Skip to content

Commit ab2ee19

Browse files
author
Dimitar Tomov
authored
Merge pull request #151 from dgarske/rel_v2.1
wolfTPM Release v2.1.0 preparation
2 parents d086eba + 2b8cfb8 commit ab2ee19

68 files changed

Lines changed: 187 additions & 155 deletions

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

ChangeLog.md

Lines changed: 25 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,20 @@
1-
## Release Notes
1+
# Release Notes
22

3-
### wolfTPM Release 2.0 (12/07/2020)
3+
## wolfTPM Release 2.1 (03/17/2021)
4+
5+
* Fixed possible KDFa buffer overrun (PR #147)
6+
* Fixed typo on `WOLFTPM_USER_SETTINGS` (PR #140)
7+
* Improved examples to use the key templates. (PR #136)
8+
* Added symmetric key support for key generation examples (PR #143)
9+
* Added NVRAM examples (PR #145)
10+
* Added STM32 CubeMX I2C support (PR #142)
11+
* Added details for TPM 2.0 with Windows TBS (PR #144)
12+
* Added alternate subject name to example certificates for TLS (PR #141)
13+
* Updated expired wolfSSL certs (PR #139)
14+
* Removed EK from the attestation and signed timestamp examples (PR #152)
15+
16+
17+
## wolfTPM Release 2.0 (12/07/2020)
418

519
**Summary**
620

@@ -28,7 +42,7 @@ Added AES CFB parameter encryption, HMAC sessions, TPM simulator, Windows TPM (T
2842
* Add script to run unit tests with software TPM (PR #124)
2943

3044

31-
### wolfTPM Release 1.9 (08/24/2020)
45+
## wolfTPM Release 1.9 (08/24/2020)
3246

3347
**Summary**
3448

@@ -53,7 +67,7 @@ Added NPCT75x Nuvoton support, dynamic module detection, and attestation key wra
5367
* Add TPM benchmarking results for Nuvoton NPCT650 TPM2.0 module. (PR #92)
5468

5569

56-
### wolfTPM Release 1.8 (04/28/2020)
70+
## wolfTPM Release 1.8 (04/28/2020)
5771

5872
**Summary**
5973

@@ -75,7 +89,7 @@ Added Xilinx Zynq UltraScale+ MPSoC, Linux TIS kernel driver, Nuvoton and Nation
7589
* Moved the chip specific settings to `tpm2_types.h`. (PR #85)
7690

7791

78-
### wolfTPM Release 1.7 (12/27/2019)
92+
## wolfTPM Release 1.7 (12/27/2019)
7993

8094
**Summary**
8195

@@ -91,7 +105,7 @@ Adds new wrappers for Non-Volatile (NV), changing auth for a key and shutdown.
91105
* Added new wrappers for shutdown and handle cleanup. (PR #81)
92106

93107

94-
### wolfTPM Release 1.6 (08/01/2019)
108+
## wolfTPM Release 1.6 (08/01/2019)
95109

96110
**Summary**
97111

@@ -124,7 +138,7 @@ Improvements for compatibility, chip detection, initialization options and small
124138
* Added way to include generated `wolftpm/options.h` (or customized one) using `WOLFTPM_USER_SETTINGS`. (PR #63)
125139

126140

127-
### wolfTPM Release 1.5 (02/20/2019)
141+
## wolfTPM Release 1.5 (02/20/2019)
128142

129143
**Summary**
130144

@@ -155,7 +169,7 @@ Adds support for the Microchip ATTPM20 TPM 2.0 module and Barebox bootloader. Im
155169
* Updated benchmarks and console output for examples in README.md.
156170

157171

158-
### wolfTPM Release 1.4 (11/13/2018)
172+
## wolfTPM Release 1.4 (11/13/2018)
159173

160174
* Fixed cryptodev ECC callback to use R and S for the signature verify. (PR #39)
161175
* Fixed printf type warnings with `DEBUG_WOLFTPM` defined. (PR #37)
@@ -198,7 +212,7 @@ Adds support for the Microchip ATTPM20 TPM 2.0 module and Barebox bootloader. Im
198212
* Cleanup to move types and configuration/port specific items into new `tpm2_types.h`. (PR #24)
199213

200214

201-
### wolfTPM Release 1.3 (07/20/2018)
215+
## wolfTPM Release 1.3 (07/20/2018)
202216

203217
* Fixed the TIS TPM_BASE_ADDRESS to conform to specification. (PR #19)
204218
* Fixed static analysis warnings. (PR #20)
@@ -215,7 +229,7 @@ Adds support for the Microchip ATTPM20 TPM 2.0 module and Barebox bootloader. Im
215229
* Moved some of the example configuration into `./examples/tpm_io.h`. (PR #17)
216230

217231

218-
### wolfTPM Release 1.1 (03/09/2018)
232+
## wolfTPM Release 1.1 (03/09/2018)
219233

220234
* Added TPM2 wrapper layer to simplify key creation, RSA encrypt/decrypt, ECC sign/verify and ECDH.
221235
* Added TPM2 wrapper example code.
@@ -229,7 +243,7 @@ Adds support for the Microchip ATTPM20 TPM 2.0 module and Barebox bootloader. Im
229243
* New tests for TPM2 native API's (test coverage is about 75%).
230244

231245

232-
### wolfTPM Release 1.0 (02/06/2018)
246+
## wolfTPM Release 1.0 (02/06/2018)
233247

234248
* Support for all TPM2 native API's using TIS and SPI IO callback.
235249
* Helper for getting TPM return code string `TPM2_GetRCString`.

