Skip to content

Latest commit

 

History

History
444 lines (350 loc) · 22.5 KB

ChangeLog.md

File metadata and controls

444 lines (350 loc) · 22.5 KB

Release Notes

wolfTPM Release 3.0.0 (Oct 18, 2023)

Summary

Refactor of command authentication. Support for ECC sessions and secrets. Support for policy sealing/unsealing. Examples for secure boot.

Detail

  • Added support for sealing/unsealing based on a PCR that is signed externally (PR #294)
  • Example for Secure Boot solution to store root of trust in NV (PR's #276, #289, #291 and #292)
  • Support for importing and loading public ECC/RSA keys formatted as PEM or DER (PR #290)
  • Added new policy_nv example (PR #298)
  • Added `-nvhandle`` argument to nvram examples (PR #296)
  • Fixes to avoid struct assignment and C++ build fixes (PR #303)
  • Fixes and performance improvements for STM32 I2C (PR #302)
  • Fixes for seal with RSA and PCR extend auth. (PR #296)
  • Fix to include user_settings.h manually when wolfCrypt is not in use (PR #285)
  • Fixes for TPM private key import with custom seed (PR #281)
  • Fixes for autoconf clean generation (PR #279)
  • Fixed TPM2 create with decrypt or restricted flag set (PR #275)
  • Fixes for low resource build options (PR #269)
  • Fixed building with wolfTPM without wolfCrypt --disable-wolfcrypt (PR #267)
  • Fixed the TPM_E_COMMAND_BLOCKED macro to have the correct value (PR #257)
  • Fixed casting and unused variable problems on windows (PR #255)
  • Corrected Linux usage of cs_change, added config overrides (PR #268)
  • Improvements/fixes to NV auth and session auth set/unset (PR #299)
  • Handle unknown TPM2_GetCapability type and fix bad printf (PR #293)
  • Add code to test external import between two TPM's (PR #288)
  • Adding STM32 Expansion Pack (PR #287)
  • Improvements to cmake build (PR's #280, #283 and #284)
  • Make sure the file IO XFEOF and XREWIND are available (PR #277)
  • Added support memory mapped (MMIO) TPM's (PR #271)
  • Added wc_SetSeed_Cb call for FIPS ecc (PR #270)
  • Microchip macro names and Support for bench with MPLABX Harmony (PR #256)
  • Added RSA key import methods to handle PEM and DER encoding directly (PR #252)
  • Added thread local storage macro and make gActiveTPM local to the thread (PR #253)
  • Relocate crypto callback code to its own code file (PR #304)
  • Refactor HAL and added Microchip Harmony SPI HAL support (PR #251)
  • Refactor of the command authentication. If command does not require auth do not supply it (PR #305)

wolfTPM Release 2.7.0 (Dec 27, 2022)

Summary

Added Infineon TriCore HAL support and examples for Keyed Hash / NV counter increment. Minor fixes for NV auth and Keyed Hash.

Detail

  • Support for Infineon TriCore (TC2XX/TC3XX) using macro WOLFTPM_INFINEON_TRICORE (PR #229)
  • Added NV counter increment example (PR #243)
  • Added Key Generation example for Keyed Hash. (PR #245)
  • Fixed for Keyed Hash with HMAC (PR #243)
  • Fixed for NV auth handling (PR #243)
  • Fixed missing call to Close(), since Windows won't flush unless its called (PR #242)
  • Fixed tpm2.c issue with variable declarations not being at top of function (PR #246)

wolfTPM Release 2.6 (09/01/2022)

Summary

Fix for CSharp wrapper when setting a custom OID for a CSR. Added CSharp wrapper documentation and improved a few others. Added CSharp function to set key password for blob.

Detail

  • Fix for CSharp SetCustomExtension to use allocated byte buffer instead of passing string (PR #239)
  • Fixed for CMake wolftpm/options.h generation to support disabled source tree changes (CMAKE_DISABLE_SOURCE_CHANGES) (PR #235)
  • Fixed CMake / vcpkg issue with options.h output location (PR #235)
  • Added CSharp KeyBlob.SetKeyAuthPassword and test case (PR #237)
  • Added API documentation for the CSharp wrappers (PR #234)
  • Fixed documentation error on wolfTPM2_GetKeyBlobAsBuffer (PR #234)
  • Fixed documentation for encDecAlg with authenticated session (PR #236)
  • Fixed software TPM (docs/SWTPM.md) example argument for -rm (PR #238)

wolfTPM Release 2.5 (07/22/2022)

Summary

Major expansion of the C# wrapper for key handling, CSR/Cert generation, RSA enc/dec and sign/verify. Added Infineon SLB9672 support. Enhancements to the CMake support. Added new keygen example for creating a primary key.

