README 78 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860
  1. *** Resources ***
  2. wolfSSL website: https://www.wolfssl.com/
  3. wolfSSL wiki: https://github.com/wolfSSL/wolfssl/wiki
  4. wolfSSL manual: https://wolfssl.com/wolfSSL/Docs-wolfssl-manual-toc.html
  5. FIPS FAQ: https://www.wolfssl.com/wolfSSL/fips.html
  6. wolfSSL API: https://wolfssl.com/wolfSSL/Docs-wolfssl-manual-17-wolfssl-api-reference.html
  7. wolfCrypt API: https://wolfssl.com/wolfSSL/Docs-wolfssl-manual-18-wolfcrypt-api-reference.html
  8. TLS 1.3 https://www.wolfssl.com/docs/tls13/
  9. *** Description ***
  10. The wolfSSL embedded SSL library (formerly CyaSSL) is a lightweight SSL/TLS
  11. library written in ANSI C and targeted for embedded, RTOS, and
  12. resource-constrained environments - primarily because of its small size, speed,
  13. and feature set. It is commonly used in standard operating environments as well
  14. because of its royalty-free pricing and excellent cross platform support. wolfSSL
  15. supports industry standards up to the current TLS 1.3 and DTLS 1.3 levels, is up
  16. to 20 times smaller than OpenSSL, and offers progressive ciphers such as ChaCha20,
  17. Curve25519, NTRU, and Blake2b. User benchmarking and feedback reports
  18. dramatically better performance when using wolfSSL over OpenSSL.
  19. wolfSSL is powered by the wolfCrypt library. A version of the wolfCrypt
  20. cryptography library has been FIPS 140-2 validated (Certificate #2425). For
  21. additional information, visit the wolfCrypt FIPS FAQ
  22. (https://www.wolfssl.com/license/fips/) or contact fips@wolfssl.com
  23. *** Why choose wolfSSL? ***
  24. There are many reasons to choose wolfSSL as your embedded SSL solution. Some of
  25. the top reasons include size (typical footprint sizes range from 20-100 kB),
  26. support for the newest standards (SSL 3.0, TLS 1.0, TLS 1.1, TLS 1.2, TLS 1.3,
  27. DTLS 1.0, and DTLS 1.2), current and progressive cipher support (including stream
  28. ciphers), multi-platform, royalty free, and an OpenSSL compatibility API to ease
  29. porting into existing applications which have previously used the OpenSSL package.
  30. For a complete feature list, see https://www.wolfssl.com/docs/wolfssl-manual/ch4/
  31. *** Notes, Please read ***
  32. Note 1)
  33. wolfSSL as of 3.6.6 no longer enables SSLv3 by default. wolfSSL also no
  34. longer supports static key cipher suites with PSK, RSA, or ECDH. This means
  35. if you plan to use TLS cipher suites you must enable DH (DH is on by default),
  36. or enable ECC (ECC is on by default), or you must enable static
  37. key cipher suites with
  38. WOLFSSL_STATIC_DH
  39. WOLFSSL_STATIC_RSA
  40. or
  41. WOLFSSL_STATIC_PSK
  42. though static key cipher suites are deprecated and will be removed from future
  43. versions of TLS. They also lower your security by removing PFS. Since current
  44. NTRU suites available do not use ephemeral keys, WOLFSSL_STATIC_RSA needs to be
  45. used in order to build with NTRU suites.
  46. When compiling ssl.c, wolfSSL will now issue a compiler error if no cipher suites
  47. are available. You can remove this error by defining WOLFSSL_ALLOW_NO_SUITES
  48. in the event that you desire that, i.e., you're not using TLS cipher suites.
  49. Note 2)
  50. wolfSSL takes a different approach to certificate verification than OpenSSL
  51. does. The default policy for the client is to verify the server, this means
  52. that if you don't load CAs to verify the server you'll get a connect error,
  53. no signer error to confirm failure (-188).
  54. If you want to mimic OpenSSL behavior of having SSL_connect succeed even if
  55. verifying the server fails and reducing security you can do this by calling:
  56. wolfSSL_CTX_set_verify(ctx, SSL_VERIFY_NONE, 0);
  57. before calling wolfSSL_new(); Though it's not recommended.
  58. *** end Notes ***
  59. ********* wolfSSL Release 3.14.0 (3/02/2018)
  60. Release 3.14.0 of wolfSSL embedded TLS has bug fixes and new features including:
  61. - TLS 1.3 draft 22 and 23 support added
  62. - Additional unit tests for; SHA3, AES-CMAC, Ed25519, ECC, RSA-PSS, AES-GCM
  63. - Many additions to the OpenSSL compatibility layer were made in this release. Some of these being enhancements to PKCS12, WOLFSSL_X509 use, WOLFSSL_EVP_PKEY, and WOLFSSL_BIO operations
  64. - AVX1 and AVX2 performance improvements with ChaCha20 and Poly1305
  65. - Added i.MX CAAM driver support with Integrity OS support
  66. - Improvements to logging with debugging, including exposing more API calls and adding options to reduce debugging code size
  67. - Fix for signature type detection with PKCS7 RSA SignedData
  68. - Public key call back functions added for DH Agree
  69. - RSA-PSS API added for operating on non inline buffers (separate input and output buffers)
  70. - API added for importing and exporting raw DSA parameters
  71. - Updated DSA key generation to be FIPS 186-4 compliant
  72. - Fix for wolfSSL_check_private_key when comparing ECC keys
  73. - Support for AES Cipher Feedback(CFB) mode added
  74. - Updated RSA key generation to be FIPS 186-4 compliant
  75. - Update added for the ARM CMSIS software pack
  76. - WOLFSSL_IGNORE_FILE_WARN macro added for avoiding build warnings when not working with autotools
  77. - Performance improvements for AES-GCM with AVX1 and AVX2
  78. - Fix for possible memory leak on error case with wc_RsaKeyToDer function
  79. - Make wc_PKCS7_PadData function available
  80. - Updates made to building SGX on Linux
  81. - STM32 hashing algorithm improvements including clock/power optimizations and auto detection of if SHA2 is supported
  82. - Update static memory feature for FREERTOS use
  83. - Reverse the order that certificates are compared during PKCS12 parse to account for case where multiple certificates have the same matching private key
  84. - Update NGINX port to version 1.13.8
  85. - Support for HMAC-SHA3 added
  86. - Added stricter ASN checks to enforce RFC 5280 rules. Thanks to the report from Professor Zhenhua Duan, Professor Cong Tian, and Ph.D candidate Chu Chen from Institute of Computing Theory and Technology (ICTT) of Xidian University.
  87. - Option to have ecc_mul2add function public facing
  88. - Getter function wc_PKCS7_GetAttributeValue added for PKCS7 attributes
  89. - Macros NO_AES_128, NO_AES_192, NO_AES_256 added for AES key size selection at compile time
  90. - Support for writing multiple organizations units (OU) and domain components (DC) with CSR and certificate creation
  91. - Support for indefinite length BER encodings in PKCS7
  92. - Added API for additional validation of prime q in a public DH key
  93. - Added support for RSA encrypt and decrypt without padding
  94. See INSTALL file for build instructions.
  95. More info can be found on-line at http://wolfssl.com/wolfSSL/Docs.html
  96. ********* wolfSSL (Formerly CyaSSL) Release 3.13.0 (12/21/2017)
  97. wolfSSL 3.13.0 includes bug fixes and new features, including support for
  98. TLS 1.3 Draft 21, performance and footprint optimizations, build fixes,
  99. updated examples and project files, and one vulnerability fix. The full list
  100. of changes and additions in this release include:
  101. - Fixes for TLS 1.3, support for Draft 21
  102. - TLS 1.0 disabled by default, addition of “--enable-tlsv10” configure option
  103. - New option to reduce SHA-256 code size at expense of performance
  104. (USE_SLOW_SHA256)
  105. - New option for memory reduced build (--enable-lowresource)
  106. - AES-GCM performance improvements on AVX1 (IvyBridge) and AVX2
  107. - SHA-256 and SHA-512 performance improvements using AVX1/2 ASM
  108. - SHA-3 size and performance optimizations
  109. - Fixes for Intel AVX2 builds on Mac/OSX
  110. - Intel assembly for Curve25519, and Ed25519 performance optimizations
  111. - New option to force 32-bit mode with “--enable-32bit”
  112. - New option to disable all inline assembly with “--disable-asm”
  113. - Ability to override maximum signature algorithms using WOLFSSL_MAX_SIGALGO
  114. - Fixes for handling of unsupported TLS extensions.
  115. - Fixes for compiling AES-GCM code with GCC 4.8.*
  116. - Allow adjusting static I/O buffer size with WOLFMEM_IO_SZ
  117. - Fixes for building without a filesystem
  118. - Removes 3DES and SHA1 dependencies from PKCS#7
  119. - Adds ability to disable PKCS#7 EncryptedData type (NO_PKCS7_ENCRYPTED_DATA)
  120. - Add ability to get client-side SNI
  121. - Expanded OpenSSL compatibility layer
  122. - Fix for logging file names with OpenSSL compatibility layer enabled, with
  123. WOLFSSL_MAX_ERROR_SZ user-overridable
  124. - Adds static memory support to the wolfSSL example client
  125. - Fixes for sniffer to use TLS 1.2 client method
  126. - Adds option to wolfCrypt benchmark to benchmark individual algorithms
  127. - Adds option to wolfCrypt benchmark to display benchmarks in powers
  128. of 10 (-base10)
  129. - Updated Visual Studio for ARM builds (for ECC supported curves and SHA-384)
  130. - Updated Texas Instruments TI-RTOS build
  131. - Updated STM32 CubeMX build with fixes for SHA
  132. - Updated IAR EWARM project files
  133. - Updated Apple Xcode projects with the addition of a benchmark example project
  134. This release of wolfSSL fixes 1 security vulnerability.
  135. wolfSSL is cited in the recent ROBOT Attack by Böck, Somorovsky, and Young.
  136. The paper notes that wolfSSL only gives a weak oracle without a practical
  137. attack but this is still a flaw. This release contains a fix for this report.
  138. Please note that wolfSSL has static RSA cipher suites disabled by default as
  139. of version 3.6.6 because of the lack of perfect forward secrecy. Only users
  140. who have explicitly enabled static RSA cipher suites with WOLFSSL_STATIC_RSA
  141. and use those suites on a host are affected. More information will be
  142. available on our website at:
  143. https://wolfssl.com/wolfSSL/security/vulnerabilities.php
  144. See INSTALL file for build instructions.
  145. More info can be found on-line at http://wolfssl.com/wolfSSL/Docs.html
  146. ********* wolfSSL (Formerly CyaSSL) Release 3.12.2 (10/23/2017)
  147. Release 3.12.2 of wolfSSL has bug fixes and new features including:
  148. This release includes many performance improvements with Intel ASM (AVX/AVX2) and AES-NI. New single precision math option to speedup RSA, DH and ECC. Embedded hardware support has been expanded for STM32, PIC32MZ and ATECC508A. AES now supports XTS mode for disk encryption. Certificate improvements for setting serial number, key usage and extended key usage. Refactor of SSL_ and hash types to allow openssl coexistence. Improvements for TLS 1.3. Fixes for OCSP stapling to allow disable and WOLFSSL specific user context for callbacks. Fixes for openssl and MySQL compatibility. Updated Micrium port. Fixes for asynchronous modes.