IDE/OPENSTM32/Inc/wolftpm_example.h

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
/* wolftpm_example.h
22
*
3-
* Copyright (C) 2006-2020 wolfSSL Inc.
3+
* Copyright (C) 2006-2021 wolfSSL Inc.
44
*
55
* This file is part of wolfTPM.
66
*

IDE/OPENSTM32/Src/main.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
/* main.c
22
*
3-
* Copyright (C) 2006-2020 wolfSSL Inc.
3+
* Copyright (C) 2006-2021 wolfSSL Inc.
44
*
55
* This file is part of wolfTPM.
66
*

IDE/OPENSTM32/Src/wolftpm_example.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
/* wolftpm_example.c
22
*
3-
* Copyright (C) 2006-2020 wolfSSL Inc.
3+
* Copyright (C) 2006-2021 wolfSSL Inc.
44
*
55
* This file is part of wolfTPM.
66
*

configure.ac

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
# wolftpm
2-
# Copyright (C) 2020 wolfSSL Inc.
2+
# Copyright (C) 2021 wolfSSL Inc.
33
# All right reserved.
44

5-
AC_COPYRIGHT([Copyright (C) 2014-2020 wolfSSL Inc.])
6-
AC_INIT([wolftpm],[2.0.0],[https://github.com/wolfssl/wolfTPM/issues],[wolftpm],[http://www.wolfssl.com])
5+
AC_COPYRIGHT([Copyright (C) 2014-2021 wolfSSL Inc.])
6+
AC_INIT([wolftpm],[2.1.0],[https://github.com/wolfssl/wolfTPM/issues],[wolftpm],[http://www.wolfssl.com])
77

88
AC_PREREQ([2.63])
99
AC_CONFIG_AUX_DIR([build-aux])
@@ -23,7 +23,7 @@ AC_ARG_PROGRAM
2323
AC_CONFIG_MACRO_DIR([m4])
2424
AC_CONFIG_HEADERS([src/config.h])
2525

26-
WOLFTPM_LIBRARY_VERSION=10:0:0
26+
WOLFTPM_LIBRARY_VERSION=11:0:0
2727
# | | |
2828
# +------+ | +---+
2929
# | | |
@@ -392,7 +392,7 @@ rm -f $OPTION_FILE
392392
echo "/* wolftpm options.h" > $OPTION_FILE
393393
echo " * generated from configure options" >> $OPTION_FILE
394394
echo " *" >> $OPTION_FILE
395-
echo " * Copyright (C) 2006-2020 wolfSSL Inc." >> $OPTION_FILE
395+
echo " * Copyright (C) 2006-2021 wolfSSL Inc." >> $OPTION_FILE
396396
echo " *" >> $OPTION_FILE
397397
echo " * * This file is part of wolfTPM." >> $OPTION_FILE
398398
echo " *" >> $OPTION_FILE

examples/bench/bench.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
/* bench.c
22
*
3-
* Copyright (C) 2006-2020 wolfSSL Inc.
3+
* Copyright (C) 2006-2021 wolfSSL Inc.
44
*
55
* This file is part of wolfTPM.
66
*

examples/bench/bench.h

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
/* bench.h
22
*
3-
* Copyright (C) 2006-2020 wolfSSL Inc.
3+
* Copyright (C) 2006-2021 wolfSSL Inc.
44
*
55
* This file is part of wolfTPM.
66
*

examples/csr/csr.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
/* csr.c
22
*
3-
* Copyright (C) 2006-2020 wolfSSL Inc.
3+
* Copyright (C) 2006-2021 wolfSSL Inc.
44
*
55
* This file is part of wolfTPM.
66
*

examples/csr/csr.h

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
/* csr.h
22
*
3-
* Copyright (C) 2006-2020 wolfSSL Inc.
3+
* Copyright (C) 2006-2021 wolfSSL Inc.
44
*
55
* This file is part of wolfTPM.
66
*

examples/keygen/keygen.c

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -146,11 +146,11 @@ int TPM2_Keygen_Example(void* userCtx, int argc, char *argv[])
146146
/* Did the user provide specific options? */
147147
if (argv[argc-1][SYM_EXTRA_OPTS_POS] == '=') {
148148
rc = symChoice(argv[argc-1], &algSym, &keyBits, symMode);
149-
}
150-
/* In case of incorrect extra options, abort execution */
151-
if (rc != TPM_RC_SUCCESS) {
152-
usage();
153-
return 0;
149+
/* In case of incorrect extra options, abort execution */
150+
if (rc != TPM_RC_SUCCESS) {
151+
usage();
152+
return 0;
153+
}
154154
}
155155
/* Otherwise, defaults are used: AES CTR, 256 key bits */
156156
}

0 commit comments

Comments
 (0)