Detail

  • Fixed issue with sign signature buffer size checking (PR #232)
  • Fixed support for using nonce from TPM (when using no wolfCrypt RNG WOLFTPM2_USE_HW_RNG) (PR #216)
  • Fixed workaround for Windows TBS self test (PR #224)
  • Fixed issue with CSharp handle unloading (PR #212)
  • Fixed TPM support for using the public key with TLS (PR #210)
  • Added crypto callback support for seeding RNG with TPM (PR #216)
  • Added Infineon SLB9672 support (PR #214)
  • Added support for using a unique template with create and create primary (PR #215)
  • Added CSharp wrapper support for RSA encrypt/decrypt and Sign/Verify. (PR #232)
  • Added CSharp wrapper documentation for CSR functions (PR #232)
  • Added CSharp support for handling TPM errors with exception (PR #224)
  • Added CSR wrappers and tests to assist with TPM based CSR/Self-Signed-Cert generation (including CSharp wrappers) (PR #219)
    • Support for subject, key usage, custom request extensions and output as PEM or DER
    • New structure WOLFTPM2_CSR, new API's wolfTPM2_CSR_* and new CSharp class Csr
  • Added CSharp create primary key example (PR #215)
  • Added CSharp wrapper and tests for wolfTPM2_CreatePrimaryKey() (PR #213)
  • Added CSharp tests for authenticated sessions (PR #212)
  • Added CSharp wrappers wolfTPM2_SetAuthSession and wolfTPM2_NVStoreKey (PR #209)
  • Added CSharp IDisposable in classes for cleanup of unmanaged resources (PR #225)
  • Added support for wolfTPM CMake to output the options.h (PR #211)
  • Added CMake WOLFTPM_DEBUG option (PR #211)
  • Improved the byte swapping logic for GCC (PR #231)

wolfTPM Release 2.4 (05/06/2022)

Summary

Add CMake support. Add C# wrappers. Add ST33 GetRandom2. Improve TPM2_SetupPCRSel. Fixes for C++ compilers, example install and writing PEM.

Detail

  • Fixes for c++ compiler (PR #206)
  • Adding a C# wrappers (PR #203)
  • CMake support (PR #202, #204, #205)
  • Add support for ST33 vendor specific command TPM_CC_GetRandom2 (PR #200)
  • Fix writing PEM in wolfTPM2_RsaKey_TpmToPemPub (PR #201)
  • Improve TPM2_SetupPCRSel (multiple calls) (PR #198)
  • Fix for a few spelling errors and whitespace cleanup (PR #199)

wolfTPM Release 2.3.1 (11/18/2021)

Summary

Fix for make install

Detail

  • Fix for installing example code on linux builds (PR #196)

wolfTPM Release 2.3 (11/08/2021)

Summary

Fixes for minor build issues, refactor of GPIO configure to combine and new PCR Read example.

Detail

  • Refactor GPIO support (single gpio_config) (PR #194)
  • Fix for Linux HAL IO try again timeout logic (PR #194)
  • Fix for big endian in TIS layer (PR #191)
  • Fix for RSAES padding (RSA_Encrypt) (PR #187)
  • Fix in tests to allow command code error for CreateLoaded (not supported on hardware) (PR #184)
  • Fix for compiler warning for file read in make_credential.c (PR #182)
  • Fixes for Windows builds (PR #181)
  • Fixes for RSA RNG in edge case builds (fixes wolfBoot build error) (PR #180)
  • Added PCR Read example (PR #185)

wolfTPM Release 2.2 (07/13/2021)

Summary

Added new examples for remote attestation, make credential and GPIO support. Added Endorsement hierarchy support to many examples. Refactored the reference HAL IO code into separate files.