  149. - Added TLS extension for Supported Point Formats (ec_point_formats)
  150. - Fix to not send OCSP stapling extensions in client_hello when not enabled
  151. - Added new API's for disabling OCSP stapling
  152. - Add check for SIZEOF_LONG with sun and LP64
  153. - Fixes for various TLS 1.3 disable options (RSA, ECC and ED/Curve 25519).
  154. - Fix to disallow upgrading to TLS v1.3
  155. - Fixes for wolfSSL_EVP_CipherFinal() when message size is a round multiple of a block size.
  156. - Add HMAC benchmark and expanded AES key size benchmarks
  157. - Added simple GCC ARM Makefile example
  158. - Add tests for 3072-bit RSA and DH.
  159. - Fixed DRAFT_18 define and fixed downgrading with TLS v1.3
  160. - Fixes to allow custom serial number during certificate generation
  161. - Add method to get WOLFSSL_CTX certificate manager
  162. - Improvement to `wolfSSL_SetOCSP_Cb` to allow context per WOLFSSL object
  163. - Alternate certificate chain support `WOLFSSL_ALT_CERT_CHAINS`. Enables checking cert against multiple CA's.
  164. - Added new `--disable-oldnames` option to allow for using openssl along-side wolfssl headers (without OPENSSL_EXTRA).
  165. - Refactor SSL_ and hashing types to use wolf specific prefix (WOLFSSL and WC_) to allow openssl coexistence.
  166. - Fixes for HAVE_INTEL_MULX
  167. - Cleanup include paths for MySQL cmake build
  168. - Added configure option for building library for wolfSSH (--enable-wolfssh)
  169. - Openssl compatibility layer improvements
  170. - Expanded API unit tests
  171. - Fixes for STM32 crypto hardware acceleration
  172. - Added AES XTS mode (--enable-xts)
  173. - Added ASN Extended Key Usage Support (see wc_SetExtKeyUsage).
  174. - Math updates and added TFM_MIPS speedup.
  175. - Fix for creation of the KeyUsage BitString
  176. - Fix for 8k keys with MySQL compatibility
  177. - Fixes for ATECC508A.
  178. - Fixes for PIC32MZ hashing.
  179. - Fixes and improvements to asynchronous modes for Intel QuickAssist and Cavium Nitrox V.
  180. - Update HASH_DRBG Reseed mechanism and add test case
  181. - Rename the file io.h/io.c to wolfio.h/wolfio.c
  182. - Cleanup the wolfIO_Send function.
  183. - OpenSSL Compatibility Additions and Fixes
  184. - Improvements to Visual Studio DLL project/solution.
  185. - Added function to generate public ECC key from private key
  186. - Added async blocking support for sniffer tool.
  187. - Added wolfCrypt hash tests for empty string and large data.
  188. - Added ability to use of wolf implementation of `strtok` using `USE_WOLF_STRTOK`.
  189. - Updated Micrium uC/OS-III Port
  190. - Updated root certs for OCSP scripts
  191. - New Single Precision math option for RSA, DH and ECC (off by default). See `--enable-sp`.
  192. - Speedups for AES GCM with AESNI (--enable-aesni)
  193. - Speedups for SHA2, ChaCha20/Poly1035 using AVX/AVX2
  194. ********* wolfSSL (Formerly CyaSSL) Release 3.12.0 (8/04/2017)
  195. Release 3.12.0 of wolfSSL has bug fixes and new features including:
  196. - TLS 1.3 with Nginx! TLS 1.3 with ARMv8! TLS 1.3 with Async Crypto! (--enable-tls13)
  197. - TLS 1.3 0RTT feature added
  198. - Added port for using Intel SGX with Linux
  199. - Update and fix PIC32MZ port
  200. - Additional unit testing for MD5, SHA, SHA224, SHA256, SHA384, SHA512, RipeMd, HMAC, 3DES, IDEA, ChaCha20, ChaCha20Poly1305 AEAD, Camellia, Rabbit, ARC4, AES, RSA, Hc128
  201. - AVX and AVX2 assembly for improved ChaCha20 performance
  202. - Intel QAT fixes for when using --disable-fastmath
  203. - Update how DTLS handles decryption and MAC failures
  204. - Update DTLS session export version number for --enable-sessionexport feature
  205. - Add additional input argument sanity checks to ARMv8 assembly port
  206. - Fix for making PKCS12 dynamic types match
  207. - Fixes for potential memory leaks when using --enable-fast-rsa
  208. - Fix for when using custom ECC curves and add BRAINPOOLP256R1 test
  209. - Update TI-RTOS port for dependency on new wolfSSL source files
  210. - DTLS multicast feature added, --enable-mcast
  211. - Fix for Async crypto with GCC 7.1 and HMAC when not using Intel QuickAssist
  212. - Improvements and enhancements to Intel QuickAssist support
  213. - Added Xilinx port
  214. - Added SHA3 Keccak feature, --enable-sha3
  215. - Expand wolfSSL Python wrapper to now include a client side implementation
  216. - Adjust example servers to not treat a peer closed error as a hard error
  217. - Added more sanity checks to fp_read_unsigned_bin function
  218. - Add SHA224 and AES key wrap to ARMv8 port
  219. - Update MQX classics and mmCAU ports
  220. - Fix for potential buffer over read with wolfSSL_CertPemToDer
  221. - Add PKCS7/CMS decode support for KARI with IssuerAndSerialNumber
  222. - Fix ThreadX/NetX warning
  223. - Fixes for OCSP and CRL non blocking sockets and for incomplete cert chain with OCSP
  224. - Added RSA PSS sign and verify
  225. - Fix for STM32F4 AES-GCM
  226. - Added enable all feature (--enable-all)
  227. - Added trackmemory feature (--enable-trackmemory)
  228. - Fixes for AES key wrap and PKCS7 on Windows VS
  229. - Added benchmark block size argument
  230. - Support use of staticmemory with PKCS7
  231. - Fix for Blake2b build with GCC 5.4
  232. - Fixes for compiling wolfSSL with GCC version 7, most dealing with switch statement fall through warnings.
  233. - Added warning when compiling without hardened math operations
  234. Note:
  235. There is a known issue with using ChaCha20 AVX assembly on versions of GCC earlier than 5.2. This is encountered with using the wolfSSL enable options --enable-intelasm and --enable-chacha. To avoid this issue ChaCha20 can be enabled with --enable-chacha=noasm.
  236. If using --enable-intelasm and also using --enable-sha224 or --enable-sha256 there is a known issue with trying to use -fsanitize=address.
  237. This release of wolfSSL fixes 1 low level security vulnerability.
  238. Low level fix for a potential DoS attack on a wolfSSL client. Previously a client would accept many warning alert messages without a limit. This fix puts a limit to the number of warning alert messages received and if this limit is reached a fatal error ALERT_COUNT_E is returned. The max number of warning alerts by default is set to 5 and can be adjusted with the macro WOLFSSL_ALERT_COUNT_MAX. Thanks for the report from Tarun Yadav and Koustav Sadhukhan from Defence Research and Development Organization, INDIA.
  239. See INSTALL file for build instructions.
  240. More info can be found on-line at http://wolfssl.com/wolfSSL/Docs.html
  241. ********* wolfSSL (Formerly CyaSSL) Release 3.11.1 (5/11/2017)
  242. Release 3.11.1 of wolfSSL is a TLS 1.3 BETA release, which includes:
  243. - TLS 1.3 client and server support for TLS 1.3 with Draft 18 support
  244. This is strictly a BETA release, and designed for testing and user feedback.
  245. Please send any comments, testing results, or feedback to wolfSSL at
  246. support@wolfssl.com.
  247. See INSTALL file for build instructions.
  248. More info can be found on-line at http://wolfssl.com/wolfSSL/Docs.html
  249. ********* wolfSSL (Formerly CyaSSL) Release 3.11.0 (5/04/2017)
  250. Release 3.11.0 of wolfSSL has bug fixes and new features including:
  251. - Code updates for warnings reported by Coverity scans
  252. - Testing and warning fixes for FreeBSD on PowerPC
  253. - Updates and refactoring done to ASN1 parsing functions
  254. - Change max PSK identity buffer to account for an identity length of 128 characters
  255. - Update Arduino script to handle recent files and additions
  256. - Added support for PKCS#7 Signed Data with ECDSA
  257. - Fix for interoperability with ChaCha20-Poly1305 suites using older draft versions
  258. - DTLS update to allow multiple handshake messages in one DTLS record. Thanks to Eric Samsel over at Welch Allyn for reporting this bug.
  259. - Intel QuickAssist asynchronous support (PR #715 - https://www.wolfssl.com/wolfSSL/Blog/Entries/2017/1/18_wolfSSL_Asynchronous_Intel_QuickAssist_Support.html)
  260. - Added support for HAproxy load balancer
  261. - Added option to allow SHA1 with TLS 1.2 for IIS compatibility (WOLFSSL_ALLOW_TLS_SHA1)
  262. - Added Curve25519 51-bit Implementation, increasing performance on systems that have 128 bit types
  263. - Fix to not send session ID on server side if session cache is off unless we're echoing
  264. session ID as part of session tickets
  265. - Fixes for ensuring all default ciphers are setup correctly (see PR #830)
  266. - Added NXP Hexiwear example in `IDE/HEXIWEAR`.
  267. - Added wolfSSL_write_dup() to create write only WOLFSSL object for concurrent access
  268. - Fixes for TLS elliptic curve selection on private key import.
  269. - Fixes for RNG with Intel rdrand and rdseed speedups.
  270. - Improved performance with Intel rdrand to use full 64-bit output
  271. - Added new --enable-intelrand option to indicate use of RDRAND preference for RNG source
  272. - Removed RNG ARC4 support
  273. - Added ECC helpers to get size and id from curve name.
  274. - Added ECC Cofactor DH (ECC-CDH) support
  275. - Added ECC private key only import / export functions.
  276. - Added PKCS8 create function
  277. - Improvements to TLS layer CTX handling for switching keys / certs.
  278. - Added check for duplicate certificate policy OID in certificates.
  279. - Normal math speed-up to not allocate on mp_int and defer until mp_grow
  280. - Reduce heap usage with fast math when not using ALT_ECC_SIZE
  281. - Fixes for building CRL with Windows
  282. - Added support for inline CRL lookup when HAVE_CRL_IO is defined
  283. - Added port for tenAsys INtime RTOS
  284. - Improvements to uTKernel port (WOLFSSL_uTKERNEL2)
  285. - Updated WPA Supplicant support
  286. - Added support for Nginx
  287. - Update stunnel port for version 5.40
  288. - Fixes for STM32 hardware crypto acceleration
  289. - Extended test code coverage in bundled test.c
  290. - Added a sanity check for minimum authentication tag size with AES-GCM. Thanks to Yueh-Hsun Lin and Peng Li at KNOX Security at Samsung Research America for suggesting this.
  291. - Added a sanity check that subject key identifier is marked as non-critical and a check that no policy OIDS appear more than once in the cert policies extension. Thanks to the report from Professor Zhenhua Duan, Professor Cong Tian, and Ph.D candidate Chu Chen from Institute of Computing Theory and Technology (ICTT) of Xidian University, China. Profs. Zhenhua Duan and Cong Tian are supervisors of Ph.D candidate Chu Chen.
  292. This release of wolfSSL fixes 5 low and 1 medium level security vulnerability.
  293. 3 Low level fixes reported by Yueh-Hsun Lin and Peng Li from KNOX Security, Samsung Research America.
  294. - Fix for out of bounds memory access in wc_DhParamsLoad() when GetLength() returns a zero. Before this fix there is a case where wolfSSL would read out of bounds memory in the function wc_DhParamsLoad.
