David Garske
35bf0b9649
Use C style comments.
2024-02-29 08:20:51 -08:00
David Garske
225a352bd4
Fixes for building with "-Wpedantic". ZD 17592
2024-02-28 17:06:55 -08:00
Eric Blankenhorn
46ef684106
Merge pull request #328 from dgarske/cap_handles
...
Added support for getting handles from capabilities
2024-02-09 09:33:08 -06:00
David Garske
f7665ee0db
Documentation fixes.
2024-02-09 06:55:16 -08:00
David Garske
b395b65287
Fix for config.h, which should only be included from .c files, not headers. ZD 17473
2024-02-07 14:28:33 -08:00
David Garske
e078e15f56
Added new API `wolfTPM2_GetHandles` to get list of handles from the TPM capabilities. ZD 17328
2024-02-06 10:48:16 -08:00
David Garske
a2a45d2a3d
Match byte swap logic with wolfSSL (use WOLF_ALLOW_BUILTIN).
2024-01-26 14:26:54 -08:00
David Garske
b27e6c5874
Remove unused `XHTONS` and `arpa/inet.h`.
2024-01-26 14:26:54 -08:00
JacobBarthelmeh
6fcac417ee
Merge pull request #322 from dgarske/pkcs7_ecc
...
Added PKCS7 ECC support to example
2024-01-18 14:22:24 -08:00
David Garske
0aa01f4f5a
Added PKCS7 ECC support to example. Added wrapper function to export TPM public key as DER/ASN.1 or PEM. Fix for crypto callback ECC sign to handle getting keySz for unknown cases (like PKCS7 without privateKey set).
2024-01-17 15:50:30 -08:00
David Garske
ae60c59af7
Add _ex version for GetKeyTemplate RSA/ECC to allow setting all template parameters.
2024-01-09 13:20:25 -08:00
David Garske
d9f51da00e
wolfTPM v3.1 release prep
2023-12-29 10:55:30 -08:00
David Garske
93a2493dbf
Fixes for attestation with endorsement key. Enable the broken endorsement tests.
2023-12-29 09:32:49 -08:00
David Garske
6322c91e53
Remove the `WOLFTPM2_KEYBLOB.name` (deprecated) and is in `handle.name` now.
2023-12-29 09:20:45 -08:00
David Garske
fb2ea5b315
Fixes for compiler type warnings. Add `WOLFTPM_NO_LOCK`. Improve STM IO options/logging.
2023-12-20 11:54:02 -08:00
Eric Blankenhorn
88bff510bb
Merge pull request #312 from dgarske/tls_pkcb
...
Added support for TLS PK callbacks with ECC and RSA Sign using PKCSv1.5 and PSS padding
2023-12-08 15:10:32 -06:00
Eric Blankenhorn
233bd33240
Merge pull request #315 from dgarske/keyblob_tests
...
Added tests for keyblob buffer export/import and support for getting sizes
2023-12-08 15:10:04 -06:00
David Garske
4a48fb3882
Peer review cleanups.
2023-12-08 12:00:01 -08:00
David Garske
65e03e15e6
Added Windows Visual Studio project for wolfTPM.
2023-12-06 15:10:44 -08:00
David Garske
53b043dafa
Tests for keyblob buffer export/import. Added support for getting the keyblob sizes.
2023-12-06 11:20:18 -08:00
David Garske
e601803f1b
Added support for PK callbacks with RSA Sign using PKCSv1.5 and PSS.
...
Fixes for building wolfTPM without crypto callbacks.
Fixes for building/running with FIPS.
2023-12-01 08:25:53 -08:00
David Garske
249f9d4942
Fixes for building wolfCrypt without PEM to DER support.
2023-11-15 21:53:50 -08:00
David Garske
7dbd844586
Add TPM crypto callback support for RSA key generation.
2023-11-13 14:56:46 -08:00
Tesfa Mael
df89f497e5
Remove error-ssl.h
2023-11-01 17:17:28 -07:00
David Garske
a10a10db5d
Added v3.0 release notes and updated version.
2023-10-30 12:02:28 -07:00
David Garske
2d14cd2297
Fixes for building wolfCrypt with no RSA (--disable-rsa / NO_RSA).
