Commit Graph

290 Commits (53bf0f4a0fce40bc64e5baa054a0b6916ced34eb)

Author SHA1 Message Date
David Garske 35bf0b9649 Use C style comments. 2024-02-29 08:20:51 -08:00
David Garske 225a352bd4 Fixes for building with "-Wpedantic". ZD 17592 2024-02-28 17:06:55 -08:00
Eric Blankenhorn 46ef684106
Merge pull request #328 from dgarske/cap_handles
Added support for getting handles from capabilities
2024-02-09 09:33:08 -06:00
David Garske f7665ee0db Documentation fixes. 2024-02-09 06:55:16 -08:00
David Garske b395b65287 Fix for config.h, which should only be included from .c files, not headers. ZD 17473 2024-02-07 14:28:33 -08:00
David Garske e078e15f56 Added new API `wolfTPM2_GetHandles` to get list of handles from the TPM capabilities. ZD 17328 2024-02-06 10:48:16 -08:00
David Garske a2a45d2a3d Match byte swap logic with wolfSSL (use WOLF_ALLOW_BUILTIN). 2024-01-26 14:26:54 -08:00
David Garske b27e6c5874 Remove unused `XHTONS` and `arpa/inet.h`. 2024-01-26 14:26:54 -08:00
JacobBarthelmeh 6fcac417ee
Merge pull request #322 from dgarske/pkcs7_ecc
Added PKCS7 ECC support to example
2024-01-18 14:22:24 -08:00
David Garske 0aa01f4f5a Added PKCS7 ECC support to example. Added wrapper function to export TPM public key as DER/ASN.1 or PEM. Fix for crypto callback ECC sign to handle getting keySz for unknown cases (like PKCS7 without privateKey set). 2024-01-17 15:50:30 -08:00
David Garske ae60c59af7 Add _ex version for GetKeyTemplate RSA/ECC to allow setting all template parameters. 2024-01-09 13:20:25 -08:00
David Garske d9f51da00e wolfTPM v3.1 release prep 2023-12-29 10:55:30 -08:00
David Garske 93a2493dbf Fixes for attestation with endorsement key. Enable the broken endorsement tests. 2023-12-29 09:32:49 -08:00
David Garske 6322c91e53 Remove the `WOLFTPM2_KEYBLOB.name` (deprecated) and is in `handle.name` now. 2023-12-29 09:20:45 -08:00
David Garske fb2ea5b315 Fixes for compiler type warnings. Add `WOLFTPM_NO_LOCK`. Improve STM IO options/logging. 2023-12-20 11:54:02 -08:00
Eric Blankenhorn 88bff510bb
Merge pull request #312 from dgarske/tls_pkcb
Added support for TLS PK callbacks with ECC and RSA Sign using PKCSv1.5 and PSS padding
2023-12-08 15:10:32 -06:00
Eric Blankenhorn 233bd33240
Merge pull request #315 from dgarske/keyblob_tests
Added tests for keyblob buffer export/import and support for getting sizes
2023-12-08 15:10:04 -06:00
David Garske 4a48fb3882 Peer review cleanups. 2023-12-08 12:00:01 -08:00
David Garske 65e03e15e6 Added Windows Visual Studio project for wolfTPM. 2023-12-06 15:10:44 -08:00
David Garske 53b043dafa Tests for keyblob buffer export/import. Added support for getting the keyblob sizes. 2023-12-06 11:20:18 -08:00
David Garske e601803f1b Added support for PK callbacks with RSA Sign using PKCSv1.5 and PSS.
Fixes for building wolfTPM without crypto callbacks.
Fixes for building/running with FIPS.