  295. - Fix for DH key accepted by wc_DhAgree when the key was malformed.
  296. - Fix for a double free case when adding CA cert into X509_store.
  297. Low level fix for memory management with static memory feature enabled. By default static memory is disabled. Thanks to GitHub user hajjihraf for reporting this.
  298. Low level fix for out of bounds write in the function wolfSSL_X509_NAME_get_text_by_NID. This function is not used by TLS or crypto operations but could result in a buffer out of bounds write by one if called explicitly in an application. Discovered by Aleksandar Nikolic of Cisco Talos. http://talosintelligence.com/vulnerability-reports/
  299. Medium level fix for check on certificate signature. There is a case in release versions 3.9.10, 3.10.0 and 3.10.2 where a corrupted signature on a peer certificate would not be properly flagged. Thanks to Wens Lo, James Tsai, Kenny Chang, and Oscar Yang at Castles Technology.
  300. See INSTALL file for build instructions.
  301. More info can be found on-line at http://wolfssl.com/wolfSSL/Docs.html
  302. ********* wolfSSL (Formerly CyaSSL) Release 3.10.2 (2/10/2017)
  303. Release 3.10.2 of wolfSSL has bug fixes and new features including:
  304. - Poly1305 Windows macros fix. Thanks to GitHub user Jay Satiro
  305. - Compatibility layer expanded with multiple functions added
  306. - Improve fp_copy performance with ALT_ECC_SIZE
  307. - OCSP updates and improvements
  308. - Fixes for IAR EWARM 8 compiler warnings
  309. - Reduce stack usage with ECC_CACHE_CURVE disabled
  310. - Added ECC export raw for public and private key
  311. - Fix for NO_ASN_TIME build
  312. - Supported curves extensions now populated by default
  313. - Add DTLS build without big integer math
  314. - Fix for static memory feature with wc_ecc_verify_hash_ex and not SHAMIR
  315. - Added PSK interoperability testing to script bundled with wolfSSL
  316. - Fix for Python wrapper random number generation. Compiler optimizations with Python could place the random number in same buffer location each time. Thanks to GitHub user Erik Bray (embray)
  317. - Fix for tests on unaligned memory with static memory feature
  318. - Add macro WOLFSSL_NO_OCSP_OPTIONAL_CERTS to skip optional OCSP certificates
  319. - Sanity checks on NULL arguments added to wolfSSL_set_fd and wolfSSL_DTLS_SetCookieSecret
  320. - mp_jacobi stack use reduced, thanks to Szabi Tolnai for providing a solution to reduce stack usage
  321. This release of wolfSSL fixes 2 low and 1 medium level security vulnerability.
  322. Low level fix of buffer overflow for when loading in a malformed temporary DH file. Thanks to Yueh-Hsun Lin and Peng Li from KNOX Security, Samsung Research America for the report.
  323. Medium level fix for processing of OCSP response. If using OCSP without hard faults enforced and no alternate revocation checks like OCSP stapling then it is recommended to update.
  324. Low level fix for potential cache attack on RSA operations. If using wolfSSL RSA on a server that other users can have access to monitor the cache, then it is recommended to update wolfSSL. Thanks to Andreas Zankl, Johann Heyszl and Georg Sigl at Fraunhofer AISEC for the initial report.
  325. See INSTALL file for build instructions.
  326. More info can be found on-line at http://wolfssl.com/wolfSSL/Docs.html
  327. ********* wolfSSL (Formerly CyaSSL) Release 3.10.0 (12/21/2016)
  328. Release 3.10.0 of wolfSSL has bug fixes and new features including:
  329. - Added support for SHA224
  330. - Added scrypt feature
  331. - Build for Intel SGX use, added in directory IDE/WIN-SGX
  332. - Fix for ChaCha20-Poly1305 ECDSA certificate type request
  333. - Enhance PKCS#7 with ECC enveloped data and AES key wrap support
  334. - Added support for RIOT OS
  335. - Add support for parsing PKCS#12 files
  336. - ECC performance increased with custom curves
  337. - ARMv8 expanded to AArch32 and performance increased
  338. - Added ANSI-X9.63-KDF support
  339. - Port to STM32 F2/F4 CubeMX
  340. - Port to Atmel ATECC508A board
  341. - Removed fPIE by default when wolfSSL library is compiled
  342. - Update to Python wrapper, dropping DES and adding wc_RSASetRNG
  343. - Added support for NXP K82 hardware acceleration
  344. - Added SCR client and server verify check
  345. - Added a disable rng option with autoconf
  346. - Added more tests vectors to test.c with AES-CTR
  347. - Updated DTLS session export version number
  348. - Updated DTLS for 64 bit sequence numbers
  349. - Fix for memory management with TI and WOLFSSL_SMALL_STACK
  350. - Hardening RSA CRT to be constant time
  351. - Fix uninitialized warning with IAR compiler
  352. - Fix for C# wrapper example IO hang on unexpected connection termination
  353. This release of wolfSSL fixes a low level security vulnerability. The vulnerability reported was a potential cache attack on RSA operations. If using wolfSSL RSA on a server that other users can have access to monitor the cache, then it is recommended to update wolfSSL. Thanks to Andreas Zankl, Johann Heyszl and Georg Sigl at Fraunhofer AISEC for the report. More information will be available on our site:
  354. https://wolfssl.com/wolfSSL/security/vulnerabilities.php
  355. See INSTALL file for build instructions.
  356. More info can be found on-line at http://wolfssl.com/wolfSSL/Docs.html
  357. ********* wolfSSL (Formerly CyaSSL) Release 3.9.10 (9/23/2016)
  358. Release 3.9.10 of wolfSSL has bug fixes and new features including:
  359. - Default configure option changes:
  360. 1. DES3 disabled by default
  361. 2. ECC Supported Curves Extension enabled by default
  362. 3. New option Extended Master Secret enabled by default
  363. - Added checking CA certificate path length, and new test certs
  364. - Fix to DSA pre padding and sanity check on R/S values
  365. - Added CTX level RNG for single-threaded builds
  366. - Intel RDSEED enhancements
  367. - ARMv8 hardware acceleration support for AES-CBC/CTR/GCM, SHA-256
  368. - Arduino support updates
  369. - Added the Extended Master Secret TLS extension
  370. 1. Enabled by default in configure options, API to disable
  371. 2. Added support for Extended Master Secret to sniffer
  372. - OCSP fix with issuer key hash, lookup refactor
  373. - Added support for Frosted OS
  374. - Added support for DTLS over SCTP
  375. - Added support for static memory with wolfCrypt
  376. - Fix to ECC Custom Curve support
  377. - Support for asynchronous wolfCrypt RSA and TLS client
  378. - Added distribution build configure option
  379. - Update the test certificates
  380. This release of wolfSSL fixes medium level security vulnerabilities. Fixes for
  381. potential AES, RSA, and ECC side channel leaks is included that a local user
  382. monitoring the same CPU core cache could exploit. VM users, hyper-threading
  383. users, and users where potential attackers have access to the CPU cache will
  384. need to update if they utilize AES, RSA private keys, or ECC private keys.
  385. Thanks to Gorka Irazoqui Apecechea and Xiaofei Guo from Intel Corporation for
  386. the report. More information will be available on our site:
  387. https://wolfssl.com/wolfSSL/security/vulnerabilities.php
  388. See INSTALL file for build instructions.
  389. More info can be found on-line at http://wolfssl.com/wolfSSL/Docs.html
  390. ********* wolfSSL (Formerly CyaSSL) Release 3.9.8 (7/29/2016)
  391. Release 3.9.8 of wolfSSL has bug fixes and new features including:
  392. - Add support for custom ECC curves.
  393. - Add cipher suite ECDHE-ECDSA-AES128-CCM.
  394. - Add compkey enable option. This option is for compressed ECC keys.
  395. - Add in the option to use test.h without gettimeofday function using the macro
  396. WOLFSSL_USER_CURRTIME.
  397. - Add RSA blinding for private key operations. Enable option of harden which is
  398. on by default. This negates timing attacks.
  399. - Add ECC and TLS support for all SECP, Koblitz and Brainpool curves.
  400. - Add helper functions for static memory option to allow getting optimum buffer
  401. sizes.
  402. - Update DTLS behavior on bad MAC. DTLS silently drops packets with bad MACs now.
  403. - Update fp_isprime function from libtom enchancement/cleanup repository.
  404. - Update sanity checks on inputs and return values for AES-CMAC.
  405. - Update wolfSSL for use with MYSQL v5.6.30.
  406. - Update LPCXpresso eclipse project to not include misc.c when not needed.
  407. - Fix retransmit of last DTLS flight with timeout notification. The last flight
  408. is no longer retransmitted on timeout.
  409. - Fixes to some code in math sections for compressed ECC keys. This includes
  410. edge cases for buffer size on allocation and adjustments for compressed curves
  411. build. The code and full list can be found on github with pull request #456.
  412. - Fix function argument mismatch for build with secure renegotiation.
  413. - X.509 bug fixes for reading in malformed certificates, reported by researchers
  414. at Columbia University
  415. - Fix GCC version 6 warning about hard tabs in poly1305.c. This was a warning
  416. produced by GCC 6 trying to determine the intent of code.
  417. - Fixes for static memory option. Including avoid potential race conditions with
  418. counters, decrement handshake counter correctly.
  419. - Fix anonymous cipher with Diffie Hellman on the server side. Was an issue of a
  420. possible buffer corruption. For information and code see pull request #481.
  421. - One high level security fix that requires an update for use with static RSA
  422. cipher suites was submitted. This fix was the addition of RSA blinding for
  423. private RSA operations. We recommend servers who allow static RSA cipher
  424. suites to also generate new private RSA keys. Static RSA cipher suites are
  425. turned off by default.
