Merge pull request #567 from danielinux/prepare-release-2.5.0

Preparing release 2.5.0
pull/569/head v2.5.0
David Garske 2025-04-30 07:43:19 -07:00 committed by GitHub
commit 7c81d6a6f1
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
9 changed files with 46 additions and 12 deletions

View File

@ -54,7 +54,8 @@ jobs:
with:
repository: wolfssl/wolfHSM-examples
# Make sure to update this when the wolfHSM submodule is updated!
ref: wolfHSM-v1.1.0
#ref: wolfHSM-v1.1.0
ref: 3e03bd4d4a8439ed4a8a9577823c89e4c37eb9be
path: wolfHSM-examples
- name: Build example POSIX TCP server

View File

@ -685,3 +685,35 @@ Use `make keysclean` to delete keys and regenerate.
* wolfPKCS11 latest
* wolfHSM latest
### V 2.5.0 - (2025-05-05)
* New hardware targets
* RP2350 (Raspberry Pi Pico 2, ARM Cortex-M33 with TrustZone)
* NXP MCXA153
* NXP MCXW716
* STM32F1 series (STM32F103 “Blue Pill” board)
* Improvements to supported targets
* Xilinx UltraScale+ (ZynqMP)
* Added hardware-accelerated SHA3 hashing via the CSU engine
* Added support for enabling JTAG at runtime when `CSU_DEBUG` is set
* Introduced support for the devices PUF (Physically Unclonable Function) for unique key generation and secure key storage (requires eFuses)
* Renesas RX
* Added option for TSIP hardware crypto engine
* Infineon TriCore (AURIX TC3xx)
* Updated IDE project files for ARM Developer Studio 1.10.6, fixing build issues and ensuring support for latest toolchain
* Fix to support write operations spanning over multiple sectors
* New features and improvements
* Added support for non-contiguous elf sections, scattered elf firmware loading and verification.
* PQC: Simplified LMS/XMSS integration, deprecated support for third-party libraries
* Support to build wolfBoot as a static library (`libwolfboot.a`) for easier integration and testing of the bootloader logic in custom workflows
* Extended support for ARMORED glitch mitigations to the IAR toolchain
* CMake build refactoring, extended support to more targets
* Various documentation and configuration improvements
* Bug fixes
* Fix alignment enforcement on IAR compiler
* Fix build error on Windows in key generation tool (`_chsize_s` declaration issue in `sign.c`)
* Updated modules
* wolfSSL v5.8.0
* wolfTPM v3.9.0
* wolfPKCS11 latest
* wolfHSM latest

View File

@ -144,6 +144,7 @@ extern int tolower(int c);
# define WOLFSSL_HAVE_SP_ECC
# endif
#define WOLFSSL_PUBLIC_MP
/* Curve */
# if defined(WOLFBOOT_SIGN_ECC256) || defined(WOLFCRYPT_SECURE_MODE) || \

View File

@ -29,8 +29,8 @@ extern "C" {
#endif
#define LIBWOLFBOOT_VERSION_STRING "2.4.0"
#define LIBWOLFBOOT_VERSION_HEX 0x02040000
#define LIBWOLFBOOT_VERSION_STRING "2.5.0"
#define LIBWOLFBOOT_VERSION_HEX 0x02050000
#ifndef WOLFBOOT_VERSION
#define WOLFBOOT_VERSION LIBWOLFBOOT_VERSION_HEX

@ -1 +1 @@
Subproject commit 6ce59d6da341eed9ad41ae383b8246121dc788a8
Subproject commit ea4c3db1e05b878f39c107b375c4c57ac93ab35a

@ -1 +1 @@
Subproject commit 7808688fdeb05150496a10ae6c4de4f797b9d6b0
Subproject commit bbbb2fda18abd89d81e4a3e308164a218edae17a

@ -1 +1 @@
Subproject commit 6e1205b1e11e600c31e4a14764331e33def7beb4
Subproject commit 0cd21b53c48e9e4aa05652fe20badcc4883c7f33

@ -1 +1 @@
Subproject commit 239b85c80438bf60d9a5b9e0ebe9ff097a760d0d
Subproject commit b077c81eb635392e694ccedbab8b644297ec0285

View File

@ -990,9 +990,9 @@ test-size-all:
make keysclean
make test-size SIGN=ED25519 LIMIT=11448 NO_ARM_ASM=1
make keysclean
make test-size SIGN=ECC256 LIMIT=17968 NO_ARM_ASM=1
make test-size SIGN=ECC256 LIMIT=17988 NO_ARM_ASM=1
make clean
make test-size SIGN=ECC256 NO_ASM=1 LIMIT=13512 NO_ARM_ASM=1
make test-size SIGN=ECC256 NO_ASM=1 LIMIT=13536 NO_ARM_ASM=1
make keysclean
make test-size SIGN=RSA2048 LIMIT=11232 NO_ARM_ASM=1
make clean
@ -1002,9 +1002,9 @@ test-size-all:
make clean
make test-size SIGN=RSA4096 NO_ASM=1 LIMIT=12096 NO_ARM_ASM=1
make keysclean
make test-size SIGN=ECC384 LIMIT=17536 NO_ARM_ASM=1
make test-size SIGN=ECC384 LIMIT=17556 NO_ARM_ASM=1
make clean
make test-size SIGN=ECC384 NO_ASM=1 LIMIT=14904 NO_ARM_ASM=1
make test-size SIGN=ECC384 NO_ASM=1 LIMIT=14924 NO_ARM_ASM=1
make keysclean
make test-size SIGN=ED448 LIMIT=13464 NO_ARM_ASM=1
make keysclean
@ -1018,7 +1018,7 @@ test-size-all:
make keysclean
make test-size SIGN=XMSS XMSS_PARAMS='XMSS-SHA2_10_256' \
IMAGE_SIGNATURE_SIZE=2500 IMAGE_HEADER_SIZE?=4096 \
LIMIT=8252 NO_ARM_ASM=1
LIMIT=8292 NO_ARM_ASM=1
make keysclean
make clean
make test-size SIGN=ML_DSA ML_DSA_LEVEL=2 LIMIT=20168 \