summaryrefslogtreecommitdiffstats
path: root/meta-networking/recipes-connectivity/mbedtls
Commit message (Collapse)AuthorAgeFilesLines
* mbedtls: 3.6.2 -> 3.6.3Yi Zhao2025-03-311-5/+2
| | | | | | | | | | | | | | ChangeLog: https://github.com/Mbed-TLS/mbedtls/releases/tag/mbedtls-3.6.3 Remove mbedtls-framework repository, as the framework is now added as a flat directory rather than a submodule[1][2]. [1] https://github.com/Mbed-TLS/mbedtls/commit/b41194ce7f2fda63bf5959588631eba73c5c621e [2] https://github.com/Mbed-TLS/mbedtls/commit/2c824b4fe5dab7e1526560be203bf705857e372a Signed-off-by: Yi Zhao <yi.zhao@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: upgrade 2.28.9 -> 2.28.10Yi Zhao2025-03-311-1/+1
| | | | | | | | ChangeLog https://github.com/Mbed-TLS/mbedtls/releases/tag/mbedtls-2.28.10 Signed-off-by: Yi Zhao <yi.zhao@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: upgrade 3.6.1 -> 3.6.2Yi Zhao2024-10-211-1/+1
| | | | | | | | | | | ChangeLog: https://github.com/Mbed-TLS/mbedtls/releases/tag/mbedtls-3.6.2 Security Fix: CVE-2024-49195 Signed-off-by: Yi Zhao <yi.zhao@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: upgrade 2.28.8 -> 2.28.9Yi Zhao2024-09-111-1/+1
| | | | | | | | | | | ChangeLog https://github.com/Mbed-TLS/mbedtls/releases/tag/mbedtls-2.28.9 Security fix: CVE-2024-45157 Signed-off-by: Yi Zhao <yi.zhao@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: upgrade 3.6.0 -> 3.6.1Yi Zhao2024-09-111-4/+5
| | | | | | | | | | | | | | | | | | ChangeLog: https://github.com/Mbed-TLS/mbedtls/releases/tag/mbedtls-3.6.1 Security fixes: CVE-2024-45157 CVE-2024-45158 CVE-2024-45159 * According to commit[1], install data_files into framework directory for ptest. [1] https://github.com/Mbed-TLS/mbedtls/commit/9c4dd4ee6fe570b6a50a275d78b7d140fec0e02f Signed-off-by: Yi Zhao <yi.zhao@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: Do not set LIB_INSTALL_DIR to an absolute path to make ↵Timo Schuster2024-06-141-2/+0
| | | | | | | MbedTLSTargets.cmake relocateable. Signed-off-by: Timo Schuster <timo.schuster@leica-microsystems.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: Fix warning for missing programRicardo Simoes2024-05-022-2/+2
| | | | | | | | | | | | | | When PACKAGECONFIG does not contains 'programs', the hello binary will not be generated, but the ALTERNATIVE 'hello' is still set, causing the update-alternatives bbclass to generate warnings for the missing 'hello' binary. This commit fixes that by only populating ALTERNATIVES when 'programs' is enabled. Signed-off-by: Ricardo Simoes <ricardo.simoes@pt.bosch.com> Signed-off-by: Mark Jonas <mark.jonas@de.bosch.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: upgrade 2.28.7 -> 2.28.8Beniamin Sandu2024-04-051-2/+2
| | | | | | | | | | | Includes security fixes for: CVE-2024-28960 - Insecure handling of shared memory in PSA Crypto APIs Full release notes: https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.8 Signed-off-by: Beniamin Sandu <beniaminsandu@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: upgrade 3.5.2 -> 3.6.0Beniamin Sandu2024-04-052-89/+6
| | | | | | | | | | | | | This is an LTS release. Includes security fixes: * CVE-2024-28960 - Insecure handling of shared memory in PSA Crypto APIs Full release notes: https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.6.0 Signed-off-by: Beniamin Sandu <beniaminsandu@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: upgrade 2.28.4 -> 2.28.7Beniamin Sandu2024-02-091-3/+3
| | | | | | | | | | | | | | | Includes security fixes for: CVE-2023-43615 - Buffer overread in TLS stream cipher suites CVE-2024-23170 - Timing side channel in private key RSA operations CVE-2024-23775 - Buffer overflow in mbedtls_x509_set_extension() Other changes: https://github.com/Mbed-TLS/mbedtls/releases/tag/mbedtls-2.28.5 License updated to dual Apache-2.0 OR GPL-2.0-or-later. Signed-off-by: Beniamin Sandu <beniaminsandu@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: upgrade 3.5.1 -> 3.5.2Beniamin Sandu2024-02-091-1/+1