Detail

  • Fixed total auth area size when multiple auth sessions are used (PR #174)
  • Fixed TPM2_SetupPCRSel to only allow valid pcrIndex values (PR #165 and PR #167)
  • Fixed TPM2_MakeCredential to work without auth as TCG spec defines (PR #174)
  • Fixed TPM2_MakeCredential to support using EK pub to encrypt challenge (PR #174)
  • Fixed TPM2_ActivateCredential to work with EK pub to decrypt challenge (PR #174)
  • Fix to only enable printf in library proper if DEBUG_WOLFTPM is set (PR #154)
  • Added support for QNX with wolfTPM (PR #156)
  • Added credential examples for remote attestation (PR #161)
  • Added new example for sealing a secret using TPM key (PR #157)
  • Added GPIO config, read and set examples (PR #155 and #172)
  • Added GPIO support and examples for ST33 (PR #155)
  • Added GPIO support and examples for Nuvoton NPCT75x (PR #172)
  • Added Endorsement support for keygen and attestation examples using -eh (PR #174)
  • Added missing TPM2_CreateLoaded command and added wrapper wolfTPM2_CreateLoadedKey (PR #174)
  • Added new wrappers for public PEM support wolfTPM2_RsaKey_TpmToPemPub and wolfTPM2_RsaKey_PemPubToTpm (PR #174)
  • Added keygen option to output PEM files for TPM public keys (PR #174)
  • Added saving of EK's TPM2B_PUBLIC for attestation purposes (PR #174)
  • Added new wrapper for satisfying EK policy (PR #174)
  • Added unit test for TPM2_CertifyCreation (PR #169)
  • Added support for --with-wolfcrypt=/dir/ (PR #166)
  • Added documentation for using QEMU with --enable-devtpm for testing (PR #146)
  • Modified keygen to use new wolfTPM2_CreateLoaded wrapper to acquire correct AK name (PR #174)
  • Modified keyload to be able to load keys created under the EK/EH (PR #174)
  • Cleanup the ECC point code to appease some coverity warnings (PR #168)
  • Cleanup obsolete txBuf[4] = 0x00; because handled with SPI check wait state logic (PR #162)
  • Improved API documentation using Doxygen for wolfTPM wrappers and proprietary API's (PR #164)
  • Improved the Windows TBS documentation (PR #163)
  • Refactor the assignment of structs to use memcpy (PR #176)
  • Refactor of the TPM IO code to separate files (PR #171)

wolfTPM Release 2.1 (03/17/2021)

  • Fixed possible KDFa buffer overrun (PR #147)
  • Fixed typo on WOLFTPM_USER_SETTINGS (PR #140)
  • Improved examples to use the key templates. (PR #136)
  • Added symmetric key support for key generation examples (PR #143)
  • Added NVRAM examples (PR #145)
  • Added STM32 CubeMX I2C support (PR #142)
  • Added details for TPM 2.0 with Windows TBS (PR #144)
  • Added alternate subject name to example certificates for TLS (PR #141)
  • Updated expired wolfSSL certs (PR #139)
  • Removed EK from the attestation and signed timestamp examples (PR #152)

wolfTPM Release 2.0 (12/07/2020)

Summary

Added AES CFB parameter encryption, HMAC sessions, TPM simulator, Windows TPM (TBSI) support and more examples for time/keys.

Detail

  • Refactor of the session authentication. New struct TPM2_AUTH_SESSION and wolfTPM2_SetAuth_* API's. (PR #129 and #133)
  • Added Windows TPM TBSI support (PR #127)
  • Added TPM simulator support using TPM TCP protocol (PR #121)
  • Added minGW support (PR #127)
  • Added AES CFB parameter encryption support (PR #129)
  • Added XOR parameter encryption support (PR #122)
  • Added "-aes" or "-xor" option to some examples to enable parameter encryption. (PR #129)
  • Added HMAC session support (PR #129)
  • Added support for encrypted RSA salt for salted-unbounded session (PR #129)
  • Added innerWrap and outerWrap support for sensitive to private. (PR #129)
  • Improvements to the KDFa (PR #129)
  • Improved the param encryption to use buffers inline (PR #129)
  • Added Key generation and loading examples using disk to store the key (PR #131)
  • Added support for importing external private key to get a key blob for easy re-loading. (PR #132)
  • Add TPM clock increment example (PR #117)
  • Add test vectors for AES CFB and make it the default for tests (PR #125)
  • Improved documentation and code comments (PR #126)
  • Add script to run unit tests with software TPM (PR #124)

wolfTPM Release 1.9 (08/24/2020)

Summary

Added NPCT75x Nuvoton support, dynamic module detection, and attestation key wrappers.