  426. See INSTALL file for build instructions.
  427. More info can be found on-line at //http://wolfssl.com/wolfSSL/Docs.html
  428. ********* wolfSSL (Formerly CyaSSL) Release 3.9.6 (6/14/2016)
  429. Release 3.9.6 of wolfSSL has bug fixes and new features including:
  430. - Add staticmemory feature
  431. - Add public wc_GetTime API with base64encode feature
  432. - Add AES CMAC algorithm
  433. - Add DTLS sessionexport feature
  434. - Add python wolfCrypt wrapper
  435. - Add ECC encrypt/decrypt benchmarks
  436. - Add dynamic session tickets
  437. - Add eccshamir option
  438. - Add Whitewood netRandom support --with-wnr
  439. - Add embOS port
  440. - Add minimum key size checks for RSA and ECC
  441. - Add STARTTLS support to examples
  442. - Add uTasker port
  443. - Add asynchronous crypto and wolf event support
  444. - Add compile check for misc.c with inline
  445. - Add RNG benchmark
  446. - Add reduction to stack usage with hash-based RNG
  447. - Update STM32F2_CRYPTO port with additional algorithms supported
  448. - Update MDK5 projects
  449. - Update AES-NI
  450. - Fix for STM32 with STM32F2_HASH defined
  451. - Fix for building with MinGw
  452. - Fix ECC math bugs with ALT_ECC_SIZE and key sizes over 256 bit (1)
  453. - Fix certificate buffers github issue #422
  454. - Fix decrypt max size with RSA OAEP
  455. - Fix DTLS sanity check with DTLS timeout notification
  456. - Fix free of WOLFSSL_METHOD on failure to create CTX
  457. - Fix memory leak in failure case with wc_RsaFunction (2)
  458. - No high level security fixes that requires an update though we always
  459. recommend updating to the latest
  460. - (1) Code changes for ECC fix can be found at pull requests #411, #416, and #428
  461. - (2) Builds using RSA with using normal math and not RSA_LOW_MEM should update
  462. - Tag 3.9.6w is for a Windows example echoserver fix
  463. See INSTALL file for build instructions.
  464. More info can be found on-line at //http://wolfssl.com/wolfSSL/Docs.html
  465. ********* wolfSSL (Formerly CyaSSL) Release 3.9.0 (3/18/2016)
  466. Release 3.9.0 of wolfSSL has bug fixes and new features including:
  467. - Add new leantls configuration
  468. - Add RSA OAEP padding at wolfCrypt level
  469. - Add Arduino port and example client
  470. - Add fixed point DH operation
  471. - Add CUSTOM_RAND_GENRATE_SEED_OS and CUSTOM_RAND_GENERATE_BLOCK
  472. - Add ECDHE-PSK cipher suites
  473. - Add PSK ChaCha20-Poly1305 cipher suites
  474. - Add option for fail on no peer cert except PSK suites
  475. - Add port for Nordic nRF51
  476. - Add additional ECC NIST test vectors for 256, 384 and 521
  477. - Add more granular ECC, Ed25519/Curve25519 and AES configs
  478. - Update to ChaCha20-Poly1305
  479. - Update support for Freescale KSDK 1.3.0
  480. - Update DER buffer handling code, refactoring and reducing memory
  481. - Fix to AESNI 192 bit key expansion
  482. - Fix to C# wrapper character encoding
  483. - Fix sequence number issue with DTLS epoch 0 messages
  484. - Fix RNGA with K64 build
  485. - Fix ASN.1 X509 V3 certificate policy extension parsing
  486. - Fix potential free of uninitialized RSA key in asn.c
  487. - Fix potential underflow when using ECC build with FP_ECC
  488. - Fixes for warnings in Visual Studio 2015 build
  489. - No high level security fixes that requires an update though we always
  490. recommend updating to the latest
  491. - FP_ECC is off by default, users with it enabled should update for the zero
  492. sized hash fix
  493. See INSTALL file for build instructions.
  494. More info can be found on-line at //http://wolfssl.com/yaSSL/Docs.html
  495. ********* wolfSSL (Formerly CyaSSL) Release 3.8.0 (12/30/2015)
  496. Release 3.8.0 of wolfSSL has bug fixes and new features including:
  497. - Example client/server with VxWorks
  498. - AESNI use with AES-GCM
  499. - Stunnel compatibility enhancements
  500. - Single shot hash and signature/verify API added
  501. - Update cavium nitrox port
  502. - LPCXpresso IDE support added
  503. - C# wrapper to support wolfSSL use by a C# program
  504. - (BETA version)OCSP stapling added
  505. - Update OpenSSH compatibility
  506. - Improve DTLS handshake when retransmitting finished message
  507. - fix idea_mult() for 16 and 32bit systems
  508. - fix LowResTimer on Microchip ports
  509. - No high level security fixes that requires an update though we always
  510. recommend updating to the latest
  511. See INSTALL file for build instructions.
  512. More info can be found on-line at //http://wolfssl.com/yaSSL/Docs.html
  513. ********* wolfSSL (Formerly CyaSSL) Release 3.7.0 (10/26/2015)
  514. Release 3.7.0 of wolfSSL has bug fixes and new features including:
  515. - ALPN extension support added for HTTP2 connections with --enable-alpn
  516. - Change of example/client/client max fragment flag -L -> -F
  517. - Throughput benchmarking, added scripts/benchmark.test
  518. - Sniffer API ssl_FreeDecodeBuffer added
  519. - Addition of AES_GCM to Sniffer
  520. - Sniffer change to handle unlimited decrypt buffer size
  521. - New option for the sniffer where it will try to pick up decoding after a
  522. sequence number acknowldgement fault. Also includes some additional stats.
  523. - JNI API setter and getter function for jobject added
  524. - User RSA crypto plugin abstraction. An example placed in wolfcrypt/user-crypto
  525. - fix to asn configuration bug
  526. - AES-GCM/CCM fixes.
  527. - Port for Rowley added
  528. - Rowley Crossworks bare metal examples added
  529. - MDK5-ARM project update
  530. - FreeRTOS support updates.
  531. - VXWorks support updates.
  532. - Added the IDEA cipher and support in wolfSSL.
  533. - Update wolfSSL website CA.
  534. - CFLAGS is usable when configuring source.
  535. - No high level security fixes that requires an update though we always
  536. recommend updating to the latest
  537. See INSTALL file for build instructions.
  538. More info can be found on-line at //http://wolfssl.com/yaSSL/Docs.html
  539. ********* wolfSSL (Formerly CyaSSL) Release 3.6.8 (09/17/2015)
  540. Release 3.6.8 of wolfSSL fixes two high severity vulnerabilities. It also
  541. includes bug fixes and new features including:
  542. - Two High level security fixes, all users SHOULD update.
  543. a) If using wolfSSL for DTLS on the server side of a publicly accessible
  544. machine you MUST update.
  545. b) If using wolfSSL for TLS on the server side with private RSA keys allowing
  546. ephemeral key exchange without low memory optimizations you MUST update and
  547. regenerate the private RSA keys.
  548. Please see https://www.wolfssl.com/wolfSSL/Blog/Blog.html for more details
  549. - No filesystem build fixes for various configurations
  550. - Certificate generation now supports several extensions including KeyUsage,
  551. SKID, AKID, and Certificate Policies
  552. - CRLs can be loaded from buffers as well as files now
  553. - SHA-512 Certificate Signing generation
  554. - Fixes for sniffer reassembly processing
  555. See INSTALL file for build instructions.
  556. More info can be found on-line at //http://wolfssl.com/yaSSL/Docs.html
  557. ********* wolfSSL (Formerly CyaSSL) Release 3.6.6 (08/20/2015)
  558. Release 3.6.6 of wolfSSL has bug fixes and new features including:
  559. - OpenSSH compatibility with --enable-openssh
  560. - stunnel compatibility with --enable-stunnel
  561. - lighttpd compatibility with --enable-lighty
  562. - SSLv3 is now disabled by default, can be enabled with --enable-sslv3
  563. - Ephemeral key cipher suites only are now supported by default
  564. To enable static ECDH cipher suites define WOLFSSL_STATIC_DH
  565. To enable static RSA cipher suites define WOLFSSL_STATIC_RSA
  566. To enable static PSK cipher suites define WOLFSSL_STATIC_PSK
  567. - Added QSH (quantum-safe handshake) extension with --enable-ntru
  568. - SRP is now part of wolfCrypt, enable with --enabe-srp
  569. - Certificate handshake messages can now be sent fragmented if the record
  570. size is smaller than the total message size, no user action required.
  571. - DTLS duplicate message fixes
  572. - Visual Studio project files now support DLL and static builds for 32/64bit.
  573. - Support for new Freescale I/O
  574. - FreeRTOS FIPS support
  575. - No high level security fixes that requires an update though we always
  576. recommend updating to the latest
  577. See INSTALL file for build instructions.
  578. More information can be found on-line at //http://wolfssl.com/yaSSL/Docs.html
  579. **************** wolfSSL (Formerly CyaSSL) Release 3.6.0 (06/19/2015)
  580. Release 3.6.0 of wolfSSL has bug fixes and new features including:
  581. - Max Strength build that only allows TLSv1.2, AEAD ciphers, and PFS (Perfect
  582. Forward Secrecy). With --enable-maxstrength
  583. - Server side session ticket support, the example server and echoserver use the
  584. example callback myTicketEncCb(), see wolfSSL_CTX_set_TicketEncCb()
  585. - FIPS version submitted for iOS.
  586. - TI Crypto Hardware Acceleration
  587. - DTLS fragmentation fixes
  588. - ECC key check validation with wc_ecc_check_key()
  589. - 32bit code options to reduce memory for Curve25519 and Ed25519
  590. - wolfSSL JNI build switch with --enable-jni
  591. - PicoTCP support improvements
  592. - DH min ephemeral key size enforcement with wolfSSL_CTX_SetMinDhKey_Sz()
  593. - KEEP_PEER_CERT and AltNames can now be used together
  594. - ChaCha20 big endian fix
  595. - SHA-512 signature algorithm support for key exchange and verify messages
  596. - ECC make key crash fix on RNG failure, ECC users must update.
  597. - Improvements to usage of time code.
  598. - Improvements to VS solution files.
  599. - GNU Binutils 2.24 (and late 2.23) ld has problems with some debug builds,
  600. to fix an ld error add C_EXTRA_FLAGS="-fdebug-types-section -g1".
  601. - No high level security fixes that requires an update though we always
  602. recommend updating to the latest (except note 14, ecc RNG failure)
  603. See INSTALL file for build instructions.
  604. More info can be found on-line at //http://wolfssl.com/yaSSL/Docs.html
  605. *****************wolfSSL (Formerly CyaSSL) Release 3.4.6 (03/30/2015)
  606. Release 3.4.6 of wolfSSL has bug fixes and new features including:
  607. - Intel Assembly Speedups using instructions rdrand, rdseed, aesni, avx1/2,
  608. rorx, mulx, adox, adcx . They can be enabled with --enable-intelasm.
  609. These speedup the use of RNG, SHA2, and public key algorithms.
  610. - Ed25519 support at the crypto level. Turn on with --enable-ed25519. Examples
  611. in wolcrypt/test/test.c ed25519_test().
  612. - Post Handshake Memory reductions. wolfSSL can now hold less than 1,000 bytes
  613. of memory per secure connection including cipher state.
  614. - wolfSSL API and wolfCrypt API fixes, you can still include the cyassl and
  615. ctaocrypt headers which will enable the compatibility APIs for the
  616. foreseeable future
  617. - INSTALL file to help direct users to build instructions for their environment
  618. - For ECC users with the normal math library a fix that prevents a crash when
  619. verify signature fails. Users of 3.4.0 with ECC and the normal math library
  620. must update
  621. - RC4 is now disabled by default in autoconf mode
  622. - AES-GCM and ChaCha20/Poly1305 are now enabled by default to make AEAD ciphers
  623. available without a switch
  624. - External ChaCha-Poly AEAD API, thanks to Andrew Burks for the contribution
  625. - DHE-PSK cipher suites can now be built without ASN or Cert support
  626. - Fix some NO MD5 build issues with optional features
  627. - Freescale CodeWarrior project updates
  628. - ECC curves can be individually turned on/off at build time.
