David Garske
c98ee9a71e
Update copyright date.
2024-04-24 10:42:27 -07:00
David Garske
4157ed5689
Release v3.2.0 prep.
2024-04-24 10:42:25 -07:00
JacobBarthelmeh
1126c2ebfc
Merge pull request #344 from dgarske/nv_auth_policy
...
Added new API for allowing NV creation with policy
2024-04-24 11:02:51 -06:00
David Garske
377099af09
Added new API for allowing NV creation with policy.
2024-04-22 09:58:49 -07:00
David Garske
4a2e2506a4
Add Infineon firmware update recovery support.
2024-04-18 11:02:34 -07:00
David Garske
892726e6b5
Added support for Infineon SLB9672/SLB9673 Firmware upgrade (see examples/firmware/README.md)
...
Added Infineon Modus Toolbox support. See `wolfssl/IDE/Infineon/README.md` for setup instructions.
Added support for Infineon CyHal I2C support.
Added Firmware extraction tool
Added Firmware update example application `examples/firmware/ifx_fw_update`.
Added support for vendor capabilities `TPM_CAP_VENDOR_PROPERTY`.
Added `XSLEEP_MS` macro for firmware update delay.
Added support for getting key group id, operational mode and update counts.
Added support for abandoning an update.
Added support for firmware update done, but not finalized
Fix auto-detect to not define SLB9672/SLB9673.
2024-04-01 17:21:18 -07:00
David Garske
63bb85ae9d
Add support for pre-provisioned TPM using the "TPM 2.0 Keys for Device Identity and Attestation" specification. Build macro: `WOLFTPM_MFG_IDENTITY`.
2024-03-20 15:11:58 -07:00
David Garske
c4880bee18
ST33 Vendor command for getting product info.
2024-03-20 15:11:58 -07:00
David Garske
93441f0e59
Documentation fixes.
2024-03-18 15:38:38 -07:00
David Garske
0b60fae993
Fix for netdb.h.
2024-03-01 11:51:27 -08:00
David Garske
35bf0b9649
Use C style comments.
2024-02-29 08:20:51 -08:00
David Garske
225a352bd4
Fixes for building with "-Wpedantic". ZD 17592
2024-02-28 17:06:55 -08:00
Eric Blankenhorn
46ef684106
Merge pull request #328 from dgarske/cap_handles
...
Added support for getting handles from capabilities
2024-02-09 09:33:08 -06:00
David Garske
f7665ee0db
Documentation fixes.
2024-02-09 06:55:16 -08:00
David Garske
b395b65287
Fix for config.h, which should only be included from .c files, not headers. ZD 17473
2024-02-07 14:28:33 -08:00
David Garske
e078e15f56
Added new API `wolfTPM2_GetHandles` to get list of handles from the TPM capabilities. ZD 17328
2024-02-06 10:48:16 -08:00
David Garske
a2a45d2a3d
Match byte swap logic with wolfSSL (use WOLF_ALLOW_BUILTIN).
2024-01-26 14:26:54 -08:00
David Garske
b27e6c5874
Remove unused `XHTONS` and `arpa/inet.h`.
2024-01-26 14:26:54 -08:00
JacobBarthelmeh
6fcac417ee
Merge pull request #322 from dgarske/pkcs7_ecc
...
Added PKCS7 ECC support to example
2024-01-18 14:22:24 -08:00
David Garske
0aa01f4f5a
Added PKCS7 ECC support to example. Added wrapper function to export TPM public key as DER/ASN.1 or PEM. Fix for crypto callback ECC sign to handle getting keySz for unknown cases (like PKCS7 without privateKey set).
2024-01-17 15:50:30 -08:00
David Garske
ae60c59af7
Add _ex version for GetKeyTemplate RSA/ECC to allow setting all template parameters.
2024-01-09 13:20:25 -08:00
David Garske
d9f51da00e
wolfTPM v3.1 release prep
2023-12-29 10:55:30 -08:00
David Garske
93a2493dbf
Fixes for attestation with endorsement key. Enable the broken endorsement tests.
2023-12-29 09:32:49 -08:00
David Garske
6322c91e53
Remove the `WOLFTPM2_KEYBLOB.name` (deprecated) and is in `handle.name` now.
2023-12-29 09:20:45 -08:00
David Garske
fb2ea5b315
Fixes for compiler type warnings. Add `WOLFTPM_NO_LOCK`. Improve STM IO options/logging.