Detail

  • Fix when building wolfSSL with old names NO_OLD_WC_NAMES. (PR #113)
  • Fix for TPM2 commands with more than one auth session. (PR #95)
  • Bugfixes for TPM2_Packet_AppendSymmetric and TPM2_Packet_ParseSymmetric. (PR #111)
  • TPM attestation fixes. (PR #103)
  • If creating an NV and it already exists, set auth and handle anyways. (PR #99)
  • Cleanups, removed unused code from the PCR examples. (PR #112)
  • Improvements to the signed timestamp example. (PR #108)
  • Add example of a TPM2.0 Quote using wolfTPM. (PR #107)
  • Added NPCT75x Nuvoton support and dynamic module detection support. (PR #102)
  • Added RSA sign/verify support and expanded RSA key loading API's. (PR #101)
  • Attestation key wrappers. (PR #100)
  • Add missing xor overload to TPMU_SYM_KEY_BITS. (PR #97)
  • Signed timestamp example (AIK and Attestation). (PR #96)
  • Adding more testing. (PR #93)
  • Add TPM benchmarking results for Nuvoton NPCT650 TPM2.0 module. (PR #92)

wolfTPM Release 1.8 (04/28/2020)

Summary

Added Xilinx Zynq UltraScale+ MPSoC, Linux TIS kernel driver, Nuvoton and Nations Tech TPM module support.

Detail

  • Fixed obsolete workaround for ST33 and TIS header size. (PR #85)
  • Fixes for building with older wolfSSL versions not supporting wc_HashFree. (PR #87)
  • Fixes for building without wolfCrypt RSA (when NO_RSA is defined). (PR #89)
  • Fixes for ECC verify in crypto callback to try software if the curve is not supported (TPM_RC_CURVE) by the TPM hardware. (PR #89)
  • Fixes for building with WOLFTPM2_USE_SW_ECDHE. (PR #86)
  • Added support for using /dev/tpmX. (PR #91)
  • Added example for using an ECC primary storage key (root owner). (PR #84)
  • Added Xilinx Zynq MPSoC bare-metal SPI support. (PR #85)
  • Added support for Nuvoton TPM 2.0 NPCT650. (PR #91)
  • Added support for Nations Technologies Inc. TPM 2.0 module (Z32H330). (PR #88)
  • Cleanup of the session auth, so after being set it is also cleared. (PR #84)
  • Moved the chip specific settings to tpm2_types.h. (PR #85)

wolfTPM Release 1.7 (12/27/2019)

Summary

Adds new wrappers for Non-Volatile (NV), changing auth for a key and shutdown.

Detail

  • Fixes for coverity checks on buffers. (PR #78)
  • Fix visibility warnings in Cygwin. (PR #80)
  • Added wrapper for changing a key's authentication wolfTPM2_ChangeAuthKey. (PR #77)
  • Added support for using authentication with NV. (PR #79)
  • Adds new wrapper API's: wolfTPM2_NVWriteAuth, wolfTPM2_NVReadAuth and wolfTPM2_NVDeleteAuth. (PR #79)
  • Added new wrappers for shutdown and handle cleanup. (PR #81)

wolfTPM Release 1.6 (08/01/2019)

Summary

Improvements for compatibility, chip detection, initialization options and small stack. Adds new wrapper API's for PCR extend. Adds support for using HMAC with existing key.

Detail

  • Fix for wolfCrypt init/cleanup issue with reference count. (PR #75)

  • Fix to restore existing TPM context after calling wolfTPM2_Test. (PR #74)

  • Fix to resolve handling of unsupported ECC curves with the TPM module and ECDHE. (PR #69)

  • Fix for wolfTPM2_SetCommand to ensure auth is cleared. (PR #69)

  • Added --enable-smallstack build options for reducing stack usage. (PR #73)

  • Added support for keeping an HMAC key loaded. (PR #72)

  • Added API unit test framework. (PR #71)

  • Added new wrapper API wolfTPM2_OpenExisting for accessing device that's already started. (PR #71)

  • Added new wolfTPM2_ExtendPCR wrapper. (PR #70)

  • Added crypto callback flags for FIPS mode and Use Symmetric options. (PR #69)

  • Added WOLFTPM_DEBUG_TIMEOUT macro for debugging the timeout checking. (PR #69)

  • Added support for ST33 TPM2_SetMode command for disabling power saving. (PR #69)

  • Improvements for chip detection, compatibility and startup performance (PR #67)

