|
1 | 1 | # Release Notes
|
2 | 2 |
|
| 3 | +## wolfTPM Release 3.0.0 (Oct 31, 2023) |
| 4 | + |
| 5 | +**Summary** |
| 6 | + |
| 7 | +Refactor of command authentication. Support for ECC sessions and secrets. Support for policy sealing/unsealing. Examples for secure boot. |
| 8 | + |
| 9 | +**Detail** |
| 10 | +* Refactor of the command authentication. If command does not require auth do not supply it (PR #305) |
| 11 | +* Refactor HAL and added Microchip Harmony SPI HAL support (PR #251) |
| 12 | +* Relocate crypto callback code to its own code file (PR #304) |
| 13 | +* Fixed using a custom wolfTPM CSR sigType (PR #307) |
| 14 | +* Fixed support for ECC 384-bit only support (PR #307) |
| 15 | +* Fixed issue with using struct assignment (switched to memcpy) (PR #303) |
| 16 | +* Fixed various issues building with C++ compiler (PR #303) |
| 17 | +* Fixed issues with STM32 I2C build and improved performance (PR #302) |
| 18 | +* Fixed seal with RSA and PCR extend auth. (PR #296) |
| 19 | +* Fixed issue including user_settings.h when `--disable-wolfcrypt` set (PR #285) |
| 20 | +* Fixed TPM private key import with custom seed (PR #281) |
| 21 | +* Fixed autogen.sh (autoconf) to generate without warnings (PR #279) |
| 22 | +* Fixed TPM2 create with decrypt or restricted flag set (PR #275) |
| 23 | +* Fixed and improved low resource build options (PR #269) |
| 24 | +* Fixed the TPM_E_COMMAND_BLOCKED macro to have the correct value (PR #257) |
| 25 | +* Fixed casting and unused variable problems on windows (PR #255) |
| 26 | +* Fixed Linux usage of `cs_change` and added config overrides (PR #268) |
| 27 | +* Fixed and improved the NV auth and session auth set/unset (PR #299) |
| 28 | +* Fixed capability to handle unknown `TPM2_GetCapability` type and fix bad printf (PR #293) |
| 29 | +* Fixed macros for file IO XFEOF and XREWIND to make sure they are available (PR #277) |
| 30 | +* Fixed seal/unseal example (PR #306) |
| 31 | +* Fixed TLS examples with param enc enabled (PR #306) |
| 32 | +* Added CI tests for CSharp wrappers (PR #307) |
| 33 | +* Added support for sealing/unsealing based on a PCR that is signed externally (PR #294) |
| 34 | +* Added examples for Secure Boot solution to store root of trust in NV (PR's #276, #289, #291 and #292) |
| 35 | +* Added support for importing and loading public ECC/RSA keys formatted as PEM or DER (PR #290) |
| 36 | +* Added new policy_nv example (PR #298) |
| 37 | +* Added `-nvhandle` argument to nvram examples (PR #296) |
| 38 | +* Added code to test external import between two TPM's (PR #288) |
| 39 | +* Added support for STM32 Cube Expansion Pack (PR #287) |
| 40 | +* Added support memory mapped (MMIO) TPM's (PR #271) |
| 41 | +* Added `wc_SetSeed_Cb` call for FIPS ecc (PR #270) |
| 42 | +* Added wrapper support for setting key usage (not just extended key usage) (PR #307) |
| 43 | +* Added RSA key import methods to handle PEM and DER encoding directly (PR #252) |
| 44 | +* Added thread local storage macro and make gActiveTPM local to the thread (PR #253) |
| 45 | +* Added Microchip macro names and Support for bench with MPLABX Harmony (PR #256) |
| 46 | +* Improvements to cmake build (PR's #280, #283 and #284) |
| 47 | + |
3 | 48 | ## wolfTPM Release 2.7.0 (Dec 27, 2022)
|
4 | 49 |
|
5 | 50 | **Summary**
|
|
0 commit comments