README 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229
  1. *** Description ***
  2. The wolfSSL embedded SSL library (formerly CyaSSL) is a lightweight SSL/TLS
  3. library written in ANSI C and targeted for embedded, RTOS, and
  4. resource-constrained environments - primarily because of its small size, speed,
  5. and feature set. It is commonly used in standard operating environments as well
  6. because of its royalty-free pricing and excellent cross platform support.
  7. wolfSSL supports industry standards up to the current TLS 1.3 and DTLS 1.3
  8. levels, is up to 20 times smaller than OpenSSL, and offers progressive ciphers
  9. such as ChaCha20, Curve25519, and Blake2b. User benchmarking and feedback
  10. reports dramatically better performance when using wolfSSL over OpenSSL.
  11. wolfSSL is powered by the wolfCrypt library. Two versions of the wolfCrypt
  12. cryptography library have been FIPS 140-2 validated (Certificate #2425 and
  13. certificate #3389). For additional information, visit the wolfCrypt FIPS FAQ
  14. (https://www.wolfssl.com/license/fips/) or contact fips@wolfssl.com
  15. *** Why choose wolfSSL? ***
  16. There are many reasons to choose wolfSSL as your embedded SSL solution. Some of
  17. the top reasons include size (typical footprint sizes range from 20-100 kB),
  18. support for the newest standards (SSL 3.0, TLS 1.0, TLS 1.1, TLS 1.2, TLS 1.3,
  19. DTLS 1.0, DTLS 1.2, and DTLS 1.3), current and progressive cipher support
  20. (including stream ciphers), multi-platform, royalty free, and an OpenSSL
  21. compatibility API to ease porting into existing applications which have
  22. previously used the OpenSSL package. For a complete feature list, see chapter 4
  23. of the wolfSSL manual. (https://www.wolfssl.com/docs/wolfssl-manual/ch4/)
  24. *** Notes, Please read ***
  25. Note 1)
  26. wolfSSL as of 3.6.6 no longer enables SSLv3 by default. wolfSSL also no longer
  27. supports static key cipher suites with PSK, RSA, or ECDH. This means if you
  28. plan to use TLS cipher suites you must enable DH (DH is on by default), or
  29. enable ECC (ECC is on by default), or you must enable static key cipher suites
  30. with
  31. WOLFSSL_STATIC_DH
  32. WOLFSSL_STATIC_RSA
  33. or
  34. WOLFSSL_STATIC_PSK
  35. though static key cipher suites are deprecated and will be removed from future
  36. versions of TLS. They also lower your security by removing PFS.
  37. When compiling ssl.c, wolfSSL will now issue a compiler error if no cipher
  38. suites are available. You can remove this error by defining
  39. WOLFSSL_ALLOW_NO_SUITES in the event that you desire that, i.e., you're not
  40. using TLS cipher suites.
  41. Note 2)
  42. wolfSSL takes a different approach to certificate verification than OpenSSL
  43. does. The default policy for the client is to verify the server, this means
  44. that if you don't load CAs to verify the server you'll get a connect error,
  45. no signer error to confirm failure (-188).
  46. If you want to mimic OpenSSL behavior of having SSL_connect succeed even if
  47. verifying the server fails and reducing security you can do this by calling:
  48. wolfSSL_CTX_set_verify(ctx, SSL_VERIFY_NONE, 0);
  49. before calling wolfSSL_new();. Though it's not recommended.
  50. Note 3)
  51. The enum values SHA, SHA256, SHA384, SHA512 are no longer available when
  52. wolfSSL is built with --enable-opensslextra (OPENSSL_EXTRA) or with the macro
  53. NO_OLD_SHA_NAMES. These names get mapped to the OpenSSL API for a single call
  54. hash function. Instead the name WC_SHA, WC_SHA256, WC_SHA384 and WC_SHA512
  55. should be used for the enum name.
  56. *** end Notes ***
  57. # wolfSSL Release 5.7.6 (Dec 31, 2024)
  58. Release 5.7.6 has been developed according to wolfSSL's development and QA
  59. process (see link below) and successfully passed the quality criteria.
  60. https://www.wolfssl.com/about/wolfssl-software-development-process-quality-assurance
  61. NOTE:
  62. * --enable-heapmath is deprecated.
  63. * In this release, the default cipher suite preference is updated to prioritize
  64. TLS_AES_256_GCM_SHA384 over TLS_AES_128_GCM_SHA256 when enabled.
  65. * This release adds a sanity check for including wolfssl/options.h or
  66. user_settings.h.