  629. - Sniffer handles Cert Status message and other minor fixes
  630. - SetMinVersion() at the wolfSSL Context level instead of just SSL session level
  631. to allow minimum protocol version allowed at runtime
  632. - RNG failure resource cleanup fix
  633. - No high level security fixes that requires an update though we always
  634. recommend updating to the latest (except note 6 use case of ecc/normal math)
  635. See INSTALL file for build instructions.
  636. More info can be found on-line at //http://wolfssl.com/yaSSL/Docs.html
  637. *****************wolfSSL (Formerly CyaSSL) Release 3.4.0 (02/23/2015)
  638. Release 3.4.0 wolfSSL has bug fixes and new features including:
  639. - wolfSSL API and wolfCrypt API, you can still include the cyassl and ctaocrypt
  640. headers which will enable the compatibility APIs for the foreseeable future
  641. - Example use of the wolfCrypt API can be found in wolfcrypt/test/test.c
  642. - Example use of the wolfSSL API can be found in examples/client/client.c
  643. - Curve25519 now supported at the wolfCrypt level, wolfSSL layer coming soon
  644. - Improvements in the build configuration under AIX
  645. - Microchip Pic32 MZ updates
  646. - TIRTOS updates
  647. - PowerPC updates
  648. - Xcode project update
  649. - Bidirectional shutdown examples in client/server with -w (wait for full
  650. shutdown) option
  651. - Cycle counts on benchmarks for x86_64, more coming soon
  652. - ALT_ECC_SIZE for reducing ecc heap use with fastmath when also using large RSA
  653. keys
  654. - Various compile warnings
  655. - Scan-build warning fixes
  656. - Changed a memcpy to memmove in the sniffer (if using sniffer please update)
  657. - No high level security fixes that requires an update though we always
  658. recommend updating to the latest
  659. ***********CyaSSL Release 3.3.0 (12/05/2014)
  660. - Countermeasuers for Handshake message duplicates, CHANGE CIPHER without
  661. FINISHED, and fast forward attempts. Thanks to Karthikeyan Bhargavan from
  662. the Prosecco team at INRIA Paris-Rocquencourt for the report.
  663. - FIPS version submitted
  664. - Removes SSLv2 Client Hello processing, can be enabled with OLD_HELLO_ALLOWED
  665. - User can set minimum downgrade version with CyaSSL_SetMinVersion()
  666. - Small stack improvements at TLS/SSL layer
  667. - TLS Master Secret generation and Key Expansion are now exposed
  668. - Adds client side Secure Renegotiation, * not recommended *
  669. - Client side session ticket support, not fully tested with Secure Renegotiation
  670. - Allows up to 4096bit DHE at TLS Key Exchange layer
  671. - Handles non standard SessionID sizes in Hello Messages
  672. - PicoTCP Support
  673. - Sniffer now supports SNI Virtual Hosts
  674. - Sniffer now handles non HTTPS protocols using STARTTLS
  675. - Sniffer can now parse records with multiple messages
  676. - TI-RTOS updates
  677. - Fix for ColdFire optimized fp_digit read only in explicit 32bit case
  678. - ADH Cipher Suite ADH-AES128-SHA for EAP-FAST
  679. The CyaSSL manual is available at:
  680. http://www.wolfssl.com/documentation/CyaSSL-Manual.pdf. For build instructions
  681. and comments about the new features please check the manual.
  682. ***********CyaSSL Release 3.2.0 (09/10/2014)
  683. Release 3.2.0 CyaSSL has bug fixes and new features including:
  684. - ChaCha20 and Poly1305 crypto and suites
  685. - Small stack improvements for OCSP, CRL, TLS, DTLS
  686. - NTRU Encrypt and Decrypt benchmarks
  687. - Updated Visual Studio project files
  688. - Updated Keil MDK5 project files
  689. - Fix for DTLS sequence numbers with GCM/CCM
  690. - Updated HashDRBG with more secure struct declaration
  691. - TI-RTOS support and example Code Composer Studio project files
  692. - Ability to get enabled cipher suites, CyaSSL_get_ciphers()
  693. - AES-GCM/CCM/Direct support for Freescale mmCAU and CAU
  694. - Sniffer improvement checking for decrypt key setup
  695. - Support for raw ECC key import
  696. - Ability to convert ecc_key to DER, EccKeyToDer()
  697. - Security fix for RSA Padding check vulnerability reported by Intel Security
  698. Advanced Threat Research team
  699. The CyaSSL manual is available at:
  700. http://www.wolfssl.com/documentation/CyaSSL-Manual.pdf. For build instructions
  701. and comments about the new features please check the manual.
  702. ************ CyaSSL Release 3.1.0 (07/14/2014)
  703. Release 3.1.0 CyaSSL has bug fixes and new features including:
  704. - Fix for older versions of icc without 128-bit type
  705. - Intel ASM syntax for AES-NI
  706. - Updated NTRU support, keygen benchmark
  707. - FIPS check for minimum required HMAC key length
  708. - Small stack (--enable-smallstack) improvements for PKCS#7, ASN
  709. - TLS extension support for DTLS
  710. - Default I/O callbacks external to user
  711. - Updated example client with bad clock test
  712. - Ability to set optional ECC context info
  713. - Ability to enable/disable DH separate from opensslextra
  714. - Additional test key/cert buffers for CA and server
  715. - Updated example certificates
  716. The CyaSSL manual is available at:
  717. http://www.wolfssl.com/documentation/CyaSSL-Manual.pdf. For build instructions
  718. and comments about the new features please check the manual.
  719. ************ CyaSSL Release 3.0.2 (05/30/2014)
  720. Release 3.0.2 CyaSSL has bug fixes and new features including:
  721. - Added the following cipher suites:
  722. * TLS_PSK_WITH_AES_128_GCM_SHA256
  723. * TLS_PSK_WITH_AES_256_GCM_SHA384
  724. * TLS_PSK_WITH_AES_256_CBC_SHA384
  725. * TLS_PSK_WITH_NULL_SHA384
  726. * TLS_DHE_PSK_WITH_AES_128_GCM_SHA256
  727. * TLS_DHE_PSK_WITH_AES_256_GCM_SHA384
  728. * TLS_DHE_PSK_WITH_AES_128_CBC_SHA256
  729. * TLS_DHE_PSK_WITH_AES_256_CBC_SHA384
  730. * TLS_DHE_PSK_WITH_NULL_SHA256
  731. * TLS_DHE_PSK_WITH_NULL_SHA384
  732. * TLS_DHE_PSK_WITH_AES_128_CCM
  733. * TLS_DHE_PSK_WITH_AES_256_CCM
  734. - Added AES-NI support for Microsoft Visual Studio builds.
  735. - Changed small stack build to be disabled by default.
  736. - Updated the Hash DRBG and provided a configure option to enable.
  737. The CyaSSL manual is available at:
  738. http://www.wolfssl.com/documentation/CyaSSL-Manual.pdf. For build instructions
  739. and comments about the new features please check the manual.
  740. ************ CyaSSL Release 3.0.0 (04/29/2014)
  741. Release 3.0.0 CyaSSL has bug fixes and new features including:
  742. - FIPS release candidate
  743. - X.509 improvements that address items reported by Suman Jana with security
  744. researchers at UT Austin and UC Davis
  745. - Small stack size improvements, --enable-smallstack. Offloads large local
  746. variables to the heap. (Note this is not complete.)
  747. - Updated AES-CCM-8 cipher suites to use approved suite numbers.
  748. The CyaSSL manual is available at:
  749. http://www.wolfssl.com/documentation/CyaSSL-Manual.pdf. For build instructions
  750. and comments about the new features please check the manual.
  751. ************ CyaSSL Release 2.9.4 (04/09/2014)
  752. Release 2.9.4 CyaSSL has bug fixes and new features including:
  753. - Security fixes that address items reported by Ivan Fratric of the Google
  754. Security Team
  755. - X.509 Unknown critical extensions treated as errors, report by Suman Jana with
  756. security researchers at UT Austin and UC Davis
  757. - Sniffer fixes for corrupted packet length and Jumbo frames
  758. - ARM thumb mode assembly fixes
  759. - Xcode 5.1 support including new clang
  760. - PIC32 MZ hardware support
  761. - CyaSSL Object has enough room to read the Record Header now w/o allocs
  762. - FIPS wrappers for AES, 3DES, SHA1, SHA256, SHA384, HMAC, and RSA.
  763. - A sample I/O pool is demonstrated with --enable-iopool to overtake memory
  764. handling and reduce memory fragmentation on I/O large sizes
  765. The CyaSSL manual is available at:
  766. http://www.wolfssl.com/documentation/CyaSSL-Manual.pdf. For build instructions
  767. and comments about the new features please check the manual.
  768. ************ CyaSSL Release 2.9.0 (02/07/2014)
  769. Release 2.9.0 CyaSSL has bug fixes and new features including:
  770. - Freescale Kinetis RNGB support
  771. - Freescale Kinetis mmCAU support
  772. - TLS Hello extensions
  773. - ECC
  774. - Secure Renegotiation (null)
  775. - Truncated HMAC
  776. - SCEP support
  777. - PKCS #7 Enveloped data and signed data
  778. - PKCS #10 Certificate Signing Request generation
  779. - DTLS sliding window
  780. - OCSP Improvements
  781. - API change to integrate into Certificate Manager
  782. - IPv4/IPv6 agnostic
  783. - example client/server support for OCSP
  784. - OCSP nonces are optional
  785. - GMAC hashing
  786. - Windows build additions
  787. - Windows CYGWIN build fixes
  788. - Updated test certificates
  789. - Microchip MPLAB Harmony support
  790. - Update autoconf scripts
  791. - Additional X.509 inspection functions
  792. - ECC encrypt/decrypt primitives
  793. - ECC Certificate generation
  794. The Freescale Kinetis K53 RNGB documentation can be found in Chapter 33 of the
  795. K53 Sub-Family Reference Manual:
  796. http://cache.freescale.com/files/32bit/doc/ref_manual/K53P144M100SF2RM.pdf
  797. Freescale Kinetis K60 mmCAU (AES, DES, 3DES, MD5, SHA, SHA256) documentation
  798. can be found in the "ColdFire/ColdFire+ CAU and Kinetis mmCAU Software Library
  799. User Guide":
  800. http://cache.freescale.com/files/32bit/doc/user_guide/CAUAPIUG.pdf
  801. *****************CyaSSL Release 2.8.0 (8/30/2013)
  802. Release 2.8.0 CyaSSL has bug fixes and new features including:
  803. - AES-GCM and AES-CCM use AES-NI
  804. - NetX default IO callback handlers
  805. - IPv6 fixes for DTLS Hello Cookies
  806. - The ability to unload Certs/Keys after the handshake, CyaSSL_UnloadCertsKeys()
  807. - SEP certificate extensions
  808. - Callback getters for easier resource freeing
  809. - External CYASSL_MAX_ERROR_SZ for correct error buffer sizing
  810. - MacEncrypt and DecryptVerify Callbacks for User Atomic Record Layer Processing
  811. - Public Key Callbacks for ECC and RSA
  812. - Client now sends blank cert upon request if doesn't have one with TLS <= 1.2
  813. The CyaSSL manual is available at:
  814. http://www.wolfssl.com/documentation/CyaSSL-Manual.pdf. For build instructions
  815. and comments about the new features please check the manual.
  816. *****************CyaSSL Release 2.7.0 (6/17/2013)
  817. Release 2.7.0 CyaSSL has bug fixes and new features including:
  818. - SNI support for client and server
  819. - KEIL MDK-ARM projects
  820. - Wildcard check to domain name match, and Subject altnames are checked too
  821. - Better error messages for certificate verification errors
  822. - Ability to discard session during handshake verify
  823. - More consistent error returns across all APIs
  824. - Ability to unload CAs at the CTX or CertManager level
  825. - Authority subject id support for Certificate matching
  826. - Persistent session cache functionality
  827. - Persistent CA cache functionality
  828. - Client session table lookups to push serverID table to library level
  829. - Camellia support to sniffer
  830. - User controllable settings for DTLS timeout values
  831. - Sniffer fixes for caching long lived sessions
  832. - DTLS reliability enhancements for the handshake
  833. - Better ThreadX support
  834. When compiling with Mingw, libtool may give the following warning due to
  835. path conversion errors:
  836. libtool: link: Could not determine host file name corresponding to **
  837. libtool: link: Continuing, but uninstalled executables may not work.