    • Added support for XPRINTF.
    • Fix printf type warnings.
    • Moved the TPM hardware type build macro detection until after the user_settings.h include.
    • Optimization to initialize Mutex and RNG only when use is required.
    • Added missing stdio.h for printf in examples.
    • Added new API's TPM2_SetActiveCtx, TPM2_ChipStartup, TPM2_SetHalIoCb and TPM2_Init_ex.
    • Allowed way to indicate BOOL type already defined.
    • Added C++ support.
  • Added new API wolfTPM2_Test for testing for TPM and optionally returning capabilities. (PR #66)

  • Added way to include generated wolftpm/options.h (or customized one) using WOLFTPM_USER_SETTINGS. (PR #63)

wolfTPM Release 1.5 (02/20/2019)

Summary

Adds support for the Microchip ATTPM20 TPM 2.0 module and Barebox bootloader. Improvements for TLS client/server examples and overall performance. Adds TPM wrappers for HMAC, AES Key Loading and Benchmarking support for RNG/AES/Hashing/TLS.

Detail

  • Fixed issue with cleanup not unregistering the crypto callback. (PR #60)
  • Added support for Microchip ATTPM20 part. (PR #59)
  • Added support for Barebox (experimental). (PR #52)
  • Added TLS benchmarking for CPS and KB/Sec. Enabled with TLS_BENCH_MODE. (PR #56)
  • Added TLS client/server support for symmetric AES/HMAC/RNG. Enabled with WOLFTPM_USE_SYMMETRIC. (PR #56)
  • Added TLS client/server support for mutual authentication. (PR #56)
  • Added TIS locking protection for concurrent process access. Enabled using WOLFTPM_TIS_LOCK. (PR #56)
  • Added symmetric AES encrypt and decrypt wrappers and examples. (PR #54 and PR #55)
  • Added HMAC wrappers and examples. (PR #56)
  • Added wrappers and examples for loading external HMAC and AES keys. (PR #56)
  • Added delete key wrapper and example. (PR #58)
  • Added ECDH support for ephemeral key generation and shared secret. (PR #50)
  • Added benchmark support for RNG, AES (CTR, CBC, CFB) 128/256 and SHA-1, SHA-256, SHA-384 and SHA-512. (PR #54)
  • Added new wolfTPM2_GetCapabilities wrapper API for getting chip info. (PR #51)
  • Added command and response logging using ./configure --enable-debug=verbose or #define WOLFTPM_DEBUG_VERBOSE. (PR #54)
  • Added option to enable raw IO logging using WOLFTPM_DEBUG_IO. (PR #54)
  • Added option to disable TPM Benchmark code using NO_TPM_BENCH. (#60)
  • Added examples/README.md for setup instructions.
  • Tuned max SPI clock and performance for supported TPM 2.0 chips. (PR #56)
  • Cleanup to move common test parameters into examples/tpm_test.h. (PR #54)
  • Updated benchmarks and console output for examples in README.md.

wolfTPM Release 1.4 (11/13/2018)