  67. PR stands for Pull Request, and PR <NUMBER> references a GitHub pull request
  68. number where the code change was added.
  69. ## Vulnerabilities
  70. * [Med] An OCSP (non stapling) issue was introduced in wolfSSL version 5.7.4
  71. when performing OCSP requests for intermediate certificates in a certificate
  72. chain. This affects only TLS 1.3 connections on the server side. It would not
  73. impact other TLS protocol versions or connections that are not using the
  74. traditional OCSP implementation. (Fix in pull request 8115)
  75. ## New Feature Additions
  76. * Add support for RP2350 and improve RP2040 support, both with RNG optimizations
  77. (PR 8153)
  78. * Add support for STM32MP135F, including STM32CubeIDE support and HAL support
  79. for SHA2/SHA3/AES/RNG/ECC optimizations. (PR 8223, 8231, 8241)
  80. * Implement Renesas TSIP RSA Public Enc/Private support (PR 8122)
  81. * Add support for Fedora/RedHat system-wide crypto-policies (PR 8205)
  82. * Curve25519 generic keyparsing API added with wc_Curve25519KeyToDer and
  83. wc_Curve25519KeyDecode (PR 8129)
  84. * CRL improvements and update callback, added the functions
  85. wolfSSL_CertManagerGetCRLInfo and wolfSSL_CertManagerSetCRLUpdate_Cb (PR 8006)
  86. * For DTLS, add server-side stateless and CID quality-of-life API. (PR 8224)
  87. ## Enhancements and Optimizations
  88. * Add a CMake dependency check for pthreads when required. (PR 8162)
  89. * Update OS_Seed declarations for legacy compilers and FIPS modules (boundary
  90. not affected). (PR 8170)
  91. * Enable WOLFSSL_ALWAYS_KEEP_SNI by default when using --enable-jni. (PR 8283)
  92. * Change the default cipher suite preference, prioritizing
  93. TLS_AES_256_GCM_SHA384 over TLS_AES_128_GCM_SHA256. (PR 7771)
  94. * Add SRTP-KDF (FIPS module v6.0.0) to checkout script for release bundling
  95. (PR 8215)
  96. * Make library build when no hardware crypto available for Aarch64 (PR 8293)
  97. * Update assembly code to avoid `uint*_t` types for better compatibility with
  98. older C standards. (PR 8133)
  99. * Add initial documentation for writing ASN template code to decode BER/DER.
  100. (PR 8120)
  101. * Perform full reduction in sc_muladd for EdDSA with Curve448 (PR 8276)
  102. * Allow SHA-3 hardware cryptography instructions to be explicitly not used in
  103. MacOS builds (PR 8282)
  104. * Make Kyber and ML-KEM available individually and together. (PR 8143)
  105. * Update configuration options to include Kyber/ML-KEM and fix defines used in
  106. wolfSSL_get_curve_name. (PR 8183)
  107. * Make GetShortInt available with WOLFSSL_ASN_EXTRA (PR 8149)
  108. * Improved test coverage and minor improvements of X509 (PR 8176)
  109. * Add sanity checks for configuration methods, ensuring the inclusion of
  110. wolfssl/options.h or user_settings.h. (PR 8262)
  111. * Enable support for building without TLS (NO_TLS). Provides reduced code size
  112. option for non-TLS users who want features like the certificate manager or
  113. compatibility layer. (PR 8273)
  114. * Exposed get_verify functions with OPENSSL_EXTRA. (PR 8258)
  115. * ML-DSA/Dilithium: obtain security level from DER when decoding (PR 8177)
  116. * Implementation for using PKCS11 to retrieve certificate for SSL CTX (PR 8267)
  117. * Add support for the RFC822 Mailbox attribute (PR 8280)
  118. * Initialize variables and adjust types resolve warnings with Visual Studio in
  119. Windows builds. (PR 8181)
  120. * Refactors and expansion of opensslcoexist build (PR 8132, 8216, 8230)
  121. * Add DTLS 1.3 interoperability, libspdm and DTLS CID interoperability tests
  122. (PR 8261, 8255, 8245)
  123. * Remove trailing error exit code in wolfSSL install setup script (PR 8189)
  124. * Update Arduino files for wolfssl 5.7.4 (PR 8219)
  125. * Improve Espressif SHA HW/SW mutex messages (PR 8225)