  838. If so, examples and testsuite will have problems when run, showing an
  839. error while loading shared libraries. To resolve, please run "make install".
  840. The CyaSSL manual is available at:
  841. http://www.wolfssl.com/documentation/CyaSSL-Manual.pdf. For build instructions
  842. and comments about the new features please check the manual.
  843. ************** CyaSSL Release 2.6.0 (04/15/2013)
  844. Release 2.6.0 CyaSSL has bug fixes and new features including:
  845. - DTLS 1.2 support including AEAD ciphers
  846. - SHA-3 finalist Blake2 support, it's fast and uses little resources
  847. - SHA-384 cipher suites including ECC ones
  848. - HMAC now supports SHA-512
  849. - Track memory use for example client/server with -t option
  850. - Better IPv6 examples with --enable-ipv6, before if ipv6 examples/tests were
  851. turned on, localhost only was used. Now link-local (with scope ids) and ipv6
  852. hosts can be used as well.
  853. - Xcode v4.6 project for iOS v6.1 update
  854. - settings.h is now checked in all *.c files for true one file setting detection
  855. - Better alignment at SSL layer for hardware crypto alignment needs
  856. * Note, SSL itself isn't friendly to alignment with 5 byte TLS headers and
  857. 13 bytes DTLS headers, but every effort is now made to align with the
  858. CYASSL_GENERAL_ALIGNMENT flag which sets desired alignment requirement
  859. - NO_64BIT flag to turn off 64bit data type accumulators in public key code
  860. * Note, some systems are faster with 32bit accumulators
  861. - --enable-stacksize for example client/server stack use
  862. * Note, modern desktop Operating Systems may add bytes to each stack frame
  863. - Updated compression/decompression with direct crypto access
  864. - All ./configure options are now lowercase only for consistency
  865. - ./configure builds default to fastmath option
  866. * Note, if on ia32 and building in shared mode this may produce a problem
  867. with a missing register being available because of PIC, there are at least
  868. 6 solutions to this:
  869. 1) --disable-fastmath , don't use fastmath
  870. 2) --disable-shared, don't build a shared library
  871. 3) C_EXTRA_FLAGS=-DTFM_NO_ASM , turn off assembly use
  872. 4) use clang, it just seems to work
  873. 5) play around with no PIC options to force all registers being open,
  874. e.g, --without-pic
  875. 6) if static lib is still a problem try removing fPIE
  876. - Many new ./configure switches for option enable/disable for example
  877. * rsa
  878. * dh
  879. * dsa
  880. * md5
  881. * sha
  882. * arc4
  883. * null (allow NULL ciphers)
  884. * oldtls (only use TLS 1.2)
  885. * asn (no certs or public keys allowed)
  886. - ./configure generates cyassl/options.h which allows a header the user can
  887. include in their app to make sure the same options are set at the app and
  888. CyaSSL level.
  889. - autoconf no longer needs serial-tests which lowers version requirements of
  890. automake to 1.11 and autoconf to 2.63
  891. The CyaSSL manual is available at:
  892. http://www.wolfssl.com/documentation/CyaSSL-Manual.pdf. For build instructions
  893. and comments about the new features please check the manual.
  894. ************** CyaSSL Release 2.5.0 (02/04/2013)
  895. Release 2.5.0 CyaSSL has bug fixes and new features including:
  896. - Fix for TLS CBC padding timing attack identified by Nadhem Alfardan and
  897. Kenny Paterson: http://www.isg.rhul.ac.uk/tls/
  898. - Microchip PIC32 (MIPS16, MIPS32) support
  899. - Microchip MPLAB X example projects for PIC32 Ethernet Starter Kit
  900. - Updated CTaoCrypt benchmark app for embedded systems
  901. - 1024-bit test certs/keys and cert/key buffers
  902. - AES-CCM-8 crypto and cipher suites
  903. - Camellia crypto and cipher suites
  904. - Bumped minimum autoconf version to 2.65, automake version to 1.12
  905. - Addition of OCSP callbacks
  906. - STM32F2 support with hardware crypto and RNG
  907. - Cavium NITROX support
  908. CTaoCrypt now has support for the Microchip PIC32 and has been tested with
  909. the Microchip PIC32 Ethernet Starter Kit, the XC32 compiler and
  910. MPLAB X IDE in both MIPS16 and MIPS32 instruction set modes. See the README
  911. located under the <cyassl_root>/mplabx directory for more details.
  912. To add Cavium NITROX support do:
  913. ./configure --with-cavium=/home/user/cavium/software
  914. pointing to your licensed cavium/software directory. Since Cavium doesn't
  915. build a library we pull in the cavium_common.o file which gives a libtool
  916. warning about the portability of this. Also, if you're using the github source
  917. tree you'll need to remove the -Wredundant-decls warning from the generated
  918. Makefile because the cavium headers don't conform to this warning. Currently
  919. CyaSSL supports Cavium RNG, AES, 3DES, RC4, HMAC, and RSA directly at the crypto
  920. layer. Support at the SSL level is partial and currently just does AES, 3DES,
  921. and RC4. RSA and HMAC are slower until the Cavium calls can be utilized in non
  922. blocking mode. The example client turns on cavium support as does the crypto
  923. test and benchmark. Please see the HAVE_CAVIUM define.
  924. CyaSSL is able to use the STM32F2 hardware-based cryptography and random number
  925. generator through the STM32F2 Standard Peripheral Library. For necessary
  926. defines, see the CYASSL_STM32F2 define in settings.h. Documentation for the
  927. STM32F2 Standard Peripheral Library can be found in the following document:
  928. http://www.st.com/internet/com/TECHNICAL_RESOURCES/TECHNICAL_LITERATURE/USER_MANUAL/DM00023896.pdf
  929. The CyaSSL manual is available at:
  930. http://www.wolfssl.com/documentation/CyaSSL-Manual.pdf. For build instructions
  931. and comments about the new features please check the manual.
  932. *************** CyaSSL Release 2.4.6 (12/20/2012)
  933. Release 2.4.6 CyaSSL has bug fixes and a few new features including:
  934. - ECC into main version
  935. - Lean PSK build (reduced code size, RAM usage, and stack usage)
  936. - FreeBSD CRL monitor support
  937. - CyaSSL_peek()
  938. - CyaSSL_send() and CyaSSL_recv() for I/O flag setting
  939. - CodeWarrior Support
  940. - MQX Support
  941. - Freescale Kinetis support including Hardware RNG
  942. - autoconf builds use jobserver
  943. - cyassl-config
  944. - Sniffer memory reductions
  945. Thanks to Brian Aker for the improved autoconf system, make rpm, cyassl-config,
  946. warning system, and general good ideas for improving CyaSSL!
  947. The Freescale Kinetis K70 RNGA documentation can be found in Chapter 37 of the
  948. K70 Sub-Family Reference Manual:
  949. http://cache.freescale.com/files/microcontrollers/doc/ref_manual/K70P256M150SF3RM.pdf
  950. The CyaSSL manual is available at:
  951. http://www.wolfssl.com/documentation/CyaSSL-Manual.pdf. For build instructions
  952. and comments about the new features please check the manual.
  953. *************** CyaSSL Release 2.4.0 (10/10/2012)
  954. Release 2.4.0 CyaSSL has bug fixes and a few new features including:
  955. - DTLS reliability
  956. - Reduced memory usage after handshake
  957. - Updated build process
  958. The CyaSSL manual is available at:
  959. http://www.wolfssl.com/documentation/CyaSSL-Manual.pdf. For build instructions
  960. and comments about the new features please check the manual.
  961. *************** CyaSSL Release 2.3.0 (8/10/2012)
  962. Release 2.3.0 CyaSSL has bug fixes and a few new features including:
  963. - AES-GCM crypto and cipher suites
  964. - make test cipher suite checks
  965. - Subject AltName processing
  966. - Command line support for client/server examples
  967. - Sniffer SessionTicket support
  968. - SHA-384 cipher suites
  969. - Verify cipher suite validity when user overrides
  970. - CRL dir monitoring
  971. - DTLS Cookie support, reliability coming soon
  972. The CyaSSL manual is available at:
  973. http://www.wolfssl.com/documentation/CyaSSL-Manual.pdf. For build instructions
  974. and comments about the new features please check the manual.
  975. ***************CyaSSL Release 2.2.0 (5/18/2012)
  976. Release 2.2.0 CyaSSL has bug fixes and a few new features including:
  977. - Initial CRL support (--enable-crl)
  978. - Initial OCSP support (--enable-ocsp)
  979. - Add static ECDH suites
  980. - SHA-384 support
  981. - ECC client certificate support
  982. - Add medium session cache size (1055 sessions)
  983. - Updated unit tests
  984. - Protection against mutex reinitialization
  985. The CyaSSL manual is available at:
  986. http://www.wolfssl.com/documentation/CyaSSL-Manual.pdf. For build instructions
  987. and comments about the new features please check the manual.
  988. ***************CyaSSL Release 2.0.8 (2/24/2012)
  989. Release 2.0.8 CyaSSL has bug fixes and a few new features including:
  990. - A fix for malicious certificates pointed out by Remi Gacogne (thanks)
  991. resulting in NULL pointer use.
  992. - Respond to renegotiation attempt with no_renegoatation alert
  993. - Add basic path support for load_verify_locations()
  994. - Add set Temp EC-DHE key size
  995. - Extra checks on rsa test when porting into
  996. The CyaSSL manual is available at:
  997. http://www.wolfssl.com/documentation/CyaSSL-Manual.pdf. For build instructions
  998. and comments about the new features please check the manual.
  999. ************* CyaSSL Release 2.0.6 (1/27/2012)
  1000. Release 2.0.6 CyaSSL has bug fixes and a few new features including:
  1001. - Fixes for CA basis constraint check
  1002. - CTX reference counting
  1003. - Initial unit test additions
  1004. - Lean and Mean Windows fix
  1005. - ECC benchmarking
  1006. - SSMTP build support
  1007. - Ability to group handshake messages with set_group_messages(ctx/ssl)
  1008. - CA cache addition callback
  1009. - Export Base64_Encode for general use
  1010. The CyaSSL manual is available at:
  1011. http://www.wolfssl.com/documentation/CyaSSL-Manual.pdf. For build instructions
  1012. and comments about the new features please check the manual.
  1013. ************* CyaSSL Release 2.0.2 (12/05/2011)
  1014. Release 2.0.2 CyaSSL has bug fixes and a few new features including:
  1015. - CTaoCrypt Runtime library detection settings when directly using the crypto
  1016. library
  1017. - Default certificate generation now uses SHAwRSA and adds SHA256wRSA generation
  1018. - All test certificates now use 2048bit and SHA-1 for better modern browser
  1019. support
  1020. - Direct AES block access and AES-CTR (counter) mode
  1021. - Microchip pic32 support
  1022. The CyaSSL manual is available at:
  1023. http://www.wolfssl.com/documentation/CyaSSL-Manual.pdf. For build instructions
  1024. and comments about the new features please check the manual.
  1025. ************* CyaSSL Release 2.0.0rc3 (9/28/2011)
  1026. Release 2.0.0rc3 for CyaSSL has bug fixes and a few new features including:
  1027. - updated autoconf support
  1028. - better make install and uninstall (uses system directories)
  1029. - make test / make check
  1030. - CyaSSL headers now in <cyassl/*.h>
  1031. - CTaocrypt headers now in <cyassl/ctaocrypt/*.h>
  1032. - OpenSSL compatibility headers now in <cyassl/openssl/*.h>
  1033. - examples and tests all run from home directory so can use certs in ./certs
  1034. (see note 1)
  1035. So previous applications that used the OpenSSL compatibility header
  1036. <openssl/ssl.h> now need to include <cyassl/openssl/ssl.h> instead, no other
  1037. changes are required.
