBSan and -O3
* Improve support for submodules in code_style.py
* Minor readability improvements
* Remove ignore list entries that don't apply in 3.6
* framework: Fix overly lenient config tests for PSA_WANT_xxx
* Switch outcome analysis to enforcing that all tests are executed
* Add ALT-adjacent config option to the test coverage ignore list
* Add missing algorithm in the test driver configuration
* Add ignore list entries for configurations that are not tested
* Add ignore list entries for crypto tests that are not executed
* Add ignore list entries for TLS tests that are not executed
* Remove test case involving SECP224K1 in PSA
* In PSA generated tests, ignore patterns for which an issue has been raised
* In PSA generated tests, don't ignore not-implemented in some negative tests
* In PSA generated tests, ignore mechanisms that are not implemented
* Fix driver schema json default type requirements
* Update framework to the branch with collect_test_cases.py and outcome_analysis.py
* Default to allowing partial test coverage
* Downgrade mypy to a version that works with our code base
* Upgrade mypy to the last version supporting Python 3.6
* Move test case analysis modules to framework repository
* Adjust paths for impending moves to the framework
* Separate code and data of outcome analysis
* Pass KNOWN_TASKS as an argument to main
* Typecheck main
* Don't reuse a variable name inside a function
* Missing NotImplementedError in abstract method
* Remove sample ignore list elements for coverage
* Create a module to split branch-independent code out of analyze_outcomes.py
* Split test case collection from checks
* Create a module to split test case collection from checks
* check_test_cases.py: make 3.6 identical with development
* Don't use the "allow list" terminology any longer
* Switch coverage analysis to IGNORE_TESTS for its allowlist
* Simplify sub-test-suite handling in is_test_case_ignored
* Move test case ignore list to the master Task class
* Remove now-useless level of method call indirection
* Move analysis functions into their respective classes
* Remove dead code that was handling stringly typed data
* Replace stringly typed data by class: driver vs reference (data)
* Replace stringly typed data by class: driver vs reference (code)
* Replace stringly typed data by class: coverage
* Replace stringly typed data by class: prepare
* Allow running pylint and mypy on a single file
* Remove "error" allowance in dtls_server
* dtls_server: allow unexpected messages during handshake
* Update submodule
* Update submodule to the head of framework PR
* Expand on block cipher modes/derivatives
* Update framework to the main branch
* Expand on key derivations
* Clarify the superset rule
* Update and refine notes on restartable ECC and 4.0
* Skip ssl_server in config-suite-b
* Use OPENSSL_NEXT for a test case that uses IPv6 when available
* Note known issue about test cases skipped in TLS 1.3-only builds
* Test SSL sample programs against each other and ssl_client2, ssl_server2
* dtls_client: don't force the use of IPv6
* ssl_server: Allow the client to close the connection first
* Compatibiliy with older OpenSSL and GnuTLS
* Declare GnuTLS version dependency for TLS 1.3 test cases
* Declare OpenSSL version dependency for TLS 1.3 test cases
* Test dtls_server
* Test ssl_fork_server
* Test ssl_pthread_server
* Test ssl_server
* Test dtls_client
* Test ssl_client1
* Allow test cases to use a specific port
* Prepare to test SSL sample programs
* ssl_client1: Exit with an error status if the TLS connection failed
* Don't pass the section name to adapters
* Change "realfull" to activate everything
* Change "full" to affect boolean settings rather than use sections
* Pass the setting's value to adapters
* Have `make ssl-opt` generate `tls13-compat.sh` (make edition)
* Have `make ssl-opt` generate `tls13-compat.sh`
* Fix copypasta
* armv8 AES, SHA: simplify structure and fix copypasta
* Use .s extension for assembly
* Ignore and clean generated assembly
* Add target to compile to assembly
* Use -O2 for build+test with earliest compilers
* Fix spurious * in regex
* Don't set LD to a path with a typo for mingw
* Remove PSA macros usage from adapters
* CMake: generate tls13-compat.sh in the default build target
* Move generation of tls13-compat.sh to tests/CMakeLists.txt
* Print a "Gen" line when generating a file
* Remove obsolete requirement for GnuTLS %DISABLE_TLS13_COMPAT_MODE
* Reduce level of non-error debug message
* Remove transitional always-on internal option
* Changelog entry: fix #9551
* Fix sensitivity of tls13-compat.sh to the exact generation method
* Automatically generate tests/opt-testcases/tls13-compat.sh
* generate_tls13_compat_tests: change default mode to all
* Remove obsolete requirements on middlebox compatibility mode: generated
* Remove obsolete requirements on middlebox compatibility mode: manual
* Remove mid-stanza blank lines
* Adapt middlebox compatibility tests for always-on acceptance
* Separate accepting TLS 1.3 middlebox compatibility from sending it
* Avoid multiline requires_all_configs_xxx
* Remove test-ref-configs.pl, which no longer does anything