2023-12-20 11:54:02 -08:00
Eric Blankenhorn
88bff510bb
Merge pull request #312 from dgarske/tls_pkcb
...
Added support for TLS PK callbacks with ECC and RSA Sign using PKCSv1.5 and PSS padding
2023-12-08 15:10:32 -06:00
Eric Blankenhorn
233bd33240
Merge pull request #315 from dgarske/keyblob_tests
...
Added tests for keyblob buffer export/import and support for getting sizes
2023-12-08 15:10:04 -06:00
David Garske
4a48fb3882
Peer review cleanups.
2023-12-08 12:00:01 -08:00
David Garske
65e03e15e6
Added Windows Visual Studio project for wolfTPM.
2023-12-06 15:10:44 -08:00
David Garske
53b043dafa
Tests for keyblob buffer export/import. Added support for getting the keyblob sizes.
2023-12-06 11:20:18 -08:00
David Garske
e601803f1b
Added support for PK callbacks with RSA Sign using PKCSv1.5 and PSS.
...
Fixes for building wolfTPM without crypto callbacks.
Fixes for building/running with FIPS.
2023-12-01 08:25:53 -08:00
David Garske
249f9d4942
Fixes for building wolfCrypt without PEM to DER support.
2023-11-15 21:53:50 -08:00
David Garske
7dbd844586
Add TPM crypto callback support for RSA key generation.
2023-11-13 14:56:46 -08:00
Tesfa Mael
df89f497e5
Remove error-ssl.h
2023-11-01 17:17:28 -07:00
David Garske
a10a10db5d
Added v3.0 release notes and updated version.
2023-10-30 12:02:28 -07:00
David Garske
2d14cd2297
Fixes for building wolfCrypt with no RSA (--disable-rsa / NO_RSA).
2023-10-23 14:05:10 -07:00
David Garske
8ae11cf9eb
Add wrapper support for setting key usage (not just extended key usage).
2023-10-20 14:40:49 -07:00
David Garske
cdcdf389c3
Fixes for command auth flag typo. Fix to make sure extra auth are not provided.
2023-10-12 14:19:42 -07:00
David Garske
f3e1bbbf3d
Refactor of the command authentication. If command does not require auth do not supply it. ZD 16689
2023-10-12 13:48:04 -07:00
David Garske
96cd17af1d
Improvements/fixes to NV auth and session auth set/unset:
...
* Fix bug with NV name after first write (only appears when using HMAC session).
* Add new API `wolfTPM2_UnsetAuthSession` to unset auth index for a session and save off the nonce from the TPM. This allows auth to be unset/set again with the same session.
* Cleanup in the NV API's for unsetting of the auth to be handled by caller, not in API.
2023-09-15 14:03:11 -07:00
David Garske
8968d89f90
More CI fixes.
2023-08-31 12:29:13 -07:00
David Garske
a15260342f
wolfTPM Support for sealing/unsealing based on a PCR that is signed externally. Use an external key to sign a PCR digest. Allows a new signed policy to be sent with updates to continue allowing a sealed secret to be unsealed when PCR's change. This resolves the issue with PCR brittleness.
2023-08-29 18:47:18 -07:00
David Garske
5b6c7c0368
Improvements to the secure_rot example. Add support for manually placing hash.
2023-08-15 14:41:09 -07:00
David Garske
6126d04be3
Support for importing and loading public ECC/RSA keys formatted as PEM or DER.
2023-08-15 08:27:00 -07:00
David Garske
3f29c59e87
Add support for encrypting secret using ECC key. Allows using ECC for parameter encryption and importing ECC keys with custom seed. Requires https://github.com/wolfSSL/wolfssl/pull/6683
2023-08-08 16:15:18 -07:00
David Garske
bb18c4c550
Added `wolfTPM2_ChangePlatformAuth` wrapper to help set the platform auth. This is useful from the bootloader to make sure no one can use the platform hierarchy from application.
2023-08-07 11:08:02 -07:00
David Garske
5a20647313
Minor cleanups. Update wolfSSL test certs. Added TPM_TIS_MAX_WAIT. Fix build with WOLFTPM_DEBUG_VERBOSE only.
2023-08-07 11:08:02 -07:00
David Garske
c35b532724
Add support for NV lock.
2023-08-07 11:08:02 -07:00
Lealem Amedie
b468d7d29a
Adding STM23 Expansion Pack
2023-07-28 14:51:39 -06:00
John Bland
fafd0c2780
include user_settings.h manually when wolfCrypt is not in use
2023-07-27 16:04:25 -04:00