David Garske
6fbb49a94f
wolfTPM Release v3.9.0. Updated copyright and version.
2025-05-14 15:31:07 -07:00
David Garske
026c82f799
Fixes and new tests for building wolfCrypt/wolfTPM without ECC or RSA. Fixes ZD 18470. Improved smallstack (eliminated `WOLFTPM2_MAX_BUFFER`). Fixes for building with NO_ASN.
2024-08-19 09:55:15 -07:00
David Garske
c98ee9a71e
Update copyright date.
2024-04-24 10:42:27 -07:00
David Garske
b395b65287
Fix for config.h, which should only be included from .c files, not headers. ZD 17473
2024-02-07 14:28:33 -08:00
David Garske
9cad7f4e24
Fix some of the example TODO's. Fixes for seal/unseal example. Fixes for TLS with param enc. Fix signed_timestamp with ECC.
2023-10-30 12:00:37 -07:00
David Garske
0ceeebeaf7
Fix for building with no PEM to DER. Fix for building with static library and no debug, due to missing stdio in examples. Fix for TLS examples missing WOLFCRYPT_ONLY check. Fix for building with WC_NO_RNG. Fix for RSA salt with RNG using crypto cb.
2023-05-02 16:18:21 -07:00
David Garske
c05bf659c2
Fix broken paths with HAL refactor. Update TLS examples to use latest TLS version (allowing downgrade).
2023-01-20 08:29:53 -08:00
David Garske
41e5750ff2
Peer review fixes. Cleanups for return code checking, stdlib functions, unknown args and coding standards.
2022-10-04 13:19:51 -07:00
David Garske
d491437e08
Use `strcmp` since `argv` is guaranteed to be NULL terminated. Fix keygen example whitespace alignment.
2022-10-04 11:44:16 -07:00
David Garske
3f84b2efbc
wolfTPM v2.5.0 release prep
2022-07-22 09:32:57 -07:00
David Garske
2b8cfb8692
wolfTPM Release v2.1.0 preparation.
...
* Updated copyright
* Fixed minor cast warning.
* Fixed minor scan-build warnings.
* Cleanup print public and fix possible print of uninitialized field.
2021-03-17 10:13:50 -07:00
Dimitar Tomov
4f6e35f7fd
Minor change for attestation examples, EK is not needed
...
* EK is not needed for Quote or GetTime
* Only Endorsement Hierarchy is needed for GetTime
Signed-off-by: Dimitar Tomov <dimi@wolfssl.com>
2021-03-12 23:47:12 +02:00
David Garske
845b3d1da2
Release fixes and cleanups. Fixes for init of `WOLFTPM2_HASH` in `wolfTPM2_HashStart`. Fix for for various build configurations (--disable-wrapper). Fix for Microchip "sign" bit on symmetric keys. Fix for scan-build warnings. Cleanup whitespace.
2020-12-07 11:01:02 -08:00
David Garske
d044360e38
Fixes for scan-build and g++ warnings.
2020-12-01 10:38:39 -08:00
David Garske
4b0b70861c
Added parameter encryption support to more examples. Fix to not set "encrypt" or "decrypt" if command doesn't allow it. Updated documentation.
2020-11-30 12:00:54 -08:00
David Garske
409fd96502
Fixes for response decryption. Nonce from TPM captured correctly now. Added support for args to all examples.
2020-11-24 16:44:20 -08:00
David Garske
5abeea75a9
Added object names to the command hash calculation (cpHash). Added HMAC key creation. Fixed outstanding TODO items.
2020-11-23 14:54:39 -08:00
David Garske
dbd8e41b47
Refactor of the session authentication. Added "-e" option to some examples to enable parameter encryption and removed the _paramenc.c files. Fixup for the `getPrimaryStoragekey` to allow persisting if not `WOLFTPM_WINAPI`. Improve command line options. Added calculation of command hash and HMAC for sessions.
2020-11-20 16:47:14 -08:00
Elms
efa2464496
winapi: cleanup debug and signed_timestamp example
2020-10-13 11:58:29 -07:00
David Garske
ebfbd4dd2d
Moved the new clock_set example into the existing timestamp examples directory. Minor cleanups and fix for printf warning.
2020-09-02 11:46:12 -07:00
Eric Blankenhorn
72464dc621
Release v1.9 preparation
2020-08-24 12:12:11 -05:00
David Garske
8eb67b5bcf
Improvements to the signed timestamp example. Cleanup of the key template API's.
2020-07-21 15:24:10 -07:00
Dimitar Tomov
1a88cbad56
Add print for TPM uptime since last power-up and modify message for TPM clock
...
Signed-off-by: Dimitar Tomov <dimi@designfirst.ee>
2020-07-11 01:05:59 +03:00
David Garske
07594ec30a
Fix for attestation parsing. Elements must be parsed to handle endianness swap. Fixes #104 .
2020-07-10 13:19:22 -07:00
Dimitar Tomov
8b9e5edd9f
Printing the correct TPM attested time value from the GetTime response
...
Signed-off-by: Dimitar Tomov <dimi@designfirst.ee>
2020-07-10 10:11:48 +03:00
Dimitar Tomov
4d4a0a8d3b
Cleanups and fixes based on peer review.
...
Signed-off-by: Dimitar Tomov <dimi@designfirst.ee>
2020-05-29 16:58:22 +03:00
Dimitar Tomov
a7d607424a
Updated the printf messages for the signed_timestamp example
...
Signed-off-by: Dimitar Tomov <dimi@designfirst.ee>
2020-05-29 16:35:48 +03:00
Dimitar Tomov
5ffdd5a176
Add wolfTPM2 wrapper for creating signed timestamps and update example
...
Signed-off-by: Dimitar Tomov <dimi@designfirst.ee>
2020-05-29 16:21:10 +03:00
Dimitar Tomov
b1292f67a1
Make the signed_timestamp example use the new wolfTPM2 wrappers for AIK
...
Signed-off-by: Dimitar Tomov <dimi@designfirst.ee>
2020-05-29 16:19:48 +03:00
David Garske
bd7a01779a
Minor spelling fixes.
2020-05-27 08:24:35 -07:00
Dimitar Tomov
b13da37edf
Minor fix from peer review of signed_timestamp example
...
Signed-off-by: Dimitar Tomov <dimi@designfirst.ee>
2020-05-27 17:38:34 +03:00
Dimitar Tomov
255cc9d87a
Add prints of the attested structured in the new signed_timestamp example
...
Signed-off-by: Dimitar Tomov <dimi@designfirst.ee>
2020-05-27 17:31:13 +03:00
Dimitar Tomov
ed4d43c94a
Quick fix to set the correct handle for flushing the SRK at exit
...
Signed-off-by: Dimitar Tomov <dimi@designfirst.ee>
2020-05-27 05:32:13 +03:00
Dimitar Tomov
4539ad3750
AIK is generated using the Endorsement Hierarchy but created under Owner's SRK
...
Generating AIK happens by using the Endorsement Hierarchy, but still
the only Hierarchy that can allow loading the key is the Owner Hierarchy
through a Storage Key. Using NULL Password Auth Sessions for EK & EH.
Signed-off-by: Dimitar Tomov <dimi@designfirst.ee>
2020-05-27 02:29:39 +03:00
Dimitar Tomov
f96217ead7
Add timestamp example source code
...
Signed-off-by: Dimitar Tomov <dimi@designfirst.ee>
2020-05-27 01:35:42 +03:00