* Move config-tfm.h testing to separate all.sh component
* Move config-symmetric-only.h testing to separate all.sh components
* Move config-thread.h testing to separate all.sh components
* Move config-suite-b.h testing to separate all.sh components
* Move config-ccm-psk-dtls1_2.h testing to separate all.sh components
* Move config-ccm-psk-tls1_2.h testing to separate all.sh components
* Move config-no-entropy.h testing to separate all.sh component
* make: support "make ssl-opt" to just build what ssl-opt.sh needs
* CMake: support "make ssl-opt" to just build what ssl-opt.sh needs
* CMake: support "make programs"
* Fix obsolete comment about MBEDTLS_PSA_CRYPTO_KEY_ID_ENCODES_OWNER
* Update framework
* Remove unused `CombinedConfig` class
* Update old class names
* Use MbedTLSConfig for config handling to keep campatibility
* Apply the parameter change
* Fix documentation
* Update member variable names
* Fix documentation
* Update `config.py` to use `config_common.py` from the framework
* Document the C compiler requirement
* Make the file a bit more readable
* Remove some dependencies
* Add PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_IMPORT
* Replace MBEDTLS_PK_CAN_ECDSA_SOME with MBEDTLS_PK_CAN_ECDSA_SIGN
* Add missing ALG_SHA_1
* opt-testcases/*.sh are not executable
* requires_certificate_authentication: prioritize TLS 1.3
* Documentation improvements
* Fix detection of TLS 1.2 PSK-ephemeral key exchange modes
* Improve some comments
* Remove unused auth_mode parameter on a PSK test case
* Fix weirdly quoted invocations of requires_any_configs_enabled
* Also activate PSK-only mode when PSK-ephemeral key exchanges are available
* Unify the two requires-key-exchange-with-certificate function
* Detect PSK-only mode in TLS 1.3 as well
* Fix PSK-only mode doing less than it should
* Detect more cases where certificates are required
* ssl-opt: Fix GnuTLS PSK injection
* Use CONFIGS_ENABLED instead of repeatedly calling query_compile_time_config
* Fix "Renegotiation: openssl server, client-initiated" with OpenSSL 3
* tests: add a test for pkg-config files
* Update framework to the merge of #45
* Update framework
* Clarify summary of PSA limitations
* Misc minor clarifications in transition-guards.md
* Clarify a comment in all.sh
* Fix some typos & markdown
* Add links and missing )
* Minor updates in doc/comments/debug
* Add transition-guards.md
* Update psa-migration/strategy.md
* Update psa-limitations.md and add summary
* Use libary default in ssl_client2 for new_session_tickets
* Add guard on internal 1.2-only function
* Misc improvements to comments
* Make error line consistent with the header
* Fix code style (for real this time, hopefully)
* Fix guards on #include
* Fix code style
* Prepare codepath tests for early termination
* Fix incorrect test result
* Move bignum code path testing out of the library
* Explain the choice of the value of MBEDTLS_MPI_IS_PUBLIC
* Initial local variables to secure default
* Introduce MBEDTLS_MPI_IS_TEST
* Add tests for optionally safe code paths in RSA
* Add tests for optionally safe code paths in bignum
* Revert "Add generated files"
* Leave the spaces in psa-transition.md
* Fix typo in psa-transition.md
* ccm.c: Return early when ccm* is used without tag.
* Remove test_valgrind_constant_flow_psa_no_asm
* Tiny fix in library/constant_time_impl.h
* Remove the hack in library/constant_time_impl.h
* Edit component_release_test_valgrind_constant_flow_no_asm
* Change valgrind constant flow testing to test without asm
* Disable asm in component_test_memsan
* Alter constant-flow memsan testing
* Corrected header line of analyze_driver_vs_reference
* ssl_client2: Add Host to HTTP GET request
-------------------------------------------------------------------
Tue May 6 16:37:59 UTC 2025 - Yoshio Sato <vasua.ukraine@gmail.com>
- Enable SRTP protocol needed by some software.
* Add patch mbedtls-enable-srtp.patch
-------------------------------------------------------------------
Thu Oct 17 09:38:18 UTC 2024 - Pedro Monreal <pmonreal@suse.com>
- Update to version 3.6.2: [bsc#1231708, CVE-2024-49195]
* test_suite_pkwrite: extend coverage of wrong output buffer
sizes in pk_write_check_common()
* pkwrite: fix buffer overrun
-------------------------------------------------------------------
Sat Sep 07 12:00:00 UTC 2024 - cunix@mail.de

View File

@@ -1,4 +1,4 @@
name: mbedtls
version: 3.6.1
mtime: 1725009114
commit: 71c569d44bf3a8bd53d874c81ee8ac644dd6e9e3
version: 3.6.4
mtime: 1750881360
commit: c765c831e5c2a0971410692f92f7a81d6ec65ec2

View File

@@ -22,7 +22,7 @@
%define lib_everest libeverest
%define lib_p256m libp256m
Name: mbedtls
Version: 3.6.1
Version: 3.6.4
Release: 0
Summary: Libraries for crypto and SSL/TLS protocols
License: Apache-2.0 OR GPL-2.0-or-later
@@ -31,6 +31,8 @@ Source: %{name}-%{version}.tar.gz
Source99: baselibs.conf
# PATCH-FEATURE-OPENSUSE - enable MBEDTLS_THREADING_PTHREAD and MBEDTLS_THREADING_C
Patch1: mbedtls-enable-pthread.patch
# PATCH-FEATURE-OPENSUSE - enable MBEDTLS_SSL_DTLS_SRTP
Patch2: mbedtls-enable-srtp.patch
BuildRequires: cmake
BuildRequires: ninja
%{?suse_build_hwcaps_libs}