·
37 commits
to master
since this release
Summary
This release contains many new features so that it can be the PKCS11 backend for NSS. It also includes many bug fixes.
Detail
- New examples added
- Added certificate storage for wolfPKCS11
- Added new AES algorithms:
AES-CCMAES-ECBAES-CTSAES-CTR
- Compiler fixes
- Large improvements to TPM storage
- Reduced memory usage for objects
- Added support for MAXQ1065
- Fixed RSA with no public exponent provided
- Fixed
CKA_CERTIFICATE_TYPEsearch forCKC_X_509 - Fixed RSA with no modulus provided
- Fixed bad memory access with
C_FindObjectson a certificate object - Added new functionality:
C_Digest*C_SignEncryptUpdateC_DecryptVerifyUpdateC_GetOperationStateandC_SetOperationState(Digest only)C_SignRecoverInitandC_VerifyRecoverwolfPKCS11_Debugging_OnandwolfPKCS11_Debugging_Off
- Added new mechanisms:
CKM_ECDSA_SHA*CKM_SHA*_RSA*CKM_AES_CMAC_GENERALCKM_AES_CMACCKM_AES_CBC_ENCRYPT_DATACKM_HKDF_DATACKM_HKDF_KEY_GENCKM_TLS12_KEY_AND_MAC_DERIVECKM_TLS12_MASTER_KEY_DERIVECKM_TLS12_MASTER_KEY_DERIVE_DHCKM_NSS_TLS_EXTENDED_MASTER_KEY_DERIVE(NSS builds only)CKM_NSS_TLS_EXTENDED_MASTER_KEY_DERIVE_DH(NSS builds only)CKM_NSS_TLS_PRF_GENERAL_SHA256(NSS builds only)CKM_TLS_MACCKM_SHA1_RSA_PKCSCKM_SHA1_RSA_PKCS_PSSCKM_SHA3*CKM_MD5CKM_NSS_PKCS12_PBE_SHA*_HMAC_KEY_GEN(NSS builds only)CKM_PKCS5_PBKD2
- Added new types:
CKO_DATACKO_NSS_TRUST(NSS builds only)
- Added new attributes:
CKA_CERTIFICATE_TYPECKA_CERTIFICATE_CATEGORYCKA_IDCKA_ISSUERCKA_SERIAL_NUMBERCKA_PUBLIC_KEY_INFOCKA_URLCKA_HASH_OF_SUBJECT_PUBLIC_KEYCKA_HASH_OF_ISSUER_PUBLIC_KEYCKA_NAME_HASH_ALGORITHMCKA_CHECK_VALUECKA_CERT_SHA1_HASH(NSS builds only)CKA_CERT_MD5_HASH(NSS builds only)CKA_TRUST_SERVER_AUTH(NSS builds only)CKA_TRUST_CLIENT_AUTH(NSS builds only)CKA_TRUST_EMAIL_PROTECTION(NSS builds only)CKA_TRUST_CODE_SIGNING(NSS builds only)CKA_TRUST_STEP_UP_APPROVED(NSS builds only)CKA_NSS_EMAIL(NSS builds only)CKA_NSS_DB(NSS builds only, not stored)
- Added SHA3 support for digest and HMAC
- Added AES key gen and key wrap
- Added
--enable-nssfor NSS specific PKCS11 quirks - Fixed ECC derive key curve error
- Fixed object boolean attributes and permissions
- Fixed
C_SetAttributeValuesometimes erasing keys - Fixed wolfCrypt FIPSv5 and FIPSv6 support
- Fixed token erasure on load error
- Fixed various memory leaks
- Complete re-write of file based token path handling
- Added debugging output
- Fixed visibility issues
- Fixed x963 usage for ECC keys
- Added support for older wolfSSL versions
- Fixed token overwriting previous objects
- Fixed token load error handling
- Improved error handling for
C_Login - Improved Debian packaging
- Fixed build issues with wolfBoot
- Fixed
malloc(0)code path - Fixed
C_CopyObjectnot doing a deep copy - Added
CKM_RSA_PKCSto wrap / unwrap - Fixed ECC curve lookup for FIPSv5
- Fixed default attributes for keys
C_DestroyObjectnow deletes files instead of leaving truncated files- Added support for STM32U5 DHUK wrapping
- Added PBKDF2 support for pins
- Enabled by default for FIPS
- Enabled using
--enable-pbkdf2or definingWOLFPKCS11_PBKDF2
- Added
--pbkdf2-iterationsandPBKDF2_ITERATIONSto set the number of
PBKDF2 iterations for pin handling (default 600,000).