  1038. Special Thanks to Brian Aker for his autoconf, install, and header patches.
  1039. The CyaSSL manual is available at:
  1040. http://www.wolfssl.com/documentation/CyaSSL-Manual.pdf. For build instructions
  1041. and comments about the new features please check the manual.
  1042. ************CyaSSL Release 2.0.0rc2 (6/6/2011)
  1043. Release 2.0.0rc2 for CyaSSL has bug fixes and a few new features including:
  1044. - bug fixes (Alerts, DTLS with DHE)
  1045. - FreeRTOS support
  1046. - lwIP support
  1047. - Wshadow warnings removed
  1048. - asn public header
  1049. - CTaoCrypt public headers now all have ctc_ prefix (the manual is still being
  1050. updated to reflect this change)
  1051. - and more.
  1052. This is the 2nd and perhaps final release candidate for version 2.
  1053. Please send any comments or questions to support@wolfssl.com.
  1054. The CyaSSL manual is available at:
  1055. http://www.wolfssl.com/documentation/CyaSSL-Manual.pdf. For build instructions
  1056. and comments about the new features please check the manual.
  1057. ***********CyaSSL Release 2.0.0rc1 (5/2/2011)
  1058. Release 2.0.0rc1 for CyaSSL has many new features including:
  1059. - bug fixes
  1060. - SHA-256 cipher suites
  1061. - Root Certificate Verification (instead of needing all certs in the chain)
  1062. - PKCS #8 private key encryption (supports PKCS #5 v1-v2 and PKCS #12)
  1063. - Serial number retrieval for x509
  1064. - PBKDF2 and PKCS #12 PBKDF
  1065. - UID parsing for x509
  1066. - SHA-256 certificate signatures
  1067. - Client and server can send chains (SSL_CTX_use_certificate_chain_file)
  1068. - CA loading can now parse multiple certificates per file
  1069. - Dynamic memory runtime hooks
  1070. - Runtime hooks for logging
  1071. - EDH on server side
  1072. - More informative error codes
  1073. - More informative logging messages
  1074. - Version downgrade more robust (use SSL_v23*)
  1075. - Shared build only by default through ./configure
  1076. - Compiler visibility is now used, internal functions not polluting namespace
  1077. - Single Makefile, no recursion, for faster and simpler building
  1078. - Turn on all warnings possible build option, warning fixes
  1079. - and more.
  1080. Because of all the new features and the multiple OS, compiler, feature-set
  1081. options that CyaSSL allows, there may be some configuration fixes needed.
  1082. Please send any comments or questions to support@wolfssl.com.
  1083. The CyaSSL manual is available at:
  1084. http://www.wolfssl.com/documentation/CyaSSL-Manual.pdf. For build instructions
  1085. and comments about the new features please check the manual.
  1086. ****************** CyaSSL Release 1.9.0 (3/2/2011)
  1087. Release 1.9.0 for CyaSSL adds bug fixes, improved TLSv1.2 through testing and
  1088. better hash/sig algo ids, --enable-webServer for the yaSSL embedded web server,
  1089. improper AES key setup detection, user cert verify callback improvements, and
  1090. more.
  1091. The CyaSSL manual offering is included in the doc/ directory. For build
  1092. instructions and comments about the new features please check the manual.
  1093. Please send any comments or questions to support@wolfssl.com.
  1094. ****************** CyaSSL Release 1.8.0 (12/23/2010)
  1095. Release 1.8.0 for CyaSSL adds bug fixes, x509 v3 CA signed certificate
  1096. generation, a C standard library abstraction layer, lower memory use, increased
  1097. portability through the os_settings.h file, and the ability to use NTRU cipher
  1098. suites when used in conjunction with an NTRU license and library.
  1099. The initial CyaSSL manual offering is included in the doc/ directory. For
  1100. build instructions and comments about the new features please check the manual.
  1101. Please send any comments or questions to support@wolfssl.com.
  1102. Happy Holidays.
  1103. ********************* CyaSSL Release 1.6.5 (9/9/2010)
  1104. Release 1.6.5 for CyaSSL adds bug fixes and x509 v3 self signed certificate
  1105. generation.
  1106. For general build instructions see doc/Building_CyaSSL.pdf.
  1107. To enable certificate generation support add this option to ./configure
  1108. ./configure --enable-certgen
  1109. An example is included in ctaocrypt/test/test.c and documentation is provided
  1110. in doc/CyaSSL_Extensions_Reference.pdf item 11.
  1111. ********************** CyaSSL Release 1.6.0 (8/27/2010)
  1112. Release 1.6.0 for CyaSSL adds bug fixes, RIPEMD-160, SHA-512, and RSA key
  1113. generation.
  1114. For general build instructions see doc/Building_CyaSSL.pdf.
  1115. To add RIPEMD-160 support add this option to ./configure
  1116. ./configure --enable-ripemd
  1117. To add SHA-512 support add this option to ./configure
  1118. ./configure --enable-sha512
  1119. To add RSA key generation support add this option to ./configure
  1120. ./configure --enable-keygen
  1121. Please see ctaocrypt/test/test.c for examples and usage.
  1122. For Windows, RIPEMD-160 and SHA-512 are enabled by default but key generation is
  1123. off by default. To turn key generation on add the define CYASSL_KEY_GEN to
  1124. CyaSSL.
  1125. ************* CyaSSL Release 1.5.6 (7/28/2010)
  1126. Release 1.5.6 for CyaSSL adds bug fixes, compatibility for our JSSE provider,
  1127. and a fix for GCC builds on some systems.
  1128. For general build instructions see doc/Building_CyaSSL.pdf.
  1129. To add AES-NI support add this option to ./configure
  1130. ./configure --enable-aesni
  1131. You'll need GCC 4.4.3 or later to make use of the assembly.
  1132. ************** CyaSSL Release 1.5.4 (7/7/2010)
  1133. Release 1.5.4 for CyaSSL adds bug fixes, support for AES-NI, SHA1 speed
  1134. improvements from loop unrolling, and support for the Mongoose Web Server.
  1135. For general build instructions see doc/Building_CyaSSL.pdf.
  1136. To add AES-NI support add this option to ./configure
  1137. ./configure --enable-aesni
  1138. You'll need GCC 4.4.3 or later to make use of the assembly.
  1139. *************** CyaSSL Release 1.5.0 (5/11/2010)
  1140. Release 1.5.0 for CyaSSL adds bug fixes, GoAhead WebServer support, sniffer
  1141. support, and initial swig interface support.
  1142. For general build instructions see doc/Building_CyaSSL.pdf.
  1143. To add support for GoAhead WebServer either --enable-opensslExtra or if you
  1144. don't want all the features of opensslExtra you can just define GOAHEAD_WS
  1145. instead. GOAHEAD_WS can be added to ./configure with CFLAGS=-DGOAHEAD_WS or
  1146. you can define it yourself.
  1147. To look at the sniffer support please see the sniffertest app in
  1148. sslSniffer/sslSnifferTest. Build with --enable-sniffer on *nix or use the
  1149. vcproj files on windows. You'll need to have pcap installed on *nix and
  1150. WinPcap on windows.
  1151. A swig interface file is now located in the swig directory for using Python,
  1152. Java, Perl, and others with CyaSSL. This is initial support and experimental,
  1153. please send questions or comments to support@wolfssl.com.
  1154. When doing load testing with CyaSSL, on the echoserver example say, the client
  1155. machine may run out of tcp ephemeral ports, they will end up in the TIME_WAIT
  1156. queue, and can't be reused by default. There are generally two ways to fix
  1157. this. 1) Reduce the length sockets remain on the TIME_WAIT queue or 2) Allow
  1158. items on the TIME_WAIT queue to be reused.
  1159. To reduce the TIME_WAIT length in OS X to 3 seconds (3000 milliseconds)
  1160. sudo sysctl -w net.inet.tcp.msl=3000
  1161. In Linux
  1162. sudo sysctl -w net.ipv4.tcp_tw_reuse=1
  1163. allows reuse of sockets in TIME_WAIT
  1164. sudo sysctl -w net.ipv4.tcp_tw_recycle=1
  1165. works but seems to remove sockets from TIME_WAIT entirely?
  1166. sudo sysctl -w net.ipv4.tcp_fin_timeout=1
  1167. doen't control TIME_WAIT, it controls FIN_WAIT(2) contrary to some posts
  1168. ******************** CyaSSL Release 1.4.0 (2/18/2010)
  1169. Release 1.3.0 for CyaSSL adds bug fixes, better multi TLS/SSL version support
  1170. through SSLv23_server_method(), and improved documentation in the doc/ folder.
  1171. For general build instructions doc/Building_CyaSSL.pdf.
  1172. ******************** CyaSSL Release 1.3.0 (1/21/2010)
  1173. Release 1.3.0 for CyaSSL adds bug fixes, a potential security problem fix,
  1174. better porting support, removal of assert()s, and a complete THREADX port.
  1175. For general build instructions see rc1 below.
  1176. ******************** CyaSSL Release 1.2.0 (11/2/2009)
  1177. Release 1.2.0 for CyaSSL adds bug fixes and session negotiation if first use is
  1178. read or write.
  1179. For general build instructions see rc1 below.
  1180. ******************** CyaSSL Release 1.1.0 (9/2/2009)
  1181. Release 1.1.0 for CyaSSL adds bug fixes, a check against malicious session
  1182. cache use, support for lighttpd, and TLS 1.2.
  1183. To get TLS 1.2 support please use the client and server functions:
  1184. SSL_METHOD *TLSv1_2_server_method(void);
  1185. SSL_METHOD *TLSv1_2_client_method(void);
  1186. CyaSSL was tested against lighttpd 1.4.23. To build CyaSSL for use with
  1187. lighttpd use the following commands from the CyaSSL install dir <CyaSSLDir>:
  1188. ./configure --disable-shared --enable-opensslExtra --enable-fastmath --without-zlib
  1189. make
  1190. make openssl-links
  1191. Then to build lighttpd with CyaSSL use the following commands from the
  1192. lighttpd install dir:
  1193. ./configure --with-openssl --with-openssl-includes=<CyaSSLDir>/include --with-openssl-libs=<CyaSSLDir>/lib LDFLAGS=-lm
  1194. make
  1195. On some systems you may get a linker error about a duplicate symbol for
  1196. MD5_Init or other MD5 calls. This seems to be caused by the lighttpd src file
  1197. md5.c, which defines MD5_Init(), and is included in liblightcomp_la-md5.o.
  1198. When liblightcomp is linked with the SSL_LIBs the linker may complain about
  1199. the duplicate symbol. This can be fixed by editing the lighttpd src file md5.c
  1200. and adding this line to the beginning of the file:
  1201. #if 0
  1202. and this line to the end of the file
  1203. #endif
  1204. Then from the lighttpd src dir do a:
  1205. make clean
  1206. make
  1207. If you get link errors about undefined symbols more than likely the actual
  1208. OpenSSL libraries are found by the linker before the CyaSSL openssl-links that
  1209. point to the CyaSSL library, causing the linker confusion. This can be fixed
  1210. by editing the Makefile in the lighttpd src directory and changing the line:
  1211. SSL_LIB = -lssl -lcrypto
  1212. to
  1213. SSL_LIB = -lcyassl
  1214. Then from the lighttpd src dir do a:
  1215. make clean
  1216. make
  1217. This should remove any confusion the linker may be having with missing symbols.
  1218. For any questions or concerns please contact support@wolfssl.com .
  1219. For general build instructions see rc1 below.
  1220. ******************CyaSSL Release 1.0.6 (8/03/2009)
  1221. Release 1.0.6 for CyaSSL adds bug fixes, an improved session cache, and faster
  1222. math with a huge code option.