2023-12-01 08:25:53 -08:00
David Garske 249f9d4942 Fixes for building wolfCrypt without PEM to DER support. 2023-11-15 21:53:50 -08:00
David Garske 7dbd844586 Add TPM crypto callback support for RSA key generation. 2023-11-13 14:56:46 -08:00
Tesfa Mael df89f497e5 Remove error-ssl.h 2023-11-01 17:17:28 -07:00
David Garske a10a10db5d Added v3.0 release notes and updated version. 2023-10-30 12:02:28 -07:00
David Garske 2d14cd2297 Fixes for building wolfCrypt with no RSA (--disable-rsa / NO_RSA). 2023-10-23 14:05:10 -07:00
David Garske 8ae11cf9eb Add wrapper support for setting key usage (not just extended key usage). 2023-10-20 14:40:49 -07:00
David Garske cdcdf389c3 Fixes for command auth flag typo. Fix to make sure extra auth are not provided. 2023-10-12 14:19:42 -07:00
David Garske f3e1bbbf3d Refactor of the command authentication. If command does not require auth do not supply it. ZD 16689 2023-10-12 13:48:04 -07:00
David Garske 96cd17af1d Improvements/fixes to NV auth and session auth set/unset:
* Fix bug with NV name after first write (only appears when using HMAC session).
* Add new API `wolfTPM2_UnsetAuthSession` to unset auth index for a session and save off the nonce from the TPM. This allows auth to be unset/set again with the same session.
* Cleanup in the NV API's for unsetting of the auth to be handled by caller, not in API.
2023-09-15 14:03:11 -07:00
David Garske 8968d89f90 More CI fixes. 2023-08-31 12:29:13 -07:00
David Garske a15260342f wolfTPM Support for sealing/unsealing based on a PCR that is signed externally. Use an external key to sign a PCR digest. Allows a new signed policy to be sent with updates to continue allowing a sealed secret to be unsealed when PCR's change. This resolves the issue with PCR brittleness. 2023-08-29 18:47:18 -07:00
David Garske 5b6c7c0368 Improvements to the secure_rot example. Add support for manually placing hash. 2023-08-15 14:41:09 -07:00
David Garske 6126d04be3 Support for importing and loading public ECC/RSA keys formatted as PEM or DER. 2023-08-15 08:27:00 -07:00
David Garske 3f29c59e87 Add support for encrypting secret using ECC key. Allows using ECC for parameter encryption and importing ECC keys with custom seed. Requires https://github.com/wolfSSL/wolfssl/pull/6683 2023-08-08 16:15:18 -07:00
David Garske bb18c4c550 Added `wolfTPM2_ChangePlatformAuth` wrapper to help set the platform auth. This is useful from the bootloader to make sure no one can use the platform hierarchy from application. 2023-08-07 11:08:02 -07:00
David Garske 5a20647313 Minor cleanups. Update wolfSSL test certs. Added TPM_TIS_MAX_WAIT. Fix build with WOLFTPM_DEBUG_VERBOSE only. 2023-08-07 11:08:02 -07:00
David Garske c35b532724 Add support for NV lock. 2023-08-07 11:08:02 -07:00
Lealem Amedie b468d7d29a Adding STM23 Expansion Pack 2023-07-28 14:51:39 -06:00
John Bland fafd0c2780 include user_settings.h manually when wolfCrypt is not in use 2023-07-27 16:04:25 -04:00
David Garske e646c5701e Peer review fixes. Avoid using a struct for the seed. 2023-07-20 12:28:39 -07:00
David Garske 7fcbcab634 Fixes for edge case builds !HAVE_ECC or NO_RSA. 2023-07-20 09:29:45 -07:00
David Garske ae6bac26c5 Added documentation and tests. 2023-07-19 13:28:50 -07:00
David Garske 97b4f62ac6 Fix for import of private key with seed. Added new API `wolfTPM2_ImportPrivateKeyBuffer` for importing private key ECC/RSA in either PEM or DER(ASN.1). ZD16249 2023-07-18 18:21:10 -07:00
David Garske d28738310a Make sure the file IO XFEOF and XREWIND are available (not defined in wolfSSL). 2023-07-07 09:53:57 -07:00
David Garske 50bf4beb08
Merge pull request #271 from rizlik/mmio
support memory mapped tpms
2023-06-28 16:53:48 -07:00
David Garske ab9bf2981b Fixes for MMIO HAL refactor. 2023-06-28 16:00:56 -07:00
John Bland 8981aa64be undefine HAVE_THREAD_LS if NO_THREAD_LS is defined 2023-06-02 14:52:04 -04:00
Marco Oliverio f8c1ff6075 tis: support memory mapped tpm 2023-05-30 16:58:46 +00:00
Marco Oliverio d0beda2d71 types.h: add typedef for address sized integer 2023-05-30 16:58:12 +00:00