| | | | | | | | * Includes security fix for CVE-2024-23170 - Timing side channel in private key RSA operations * Includes security fix for CVE-2024-23775 - Buffer overflow in mbedtls_x509_set_extension() Signed-off-by: Beniamin Sandu <beniaminsandu@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: Upgrade 3.5.0 -> 3.5.1Alex Kiernan2023-12-181-4/+5
| | | | | | | | | | | | | | | | | | | | | | | | | | | Use canonical URL, add UPSTREAM_CHECK_GITTAGREGEX. Changes: Dave Rodgman (12): Header updates Fix some non-standard headers Update documentation Add Changelog for license Update license for p256-m README improvements to 3rdparty section assemble Changelog Fix typos in changelog Bump version Update BRANCHES Update Changelog with bugfix entry Add docs re Everest license David Horstmann (1): Fix 3rdparty target names for custom config License-update: Upstream clarified licensing as dual Apache-2.0 or GPL-2.0 or later Signed-off-by: Alex Kiernan <alex.kiernan@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: upgrade 3.4.1 -> 3.5.0Beniamin Sandu2023-10-304-70/+89
| | | | | | | | | | | | | * Includes security fix for CVE-2023-43615 - Buffer overread in TLS stream cipher suites * Includes security fix for CVE-2023-45199 - Buffer overflow in TLS handshake parsing with ECDH * Includes aesce compilation fixes Full changelog: https://github.com/Mbed-TLS/mbedtls/releases/tag/mbedtls-3.5.0 The extra patch fixes x86 32-bit builds. Signed-off-by: Beniamin Sandu <beniaminsandu@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: upgrade 2.28.3 -> 2.28.4Beniamin Sandu2023-09-071-1/+1
| | | | | Signed-off-by: Beniamin Sandu <beniaminsandu@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: upgrade 3.4.0 -> 3.4.1Beniamin Sandu2023-09-073-3/+3
| | | | | Signed-off-by: Beniamin Sandu <beniaminsandu@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* cve_check: fix conversion errorsPeter Marko2023-07-311-1/+1
| | | | | | | | Conversion from CVE_CHECK_IGNORE to CVE_STATUS had some copy+paste issues. Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* cve_check: convert CVE_CHECK_IGNORE to CVE_STATUSAndrej Valek2023-07-272-9/+2
| | | | | | | | | - Try to add convert and apply statuses for old CVEs - Drop some obsolete ignores, while they are not relevant for current version Signed-off-by: Andrej Valek <andrej.valek@siemens.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: upgrade 2.28.2 -> 2.28.3Yi Zhao2023-06-281-1/+7
| | | | | | | | | | | Mbed TLS 2.28 is a long-time support branch. It will be supported with bug-fixes and security fixes until end of 2024. ChangeLog: https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.3 Signed-off-by: Yi Zhao <yi.zhao@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: fix builds with crypto extensionsBeniamin Sandu2023-06-263-5/+70
| | | | | Signed-off-by: Beniamin Sandu <beniaminsandu@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: add support for v3.xBeniamin Sandu2023-06-191-0/+85
| | | | | | | | | | Version 3.4.0 adds a lot of improvements and fixes (a notable one being initial support for PKCS7 CMS), but since this is a pretty big jump, let's keep both versions for a while, so the v2.x users can upgrade to 3.x in a timely manner if needed. Signed-off-by: Beniamin Sandu <beniaminsandu@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: add ptestYi Zhao2023-03-222-4/+31