  • Fixed cryptodev ECC callback to use R and S for the signature verify. (PR #39)
  • Fixed printf type warnings with DEBUG_WOLFTPM defined. (PR #37)
  • Fixed detection of correct hash algorithm in wolfTPM2_VerifyHash. (PR #39)
  • Fix bug with native example where TPM2_Shutdown failure would loop. (PR #34)
  • Fix to decoupled the fixed TPM algorithms/sizes from wolfCrypt build options. (PR #35)
  • Fix for building with different wolfCrypt options. (PR #26)
  • Fix for byte swap build error. (PR #26)
  • Fix CSR example CertName to use designated initializers to resolve use against different wolfSSL versions. (PR #25)
  • Improved portability by eliminating the packed TPM2_HEADER. (PR #45)
  • Improved stack reduction by eliminating the private section from WOLFTPM2_KEY struct. (PR #31)
  • Added TLS server example for wolfTPM. (PR #30)
  • Added more RSA and ECC key loading examples. (PR #47)
  • Added support for loading an external private keys using new API's wolfTPM2_LoadPrivateKey, wolfTPM2_LoadRsaPrivateKey, and wolfTPM2_LoadEccPrivateKey. (PR #46)
  • Added example for reading the firmware version using TPM2_GetCapability with TPM_PT_FIRMWARE_VERSION_1. (PR #44)
  • Added hashing wrappers and tests using new API's: wolfTPM2_HashStart, wolfTPM2_HashUpdate and wolfTPM2_HashFinish. (PR #40)
  • Added PKCS7 7 sign/verify example demonstrating large data case using chunked buffer and new _ex functions. (PR #32)
  • Added Key Generation to benchmark. (PR #33)
  • Added ST33TP I2C TPM 2.0 support (./configure --enable-st33 --enable-i2c). (PR #33)
  • Added ST33TP SPI TPM 2.0 support (--enable-st33 or #define WOLFTPM_ST33). (PR #25)
  • Added support for Atmel ASF SPI. (PR #25)
  • Added example for IAR EWARM. (PR #27)
  • Added ECC verify test using public key and NIST test vectors. (PR #39)
  • Added new RNG wrapper API wolfTPM2_GetRandom. (PR #36)
  • Added macro for hardware RNG max request as MAX_RNG_REQ_SIZE. (PR #36)
  • Added instructions for enabling SPI and I2C on the Raspberry Pi. (PR #34)
  • Added support for symmetric AES encrypt/decrypt. (PR #29)
  • Added wrapper to help with creation of symmetric keys. (PR #29)
  • Added advanced IO callback support (enabled using --enable-advio or #define WOLFTPM_ADV_IO). (PR #25)
  • Added overridable define WOLFTPM_LOCALITY_DEFAULT for the locality used. (PR #28)
  • Added XTPM_WAIT() macro to enable custom wait between polling. (PR #28)
  • Added build option to disable wolfCrypt dependency using ./configure --disable-wolfcrypt or #define WOLFTPM2_NO_WOLFCRYPT. (PR #24)
  • Removed unused SET, CLEAR, TRUE, FALSE macros. (PR #28)
  • Cleanup DEBUG_WOLFTPM ifdef's around all printfs in library proper. (PR #38)
  • Cleanup of line lengths. (PR #37)
  • Cleanup of wrapper test to move test data into tpm_test.h. (PR #47)
  • Cleanup of the packet code to handle determining of size (mark/place). (PR #46)
  • Cleanup of the IO callback examples. (PR #25)
  • Cleanup of TIS layer improve return code and timeout handling. (PR #28)
  • Cleanup to move types and configuration/port specific items into new tpm2_types.h. (PR #24)

wolfTPM Release 1.3 (07/20/2018)

  • Fixed the TIS TPM_BASE_ADDRESS to conform to specification. (PR #19)
  • Fixed static analysis warnings. (PR #20)
  • Fixed minor build warnings with different compilers. (PR #21)
  • Fixed TPM failure for RSA exponents less than 7 by using software based RSA. (PR #23)
  • Added TPM benchmarking support. (PR #16)
  • Added functions to import/export public keys as wolf format. (PR #15)
  • Added PKCS7 example to show sign/verify with TPM. (PR #17)
  • Added CSR example to generate certificate request based on TPM key. (PR #17)
  • Added CSR signing script ./certs/certreq.sh to create certificate using self-signed CA. (PR #17)
  • Added TLS Client example that uses TPM based key for client certificate. (PR #17)
  • Added support for wolfSSL WOLF_CRYPT_DEV callbacks to enable TPM based ECC and RSA private keys. (PR #17)
  • Added ability to clear/reset TPM using ./examples/wrap/wrap_test 1 (PR #17)
  • Moved some of the example configuration into ./examples/tpm_io.h. (PR #17)

wolfTPM Release 1.1 (03/09/2018)

  • Added TPM2 wrapper layer to simplify key creation, RSA encrypt/decrypt, ECC sign/verify and ECDH.
  • Added TPM2 wrapper example code.
  • Added Linux SPI support for running on Raspberry Pi.
  • Fixes for TPM2 command and response assembly and parsing.
  • Fixes to support authentication for command and response.
  • Progress on supporting parameter encryption/decryption.
  • Refactor of TIS and Packet layers into new files.
  • Fixes/improvements to wolfTPM2_GetRCString for error code and string reporting.
  • Added new TPM2_Cleanup function.
  • New tests for TPM2 native API's (test coverage is about 75%).

wolfTPM Release 1.0 (02/06/2018)

  • Support for all TPM2 native API's using TIS and SPI IO callback.
  • Helper for getting TPM return code string TPM2_GetRCString.
  • TPM 2.0 demo code in examples/tpm/tpm2_demo.c with support for STM32 CubeMX SPI as reference.