2023-10-23 14:05:10 -07:00
David Garske
8ae11cf9eb
Add wrapper support for setting key usage (not just extended key usage).
2023-10-20 14:40:49 -07:00
David Garske
cdcdf389c3
Fixes for command auth flag typo. Fix to make sure extra auth are not provided.
2023-10-12 14:19:42 -07:00
David Garske
f3e1bbbf3d
Refactor of the command authentication. If command does not require auth do not supply it. ZD 16689
2023-10-12 13:48:04 -07:00
David Garske
96cd17af1d
Improvements/fixes to NV auth and session auth set/unset:
...
* Fix bug with NV name after first write (only appears when using HMAC session).
* Add new API `wolfTPM2_UnsetAuthSession` to unset auth index for a session and save off the nonce from the TPM. This allows auth to be unset/set again with the same session.
* Cleanup in the NV API's for unsetting of the auth to be handled by caller, not in API.
2023-09-15 14:03:11 -07:00
David Garske
8968d89f90
More CI fixes.
2023-08-31 12:29:13 -07:00
David Garske
a15260342f
wolfTPM Support for sealing/unsealing based on a PCR that is signed externally. Use an external key to sign a PCR digest. Allows a new signed policy to be sent with updates to continue allowing a sealed secret to be unsealed when PCR's change. This resolves the issue with PCR brittleness.
2023-08-29 18:47:18 -07:00
David Garske
5b6c7c0368
Improvements to the secure_rot example. Add support for manually placing hash.
2023-08-15 14:41:09 -07:00
David Garske
6126d04be3
Support for importing and loading public ECC/RSA keys formatted as PEM or DER.
2023-08-15 08:27:00 -07:00
David Garske
3f29c59e87
Add support for encrypting secret using ECC key. Allows using ECC for parameter encryption and importing ECC keys with custom seed. Requires https://github.com/wolfSSL/wolfssl/pull/6683
2023-08-08 16:15:18 -07:00
David Garske
bb18c4c550
Added `wolfTPM2_ChangePlatformAuth` wrapper to help set the platform auth. This is useful from the bootloader to make sure no one can use the platform hierarchy from application.
2023-08-07 11:08:02 -07:00
David Garske
5a20647313
Minor cleanups. Update wolfSSL test certs. Added TPM_TIS_MAX_WAIT. Fix build with WOLFTPM_DEBUG_VERBOSE only.
2023-08-07 11:08:02 -07:00
David Garske
c35b532724
Add support for NV lock.
2023-08-07 11:08:02 -07:00
Lealem Amedie
b468d7d29a
Adding STM23 Expansion Pack
2023-07-28 14:51:39 -06:00
John Bland
fafd0c2780
include user_settings.h manually when wolfCrypt is not in use
2023-07-27 16:04:25 -04:00
David Garske
e646c5701e
Peer review fixes. Avoid using a struct for the seed.
2023-07-20 12:28:39 -07:00
David Garske
7fcbcab634
Fixes for edge case builds !HAVE_ECC or NO_RSA.
2023-07-20 09:29:45 -07:00
David Garske
ae6bac26c5
Added documentation and tests.
2023-07-19 13:28:50 -07:00
David Garske
97b4f62ac6
Fix for import of private key with seed. Added new API `wolfTPM2_ImportPrivateKeyBuffer` for importing private key ECC/RSA in either PEM or DER(ASN.1). ZD16249
2023-07-18 18:21:10 -07:00
David Garske
d28738310a
Make sure the file IO XFEOF and XREWIND are available (not defined in wolfSSL).
2023-07-07 09:53:57 -07:00
David Garske
50bf4beb08
Merge pull request #271 from rizlik/mmio
...
support memory mapped tpms
2023-06-28 16:53:48 -07:00
David Garske
ab9bf2981b
Fixes for MMIO HAL refactor.
2023-06-28 16:00:56 -07:00
John Bland
8981aa64be
undefine HAVE_THREAD_LS if NO_THREAD_LS is defined
2023-06-02 14:52:04 -04:00
Marco Oliverio
f8c1ff6075
tis: support memory mapped tpm
2023-05-30 16:58:46 +00:00
Marco Oliverio
d0beda2d71
types.h: add typedef for address sized integer
2023-05-30 16:58:12 +00:00