Skip to content

Commit 556d7d9

Browse files
authored
Merge pull request #532 from sbutcher-arm/version-2.14.0
Bump Mbed TLS Version to 2.14.0
2 parents 681edee + c1b9892 commit 556d7d9

File tree

6 files changed

+27
-28
lines changed

6 files changed

+27
-28
lines changed

ChangeLog

Lines changed: 15 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,19 @@
11
mbed TLS ChangeLog (Sorted per branch, date)
22

3-
= mbed TLS x.x.x branch released xxxx-xx-xx
3+
= mbed TLS 2.14.0 branch released 2018-11-19
44

55
Security
66
* Fix overly strict DN comparison when looking for CRLs belonging to a
7-
particular CA. This previously lead to ignoring CRLs when the CRL's issuer
7+
particular CA. This previously led to ignoring CRLs when the CRL's issuer
88
name and the CA's subject name differed in their string encoding (e.g.,
99
one using PrintableString and the other UTF8String) or in the choice of
1010
upper and lower case. Reported by Henrik Andersson of Bosch GmbH in issue
1111
#1784.
1212
* Fix a flawed bounds check in server PSK hint parsing. In case the
13-
incoming message buffer was placed within the first 64KB of address
13+
incoming message buffer was placed within the first 64KiB of address
1414
space and a PSK-(EC)DHE ciphersuite was used, this allowed an attacker
15-
to trigger a memory access up to 64KB beyond the incoming message buffer,
16-
potentially leading to application crash or information disclosure.
15+
to trigger a memory access up to 64KiB beyond the incoming message buffer,
16+
potentially leading to an application crash or information disclosure.
1717
* Fix mbedtls_mpi_is_prime() to use more rounds of probabilistic testing. The
1818
previous settings for the number of rounds made it practical for an
1919
adversary to construct non-primes that would be erroneously accepted as
@@ -28,11 +28,11 @@ Security
2828

2929
Features
3030
* Add support for temporarily suspending expensive ECC computations after
31-
some configurable amount of operations, to be used in single-threaded
32-
constrained systems where ECC is time consuming and blocking until
33-
completion cannot be tolerated. This is enabled by
34-
MBEDTLS_ECP_RESTARTABLE at compile time (disabled by default) and
35-
configured by mbedtls_ecp_set_max_ops() at runtime. It applies to new
31+
some configurable amount of operations. This is intended to be used in
32+
constrained, single-threaded systems where ECC is time consuming and can
33+
block other operations until they complete. This is disabled by default,
34+
but can be enabled by MBEDTLS_ECP_RESTARTABLE at compile time and
35+
configured by mbedtls_ecp_set_max_ops() at runtime. It applies to the new
3636
xxx_restartable functions in ECP, ECDSA, PK and X.509 (CRL not supported
3737
yet), and to existing functions in ECDH and SSL (currently only
3838
implemented client-side, for ECDHE-ECDSA ciphersuites in TLS 1.2,
@@ -41,12 +41,11 @@ Features
4141
operations. On CPUs where the extensions are available, they can accelerate
4242
MPI multiplications used in ECC and RSA cryptography. Contributed by
4343
Aurelien Jarno.
44-
* Extend RSASSA-PSS signature to allow slightly a smaller salt size.
45-
Previously, PSS signature always used a salt with the same length as the
46-
hash, and returned an error if this was not possible. Now the salt size
47-
may be up to two bytes shorter. This allows the library to support all
48-
hash and signature sizes that comply with FIPS 186-4, including SHA-512
49-
with a 1024-bit key.
44+
* Extend RSASSA-PSS signature to allow a smaller salt size. Previously, PSS
45+
signature always used a salt with the same length as the hash, and returned
46+
an error if this was not possible. Now the salt size may be up to two bytes
47+
shorter. This allows the library to support all hash and signature sizes
48+
that comply with FIPS 186-4, including SHA-512 with a 1024-bit key.
5049
* Add support for 128-bit keys in CTR_DRBG. Note that using keys shorter
5150
than 256 bits limits the security of generated material to 128 bits.
5251

