@@ -18,9 +18,9 @@ Requirement changes
18
18
* Drop support for Visual Studio 2013 and 2015, and Arm Compiler 5.
19
19
20
20
New deprecations
21
- * Rename the MBEDTLS_SHA256_USE_A64_CRYPTO_xxx config options to
22
- MBEDTLS_SHA256_USE_ARMV8_A_CRYPTO_xxx. The old names may still
23
- be used, but are deprecated.
21
+ * Rename the MBEDTLS_SHA256_USE_A64_CRYPTO_xxx config options to
22
+ MBEDTLS_SHA256_USE_ARMV8_A_CRYPTO_xxx. The old names may still
23
+ be used, but are deprecated.
24
24
* In the PSA API, domain parameters are no longer used for anything.
25
25
They are deprecated and will be removed in a future version of the
26
26
library.
@@ -39,10 +39,10 @@ Removals
39
39
40
40
Features
41
41
* Added an example program showing how to hash with the PSA API.
42
- * Support Armv8-A Crypto Extension acceleration for SHA-256
43
- when compiling for Thumb (T32) or 32-bit Arm (A32).
44
- * AES-NI is now supported in Windows builds with clang and clang-cl.
45
- Resolves #8372.
42
+ * Support Armv8-A Crypto Extension acceleration for SHA-256
43
+ when compiling for Thumb (T32) or 32-bit Arm (A32).
44
+ * AES-NI is now supported in Windows builds with clang and clang-cl.
45
+ Resolves #8372.
46
46
* Add new mbedtls_x509_csr_parse_der_with_ext_cb() routine which allows
47
47
parsing unsupported certificate extensions via user provided callback.
48
48
* Enable the new option MBEDTLS_BLOCK_CIPHER_NO_DECRYPT to omit
@@ -102,9 +102,9 @@ Features
102
102
key from a PK key.
103
103
* The benchmark program now reports times for both ephemeral and static
104
104
ECDH in all ECDH configurations.
105
- * Add support for 8-bit GCM tables for Shoup's algorithm to speedup GCM
106
- operations when hardware accelerated AES is not present. Improves
107
- performance by around 30% on 64-bit Intel; 125% on Armv7-M.
105
+ * Add support for 8-bit GCM tables for Shoup's algorithm to speedup GCM
106
+ operations when hardware accelerated AES is not present. Improves
107
+ performance by around 30% on 64-bit Intel; 125% on Armv7-M.
108
108
* The new function psa_generate_key_ext() allows generating an RSA
109
109
key pair with a custom public exponent.
110
110
* The new function mbedtls_ecp_write_key_ext() is similar to
@@ -155,7 +155,7 @@ Security
155
155
copying may be disabled by setting MBEDTLS_PSA_ASSUME_EXCLUSIVE_BUFFERS.
156
156
Note that setting this option will cause input-output buffer overlap to
157
157
be only partially supported (#3266).
158
- Fixes CVE-2024-28960
158
+ Fixes CVE-2024-28960.
159
159
* Restore the maximum TLS version to be negotiated to the configured one
160
160
when an SSL context is reset with the mbedtls_ssl_session_reset() API.
161
161
An attacker was able to prevent an Mbed TLS server from establishing any
@@ -182,15 +182,15 @@ Bugfix
182
182
in the san parameter is not separated by a colon.
183
183
* Fix possible NULL dereference issue in X509 cert_write program if an entry
184
184
in the san parameter is not separated by a colon.
185
- * Fix an inconsistency between implementations and usages of `__cpuid`,
186
- which mainly causes failures when building Windows target using
187
- mingw or clang. Fixes #8334 & #8332.
185
+ * Fix an inconsistency between implementations and usages of `__cpuid`,
186
+ which mainly causes failures when building Windows target using
187
+ mingw or clang. Fixes #8334 & #8332.
188
188
* Fix build failure in conda-forge. Fixes #8422.
189
189
* Fix parsing of CSRs with critical extensions.
190
- * Switch to milliseconds as the unit for ticket creation and reception time
191
- instead of seconds. That avoids rounding errors when computing the age of
192
- tickets compared to peer using a millisecond clock (observed with GnuTLS).
193
- Fixes #6623.
190
+ * Switch to milliseconds as the unit for ticket creation and reception time
191
+ instead of seconds. That avoids rounding errors when computing the age of
192
+ tickets compared to peer using a millisecond clock (observed with GnuTLS).
193
+ Fixes #6623.
194
194
* Fix TLS server accepting TLS 1.2 handshake while TLS 1.2
195
195
is disabled at runtime. Fixes #8593.
196
196
* Remove accidental introduction of RSA signature algorithms
@@ -221,7 +221,7 @@ Bugfix
221
221
* In TLS 1.3 clients, fix an interoperability problem due to the client
222
222
generating a new random after a HelloRetryRequest. Fixes #8669.
223
223
* Fix the restoration of the ALPN when loading serialized connection with
224
- * the mbedtls_ssl_context_load() API.
224
+ the mbedtls_ssl_context_load() API.
225
225
* Fix NULL pointer dereference in mbedtls_pk_verify_ext() when called using
226
226
an opaque RSA context and specifying MBEDTLS_PK_RSASSA_PSS as key type.
227
227
* Fix RSA opaque keys always using PKCS1 v1.5 algorithms instead of the
@@ -234,13 +234,13 @@ Changes
234
234
* Use heap memory to allocate DER encoded public/private key.
235
235
This reduces stack usage significantly for writing a public/private
236
236
key to a PEM string.
237
- * PSA_WANT_ALG_CCM and PSA_WANT_ALG_CCM_STAR_NO_TAG are no more synonyms and
238
- they are now treated separately. This means that they should be
239
- individually enabled in order to enable respective support; also the
240
- corresponding MBEDTLS_PSA_ACCEL symbol should be defined in case
241
- acceleration is required.
242
- * Moved declaration of functions mbedtls_ecc_group_to_psa and
243
- mbedtls_ecc_group_of_psa from psa/crypto_extra.h to mbedtls/psa_util.h
237
+ * PSA_WANT_ALG_CCM and PSA_WANT_ALG_CCM_STAR_NO_TAG are no more synonyms and
238
+ they are now treated separately. This means that they should be
239
+ individually enabled in order to enable respective support; also the
240
+ corresponding MBEDTLS_PSA_ACCEL symbol should be defined in case
241
+ acceleration is required.
242
+ * Moved declaration of functions mbedtls_ecc_group_to_psa and
243
+ mbedtls_ecc_group_of_psa from psa/crypto_extra.h to mbedtls/psa_util.h
244
244
* mbedtls_pk_sign_ext() is now always available, not just when
245
245
PSA (MBEDTLS_PSA_CRYPTO_C) is enabled.
246
246
* Extended PSA Crypto configurations options for FFDH by making it possible
0 commit comments