  1223. The session cache now defaults to a client mode, also good for embedded servers.
  1224. For servers not under heavy load (less than 200 new sessions per minute), define
  1225. BIG_SESSION_CACHE. If the server will be under heavy load, define
  1226. HUGE_SESSION_CACHE.
  1227. There is now a fasthugemath option for configure. This enables fastmath plus
  1228. even faster math by greatly increasing the code size of the math library. Use
  1229. the benchmark utility to compare public key operations.
  1230. For general build instructions see rc1 below.
  1231. ******************CyaSSL Release 1.0.3 (5/10/2009)
  1232. Release 1.0.3 for CyaSSL adds bug fixes and add increased support for OpenSSL
  1233. compatibility when building other applications.
  1234. Release 1.0.3 includes an alpha release of DTLS for both client and servers.
  1235. This is only for testing purposes at this time. Rebroadcast and reordering
  1236. aren't fully implemented at this time but will be for the next release.
  1237. For general build instructions see rc1 below.
  1238. ******************CyaSSL Release 1.0.2 (4/3/2009)
  1239. Release 1.0.2 for CyaSSL adds bug fixes for a couple I/O issues. Some systems
  1240. will send a SIGPIPE on socket recv() at any time and this should be handled by
  1241. the application by turning off SIGPIPE through setsockopt() or returning from
  1242. the handler.
  1243. Release 1.0.2 includes an alpha release of DTLS for both client and servers.
  1244. This is only for testing purposes at this time. Rebroadcast and reordering
  1245. aren't fully implemented at this time but will be for the next release.
  1246. For general build instructions see rc1 below.
  1247. *****************CyaSSL Release Candidate 3 rc3-1.0.0 (2/25/2009)
  1248. Release Candidate 3 for CyaSSL 1.0.0 adds bug fixes and adds a project file for
  1249. iPhone development with Xcode. cyassl-iphone.xcodeproj is located in the root
  1250. directory. This release also includes a fix for supporting other
  1251. implementations that bundle multiple messages at the record layer, this was
  1252. lost when cyassl i/o was re-implemented but is now fixed.
  1253. For general build instructions see rc1 below.
  1254. *****************CyaSSL Release Candidate 2 rc2-1.0.0 (1/21/2009)
  1255. Release Candidate 2 for CyaSSL 1.0.0 adds bug fixes and adds two new stream
  1256. ciphers along with their respective cipher suites. CyaSSL adds support for
  1257. HC-128 and RABBIT stream ciphers. The new suites are:
  1258. TLS_RSA_WITH_HC_128_SHA
  1259. TLS_RSA_WITH_RABBIT_SHA
  1260. And the corresponding cipher names are
  1261. HC128-SHA
  1262. RABBIT-SHA
  1263. CyaSSL also adds support for building with devkitPro for PPC by changing the
  1264. library proper to use libogc. The examples haven't been changed yet but if
  1265. there's interest they can be. Here's an example ./configure to build CyaSSL
  1266. for devkitPro:
  1267. ./configure --disable-shared CC=/pathTo/devkitpro/devkitPPC/bin/powerpc-gekko-gcc --host=ppc --without-zlib --enable-singleThreaded RANLIB=/pathTo/devkitpro/devkitPPC/bin/powerpc-gekko-ranlib CFLAGS="-DDEVKITPRO -DGEKKO"
  1268. For linking purposes you'll need
  1269. LDFLAGS="-g -mrvl -mcpu=750 -meabi -mhard-float -Wl,-Map,$(notdir $@).map"
  1270. For general build instructions see rc1 below.
  1271. ********************CyaSSL Release Candidate 1 rc1-1.0.0 (12/17/2008)
  1272. Release Candidate 1 for CyaSSL 1.0.0 contains major internal changes. Several
  1273. areas have optimization improvements, less dynamic memory use, and the I/O
  1274. strategy has been refactored to allow alternate I/O handling or Library use.
  1275. Many thanks to Thierry Fournier for providing these ideas and most of the work.
  1276. Because of these changes, this release is only a candidate since some problems
  1277. are probably inevitable on some platform with some I/O use. Please report any
  1278. problems and we'll try to resolve them as soon as possible. You can contact us
  1279. at support@wolfssl.com or todd@wolfssl.com.
  1280. Using TomsFastMath by passing --enable-fastmath to ./configure now uses assembly
  1281. on some platforms. This is new so please report any problems as every compiler,
  1282. mode, OS combination hasn't been tested. On ia32 all of the registers need to
  1283. be available so be sure to pass these options to CFLAGS:
  1284. CFLAGS="-O3 -fomit-frame-pointer"
  1285. OS X will also need -mdynamic-no-pic added to CFLAGS
  1286. Also if you're building in shared mode for ia32 you'll need to pass options to
  1287. LDFLAGS as well on OS X:
  1288. LDFLAGS=-Wl,-read_only_relocs,warning
  1289. This gives warnings for some symbols but seems to work.
  1290. --To build on Linux, Solaris, *BSD, Mac OS X, or Cygwin:
  1291. ./configure
  1292. make
  1293. from the ./testsuite/ directory run ./testsuite
  1294. to make a debug build:
  1295. ./configure --enable-debug --disable-shared
  1296. make
  1297. --To build on Win32
  1298. Choose (Re)Build All from the project workspace
  1299. Run the testsuite program
  1300. *************************CyaSSL version 0.9.9 (7/25/2008)
  1301. This release of CyaSSL adds bug fixes, Pre-Shared Keys, over-rideable memory
  1302. handling, and optionally TomsFastMath. Thanks to Moisés Guimarães for the
  1303. work on TomsFastMath.
  1304. To optionally use TomsFastMath pass --enable-fastmath to ./configure
  1305. Or define USE_FAST_MATH in each project from CyaSSL for MSVC.
  1306. Please use the benchmark routine before and after to see the performance
  1307. difference, on some platforms the gains will be little but RSA encryption
  1308. always seems to be faster. On x86-64 machines with GCC the normal math library
  1309. may outperform the fast one when using CFLAGS=-m64 because TomsFastMath can't
  1310. yet use -m64 because of GCCs inability to do 128bit division.
  1311. **** UPDATE GCC 4.2.1 can now do 128bit division ***
  1312. See notes below (0.2.0) for complete build instructions.
  1313. ****************CyaSSL version 0.9.8 (5/7/2008)
  1314. This release of CyaSSL adds bug fixes, client side Diffie-Hellman, and better
  1315. socket handling.
  1316. See notes below (0.2.0) for complete build instructions.
  1317. ****************CyaSSL version 0.9.6 (1/31/2008)
  1318. This release of CyaSSL adds bug fixes, increased session management, and a fix
  1319. for gnutls.
  1320. See notes below (0.2.0) for complete build instructions.
  1321. ****************CyaSSL version 0.9.0 (10/15/2007)
  1322. This release of CyaSSL adds bug fixes, MSVC 2005 support, GCC 4.2 support,
  1323. IPV6 support and test, and new test certificates.
  1324. See notes below (0.2.0) for complete build instructions.
  1325. ****************CyaSSL version 0.8.0 (1/10/2007)
  1326. This release of CyaSSL adds increased socket support, for non-blocking writes,
  1327. connects, and interrupted system calls.
  1328. See notes below (0.2.0) for complete build instructions.
  1329. ****************CyaSSL version 0.6.3 (10/30/2006)
  1330. This release of CyaSSL adds debug logging to stderr to aid in the debugging of
  1331. CyaSSL on systems that may not provide the best support.
  1332. If CyaSSL is built with debugging support then you need to call
  1333. CyaSSL_Debugging_ON() to turn logging on.
  1334. On Unix use ./configure --enable-debug
  1335. On Windows define DEBUG_CYASSL when building CyaSSL
  1336. To turn logging back off call CyaSSL_Debugging_OFF()
  1337. See notes below (0.2.0) for complete build instructions.
  1338. *****************CyaSSL version 0.6.2 (10/29/2006)
  1339. This release of CyaSSL adds TLS 1.1.
  1340. Note that CyaSSL has certificate verification on by default, unlike OpenSSL.
  1341. To emulate OpenSSL behavior, you must call SSL_CTX_set_verify() with
  1342. SSL_VERIFY_NONE. In order to have full security you should never do this,
  1343. provide CyaSSL with the proper certificates to eliminate impostors and call
  1344. CyaSSL_check_domain_name() to prevent man in the middle attacks.
  1345. See notes below (0.2.0) for build instructions.
  1346. *****************CyaSSL version 0.6.0 (10/25/2006)
  1347. This release of CyaSSL adds more SSL functions, better autoconf, nonblocking
  1348. I/O for accept, connect, and read. There is now an --enable-small configure
  1349. option that turns off TLS, AES, DES3, HMAC, and ERROR_STRINGS, see configure.in
  1350. for the defines. Note that TLS requires HMAC and AES requires TLS.
  1351. See notes below (0.2.0) for build instructions.
  1352. *****************CyaSSL version 0.5.5 (09/27/2006)
  1353. This mini release of CyaSSL adds better input processing through buffered input
  1354. and big message support. Added SSL_pending() and some sanity checks on user
  1355. settings.
  1356. See notes below (0.2.0) for build instructions.
  1357. *****************CyaSSL version 0.5.0 (03/27/2006)
  1358. This release of CyaSSL adds AES support and minor bug fixes.
  1359. See notes below (0.2.0) for build instructions.
  1360. *****************CyaSSL version 0.4.0 (03/15/2006)
  1361. This release of CyaSSL adds TLSv1 client/server support and libtool.
  1362. See notes below for build instructions.
  1363. *****************CyaSSL version 0.3.0 (02/26/2006)
  1364. This release of CyaSSL adds SSLv3 server support and session resumption.
  1365. See notes below for build instructions.
  1366. *****************CyaSSL version 0.2.0 (02/19/2006)
  1367. This is the first release of CyaSSL and its crypt brother, CTaoCrypt. CyaSSL
  1368. is written in ANSI C with the idea of a small code size, footprint, and memory
  1369. usage in mind. CTaoCrypt can be as small as 32K, and the current client
  1370. version of CyaSSL can be as small as 12K.
  1371. The first release of CTaoCrypt supports MD5, SHA-1, 3DES, ARC4, Big Integer
  1372. Support, RSA, ASN parsing, and basic x509 (en/de)coding.
  1373. The first release of CyaSSL supports normal client RSA mode SSLv3 connections
  1374. with support for SHA-1 and MD5 digests. Ciphers include 3DES and RC4.
  1375. --To build on Linux, Solaris, *BSD, Mac OS X, or Cygwin:
  1376. ./configure
  1377. make
  1378. from the ./testsuite/ directory run ./testsuite
  1379. to make a debug build:
  1380. ./configure --enable-debug --disable-shared
  1381. make
  1382. --To build on Win32
  1383. Choose (Re)Build All from the project workspace
  1384. Run the testsuite program
  1385. *** The next release of CyaSSL will support a server and more OpenSSL
  1386. compatibility functions.
  1387. Please send questions or comments to todd@wolfssl.com