doxygen/input/doc_mainpage.h

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@
2424
*/
2525

2626
/**
27-
* @mainpage mbed TLS v2.13.1 source code documentation
27+
* @mainpage mbed TLS v2.14.0 source code documentation
2828
*
2929
* This documentation describes the internal structure of mbed TLS. It was
3030
* automatically generated from specially formatted comment blocks in

doxygen/mbedtls.doxyfile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ DOXYFILE_ENCODING = UTF-8
2828
# identify the project. Note that if you do not use Doxywizard you need
2929
# to put quotes around the project name if it contains spaces.
3030

31-
PROJECT_NAME = "mbed TLS v2.13.1"
31+
PROJECT_NAME = "mbed TLS v2.14.0"
3232

3333
# The PROJECT_NUMBER tag can be used to enter a project or revision number.
3434
# This could be handy for archiving the generated documentation or

include/mbedtls/version.h

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -39,17 +39,17 @@
3939
* Major, Minor, Patchlevel
4040
*/
4141
#define MBEDTLS_VERSION_MAJOR 2
42-
#define MBEDTLS_VERSION_MINOR 13
43-
#define MBEDTLS_VERSION_PATCH 1
42+
#define MBEDTLS_VERSION_MINOR 14
43+
#define MBEDTLS_VERSION_PATCH 0
4444

4545
/**
4646
* The single version number has the following structure:
4747
* MMNNPP00
4848
* Major version | Minor version | Patch version
4949
*/
50-
#define MBEDTLS_VERSION_NUMBER 0x020D0100
51-
#define MBEDTLS_VERSION_STRING "2.13.1"
52-
#define MBEDTLS_VERSION_STRING_FULL "mbed TLS 2.13.1"
50+
#define MBEDTLS_VERSION_NUMBER 0x020E0000
51+
#define MBEDTLS_VERSION_STRING "2.14.0"
52+
#define MBEDTLS_VERSION_STRING_FULL "mbed TLS 2.14.0"
5353

5454
#if defined(MBEDTLS_VERSION_C)
5555

library/CMakeLists.txt

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -159,15 +159,15 @@ endif(USE_STATIC_MBEDTLS_LIBRARY)
159159

160160
if(USE_SHARED_MBEDTLS_LIBRARY)
161161
add_library(mbedcrypto SHARED ${src_crypto})
162-
set_target_properties(mbedcrypto PROPERTIES VERSION 2.13.1 SOVERSION 3)
162+
set_target_properties(mbedcrypto PROPERTIES VERSION 2.14.0 SOVERSION 3)
163163
target_link_libraries(mbedcrypto ${libs})
164164

165165
add_library(mbedx509 SHARED ${src_x509})
166-
set_target_properties(mbedx509 PROPERTIES VERSION 2.13.1 SOVERSION 0)
166+
set_target_properties(mbedx509 PROPERTIES VERSION 2.14.0 SOVERSION 0)
167167
target_link_libraries(mbedx509 ${libs} mbedcrypto)
168168

169169
add_library(mbedtls SHARED ${src_tls})
170-
set_target_properties(mbedtls PROPERTIES VERSION 2.13.1 SOVERSION 12)
170+
set_target_properties(mbedtls PROPERTIES VERSION 2.14.0 SOVERSION 12)
171171
target_link_libraries(mbedtls ${libs} mbedx509)
172172

173173
install(TARGETS mbedtls mbedx509 mbedcrypto

tests/suites/test_suite_version.data

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
Check compiletime library version
2-
check_compiletime_version:"2.13.1"
2+
check_compiletime_version:"2.14.0"
33

44
Check runtime library version
5-
check_runtime_version:"2.13.1"
5+
check_runtime_version:"2.14.0"
66

77
Check for MBEDTLS_VERSION_C
88
check_feature:"MBEDTLS_VERSION_C":0

0 commit comments

Comments
 (0)