  126. * Apply post-5.7.4 release updates for Espressif Managed Component examples
  127. (PR 8251)
  128. * Expansion of c89 conformance (PR 8164)
  129. * Added configure option for additional sanity checks with --enable-faultharden
  130. (PR 8289)
  131. * Aarch64 ASM additions to check CPU features before hardware crypto instruction
  132. use (PR 8314)
  133. ## Fixes
  134. * Fix a memory issue when using the compatibility layer with
  135. WOLFSSL_GENERAL_NAME and handling registered ID types. (PR 8155)
  136. * Fix a build issue with signature fault hardening when using public key
  137. callbacks (HAVE_PK_CALLBACKS). (PR 8287)
  138. * Fix for handling heap hint pointer properly when managing multiple WOLFSSL_CTX
  139. objects and free’ing one of them (PR 8180)
  140. * Fix potential memory leak in error case with Aria. (PR 8268)
  141. * Fix Set_Verify flag behaviour on Ada wrapper. (PR 8256)
  142. * Fix a compilation error with the NO_WOLFSSL_DIR flag. (PR 8294)
  143. * Resolve a corner case for Poly1305 assembly code on Aarch64. (PR 8275)
  144. * Fix incorrect version setting in CSRs. (PR 8136)
  145. * Correct debugging output for cryptodev. (PR 8202)
  146. * Fix for benchmark application use with /dev/crypto GMAC auth error due to size
  147. of AAD (PR 8210)
  148. * Add missing checks for the initialization of sp_int/mp_int with DSA to free
  149. memory properly in error cases. (PR 8209)
  150. * Fix return value of wolfSSL_CTX_set_tlsext_use_srtp (8252)
  151. * Check Root CA by Renesas TSIP before adding it to ca-table (PR 8101)
  152. * Prevent adding a certificate to the CA cache for Renesas builds if it does not
  153. set CA:TRUE in basic constraints. (PR 8060)
  154. * Fix attribute certificate holder entityName parsing. (PR 8166)
  155. * Resolve build issues for configurations without any wolfSSL/openssl
  156. compatibility layer headers. (PR 8182)
  157. * Fix for building SP RSA small and RSA public only (PR 8235)
  158. * Fix for Renesas RX TSIP RSA Sign/Verify with wolfCrypt only (PR 8206)
  159. * Fix to ensure all files have settings.h included (like wc_lms.c) and guards
  160. for building all `*.c` files (PR 8257 and PR 8140)
  161. * Fix x86 target build issues in Visual Studio for non-Windows operating
  162. systems. (PR 8098)
  163. * Fix wolfSSL_X509_STORE_get0_objects to handle no CA (PR 8226)
  164. * Properly handle reference counting when adding to the X509 store. (PR 8233)
  165. * Fix for various typos and improper size used with FreeRTOS_bind in the Renesas
  166. example. Thanks to Hongbo for the report on example issues. (PR 7537)
  167. * Fix for potential heap use after free with wolfSSL_PEM_read_bio_PrivateKey.
  168. Thanks to Peter for the issue reported. (PR 8139)
  169. For additional vulnerability information visit the vulnerability page at:
  170. https://www.wolfssl.com/docs/security-vulnerabilities/
  171. See INSTALL file for build instructions.
  172. More info can be found on-line at: https://wolfssl.com/wolfSSL/Docs.html
  173. *** Resources ***
  174. [wolfSSL Website](https://www.wolfssl.com/)
  175. [wolfSSL Wiki](https://github.com/wolfSSL/wolfssl/wiki)
  176. [FIPS FAQ](https://wolfssl.com/license/fips)
  177. [wolfSSL Documents](https://wolfssl.com/wolfSSL/Docs.html)
  178. [wolfSSL Manual](https://wolfssl.com/wolfSSL/Docs-wolfssl-manual-toc.html)
  179. [wolfSSL API Reference]
  180. (https://wolfssl.com/wolfSSL/Docs-wolfssl-manual-17-wolfssl-api-reference.html)
  181. [wolfCrypt API Reference]
  182. (https://wolfssl.com/wolfSSL/Docs-wolfssl-manual-18-wolfcrypt-api-reference.html)
  183. [TLS 1.3](https://www.wolfssl.com/docs/tls13/)
  184. [wolfSSL Vulnerabilities]
  185. (https://www.wolfssl.com/docs/security-vulnerabilities/)
  186. Additional wolfSSL Examples](https://github.com/wolfssl/wolfssl-examples)