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Results: $ ptest-runner mbedtls START: ptest-runner 2023-03-20T08:11 BEGIN: /usr/lib/mbedtls/ptest PASS: test_suite_aes.cbc PASS: test_suite_aes.cfb PASS: test_suite_aes.ecb PASS: test_suite_aes.ofb PASS: test_suite_aes.rest PASS: test_suite_aes.xts PASS: test_suite_arc4 PASS: test_suite_aria PASS: test_suite_asn1parse PASS: test_suite_asn1write PASS: test_suite_base64 PASS: test_suite_bignum.generated PASS: test_suite_bignum.misc PASS: test_suite_blowfish PASS: test_suite_camellia PASS: test_suite_ccm PASS: test_suite_chacha20 PASS: test_suite_chachapoly PASS: test_suite_cipher.aes PASS: test_suite_cipher.arc4 PASS: test_suite_cipher.aria PASS: test_suite_cipher.blowfish PASS: test_suite_cipher.camellia PASS: test_suite_cipher.ccm PASS: test_suite_cipher.chacha20 PASS: test_suite_cipher.chachapoly PASS: test_suite_cipher.des PASS: test_suite_cipher.gcm PASS: test_suite_cipher.misc PASS: test_suite_cipher.nist_kw PASS: test_suite_cipher.null PASS: test_suite_cipher.padding PASS: test_suite_cmac PASS: test_suite_constant_time PASS: test_suite_constant_time_hmac PASS: test_suite_ctr_drbg PASS: test_suite_debug PASS: test_suite_des PASS: test_suite_dhm PASS: test_suite_ecdh PASS: test_suite_ecdsa PASS: test_suite_ecjpake PASS: test_suite_ecp PASS: test_suite_entropy PASS: test_suite_error PASS: test_suite_gcm.aes128_de PASS: test_suite_gcm.aes128_en PASS: test_suite_gcm.aes192_de PASS: test_suite_gcm.aes192_en PASS: test_suite_gcm.aes256_de PASS: test_suite_gcm.aes256_en PASS: test_suite_gcm.camellia PASS: test_suite_gcm.misc PASS: test_suite_hkdf PASS: test_suite_hmac_drbg.misc PASS: test_suite_hmac_drbg.nopr PASS: test_suite_hmac_drbg.no_reseed PASS: test_suite_hmac_drbg.pr PASS: test_suite_md PASS: test_suite_mdx PASS: test_suite_memory_buffer_alloc PASS: test_suite_mps PASS: test_suite_net PASS: test_suite_nist_kw PASS: test_suite_oid PASS: test_suite_pem PASS: test_suite_pk PASS: test_suite_pkcs12 PASS: test_suite_pkcs1_v15 PASS: test_suite_pkcs1_v21 PASS: test_suite_pkcs5 PASS: test_suite_pkparse PASS: test_suite_pkwrite PASS: test_suite_poly1305 PASS: test_suite_psa_crypto PASS: test_suite_psa_crypto_attributes PASS: test_suite_psa_crypto_driver_wrappers PASS: test_suite_psa_crypto_entropy PASS: test_suite_psa_crypto_generate_key.generated PASS: test_suite_psa_crypto_hash PASS: test_suite_psa_crypto_init PASS: test_suite_psa_crypto_metadata PASS: test_suite_psa_crypto_not_supported.generated PASS: test_suite_psa_crypto_not_supported.misc PASS: test_suite_psa_crypto_op_fail.generated PASS: test_suite_psa_crypto_op_fail.misc PASS: test_suite_psa_crypto_persistent_key PASS: test_suite_psa_crypto_se_driver_hal PASS: test_suite_psa_crypto_se_driver_hal_mocks PASS: test_suite_psa_crypto_slot_management PASS: test_suite_psa_crypto_storage_format.current PASS: test_suite_psa_crypto_storage_format.misc PASS: test_suite_psa_crypto_storage_format.v0 PASS: test_suite_psa_its PASS: test_suite_random PASS: test_suite_rsa PASS: test_suite_shax PASS: test_suite_ssl PASS: test_suite_timing PASS: test_suite_version PASS: test_suite_x509parse PASS: test_suite_x509write PASS: test_suite_xtea DURATION: 83 END: /usr/lib/mbedtls/ptest 2023-03-20T08:13 STOP: ptest-runner TOTAL: 1 FAIL: 0 Signed-off-by: Yi Zhao <yi.zhao@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: set up /usr/bin/hello as alternativeDenys Dmytriyenko2023-02-261-1/+4
| | | | | | | | | As mbedtls installs this rather generically-named /usr/bin/hello binary, it conflicts with the one provided by lmbench, hence set it up as an alternative to avoid conflicts when both are installed to rootfs or SDK. Signed-off-by: Denys Dmytriyenko <denis@denix.org> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: export source files/headers needed by ATFBeniamin Sandu2023-01-271-0/+6
| | | | | | | | | | | | | | | | | | | Arm Trusted Firmware uses a list of mbedtls source files/headers to build a static library used for crypto functionality: https://github.com/ARM-software/arm-trusted-firmware/blob/master/drivers/auth/mbedtls/mbedtls_common.mk#L10 At the moment, any ATF version that wants to build with yocto and enable for example secure boot, needs to download and patch a version of mbedtls separately, e.g. : https://git.yoctoproject.org/meta-arm/tree/meta-arm/recipes-bsp/trusted-firmware-a/trusted-firmware-a_2.7.0.bb#n10 This commit enables a simple way for ATF recipes to use the existing oe version of mbedtls by adding it as a dependency, and simply extending the build flags with: EXTRA_OEMAKE += 'MBEDTLS_DIR="${STAGING_DATADIR}/mbedtls-source"' Signed-off-by: Beniamin Sandu <beniaminsandu@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: upgrade to 2.28.2 to fix CVE-2022-46392, CVE-2022-46393Stefan Ghinea2023-01-261-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | An issue was discovered in Mbed TLS before 2.28.2 and 3.x before 3.3.0. An adversary with access to precise enough information about memory accesses (typically, an untrusted operating system attacking a secure enclave) can recover an RSA private key after observing the victim performing a single private-key operation, if the window size (MBEDTLS_MPI_WINDOW_SIZE) used for the exponentiation is 3 or smaller. An issue was discovered in Mbed TLS before 2.28.2 and 3.x before 3.3.0. There is a potential heap-based buffer overflow and heap-based buffer over-read in DTLS if MBEDTLS_SSL_DTLS_CONNECTION_ID is enabled and MBEDTLS_SSL_CID_IN_LEN_MAX > 2 * MBEDTLS_SSL_CID_OUT_LEN_MAX. References: https://nvd.nist.gov/vuln/detail/CVE-2022-46392 https://nvd.nist.gov/vuln/detail/CVE-2022-46393 Upstream patches: https://github.com/Mbed-TLS/mbedtls/releases/tag/v2.28.2 Signed-off-by: Stefan Ghinea <stefan.ghinea@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: add option to use PSA for X.509/TLS operationsRoss Burton2023-01-171-0/+6
| | | | | | | | Add an option to use Platform Security Architecture for the X.509 and TLS operations. Signed-off-by: Ross Burton <ross.burton@arm.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: Whitelist CVE-2021-43666, CVE-2021-45451Mathieu Dubois-Briand2022-10-041-0/+5
| | | | | Signed-off-by: Mathieu Dubois-Briand <mbriand@witekio.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: Update to 2.28.1 versionMathieu Dubois-Briand2022-10-041-1/+1
| | | | | Signed-off-by: Mathieu Dubois-Briand <mbriand@witekio.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: Fix CVE product nameMathieu Dubois-Briand2022-10-041-0/+2
| | | | | Signed-off-by: Mathieu Dubois-Briand <mbriand@witekio.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: Upgrade to 2.28.0Mark Jonas2022-02-112-37/+2
| | | | | | | | | | Mbed TLS 2.28 is a long-time support branch. It will be supported with bug-fixes and security fixes until end of 2024. https://github.com/ARMmbed/mbedtls/releases/tag/v2.28.0 Signed-off-by: Mark Jonas <toertel@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* Convert to new override syntaxMartin Jansa2021-08-031-2/+2
| | | | | | | | | | This is the result of automated script (0.9.1) conversion: oe-core/scripts/contrib/convert-overrides.py . converting the metadata to use ":" as the override character instead of "_". Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
* mbedtls: Add packageconfig for warning-as-errorsKhem Raj2021-06-041-0/+1
| | | | | | | Disable the options by default, as we use different compilers there are more warnings to handle then upstream Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: Upgrade to 2.26.0Khem Raj2021-06-031-1/+1
| | | | | | https://github.com/ARMmbed/mbedtls/releases/tag/v2.26.0 Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: Fix gcc11 stringop-overflow warningKhem Raj2021-03-022-0/+35
| | | | Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: upgrade to 2.25.0Alexander Vickberg2020-12-172-61/+2
| | | | | | | Deleted build fix patch. This is already applied in this release. Signed-off-by: Alexander Vickberg <wickbergster@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: upgrade to 2.24.0Alexander Vickberg2020-12-092-4/+63
| | | | | | | | | Download archives are no longer updated so fetch from Github. Add build fix from upstream. The file LICENSE now contains the full Apache 2.0 license text. Signed-off-by: Alexander Vickberg <wickbergster@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: Fix typo in PACKAGECONFIGMark Jonas2020-11-031-1/+1
| | | | | Signed-off-by: Mark Jonas <toertel@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: upgrade 2.16.5 -> 2.16.6Pierre-Jean Texier2020-04-151-2/+2
| | | | | | | | | | Mbed TLS 2.16.6 is a maintenance release of the Mbed TLS 2.16 branch, and provides security fixes and bug fixes, see: - https://tls.mbed.org/tech-updates/releases/mbedtls-2.16.6-and-2.7.15-released Signed-off-by: Pierre-Jean Texier <pjtexier@koncepto.io> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: upgrade 2.16.3 -> 2.16.5Pierre-Jean Texier2020-02-211-2/+2
| | | | | | | | | | Mbed TLS 2.16.5 is a maintenance release of the Mbed TLS 2.16 branch, and provides security fixes and bug fixes, see: https://tls.mbed.org/tech-updates/releases/mbedtls-2.16.5-and-2.7.14-released Signed-off-by: Pierre-Jean Texier <pjtexier@koncepto.io> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: add native and nativesdk to BBCLASSEXTENDPierre-Jean Texier2020-02-201-0/+2
| | | | | | | | | Fixes: ERROR: Nothing PROVIDES 'mbedtls-native' Signed-off-by: Pierre-Jean Texier <pjtexier@koncepto.io> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: upgrade 2.16.2 -> 2.16.3Denys Dmytriyenko2019-11-131-2/+2
| | | | | | | | | | | | | | | | | * Mbed TLS 2.16.3 is a maintenance release of the Mbed TLS 2.16 branch, and provides bug fixes and minor enhancements. https://github.com/ARMmbed/mbedtls/releases/tag/mbedtls-2.16.3 Most importantly, this fixes breakage on ARMv5TE platforms: * Fix the build on ARMv5TE in ARM mode to not use assembly instructions that are only available in Thumb mode. https://github.com/ARMmbed/mbedtls/pull/2169 Signed-off-by: Denys Dmytriyenko <denys@ti.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: update to 2.16.2Oleksandr Kravchuk2019-06-251-2/+2
| | | | | Signed-off-by: Oleksandr Kravchuk <open.source@oleksandr-kravchuk.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: update to 2.16.0Oleksandr Kravchuk2019-03-151-3/+2
| | | | | Signed-off-by: Oleksandr Kravchuk <open.source@oleksandr-kravchuk.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: upgrade to 2.13.0Johannes Pointner2018-10-251-2/+2
| | | | | Signed-off-by: Johannes Pointner <johannes.pointner@br-automation.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: upgrade to 2.12.0Johannes Pointner2018-08-241-2/+2
| | | | | Signed-off-by: Johannes Pointner <johannes.pointner@br-automation.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: Upgrade to 2.11.0Khem Raj2018-07-141-3/+3
| | | | | | - Use libs section, libdevel is not common Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: update to 2.9.0Johannes Pointner2018-06-081-2/+2
| | | | | | | | | | | | Mbed TLS 2.9.0 maintains source code and binary compatibility with the last minor version, Mbed TLS 2.8.0, but extends the interface with additional capabilities. * Detail release note: - https://tls.mbed.org/tech-updates/releases/mbedtls-2.9.0-2.7.3-and-2.1.12-released Signed-off-by: Johannes Pointner <johannes.pointner@br-automation.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* mbedtls: upgrade to 2.8.0Johannes Pointner2018-04-251-11/+16
| | | | | | | | | | | | This also includes a switch to Apache license, because it's the primary license for the project according to their homepage. * Detail release note: - https://tls.mbed.org/tech-updates/releases/mbedtls-2.8.0-2.7.2-and-2.1.11-released Signed-off-by: Johannes Pointner <johannes.pointner@br-automation.com> Signed-off-by: Armin Kuster <akuster808@gmail.com> Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
* mbedtls: upgrade to 1.3.17Wenzong Fan2016-10-201-2/+2
| | | | | | | | * fix CVE: CVE-2015-8036 Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com> Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com> Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>
* mbedtls: upgrade to 1.3.10Roy Li2015-06-051-0/+37
1. PolarSSL is now rebranded as mbed TLS. 2. upgrade to include CVE-2015-1182 fix: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1182 Signed-off-by: Roy Li <rongqing.li@windriver.com> Signed-off-by: Joe MacDonald <joe_macdonald@mentor.com>