All notable changes to this project will be documented in this file.
Starting with release 1.8.0, The format is based on Keep a Changelog, and this project adheres to Semantic Versioning.
- configure:
- Change mistaken
+=
to=
. - use user supplied
--prefix
even when p11kit is detected.
- Change mistaken
- Remove warning about unable to find FAPI when it's is not-compiled in and not chosen as the beckend.
- Fix memory leaks in
tpm_create_transient_primary_from_template
. - Fix
NULL
pointer dereference indb.c
on uses ofCKA_ALLOWED_MECHANISMS
. - Fix offset miscalculation in FAPI backend that was corrupting data.
- Support
CKM_ECDH1_DERIVE
viaC_DeriveKey
. - Fix usages of
tpm2-ptool
for its wrappedtpm2_ptool
in tests. - Fix failing db upgrades on double conversion to int.
- Fix db lock file due to missing parenthesis and order of operations.
- documentation:
- Fix use of objects where tokens was meant.
--enable-fapi
to--with-fapi
. Note this is not a major version bump as its internal to builders only. However--enable-fapi
left in place for backwards compat.
- Fix autoconf invocation on a release tarball not being a git repo for VERSION. VERSION file now generated and packaged as part of the release tarball from the git version information.
- Fix TPM2_PKCS11_OWNER_AUTH not being used when a persistent SRK is needed in the C_InitToken path.
- During an upgrade of the database to version 4, the config key 'persistent' is added instead of 'transient', causing KeyError when using the upgraded database.
- Leave the original db on upgrade failure, a bug caused the original db to be unlinked not the upgraded db.
- A bug prevented the use of CreateLoaded if the TPM supports the command.
- A bug when creating keys through the PKCS11 interface (not tpm2-ptool), the attributes for
CKA_ALLOWED_MECHANISMS
were encoded as a hex string and not a sequence of ints within the YAML. Correcting this will trigger a db upgrade to 8
- Env varibale
PKCS11_SQL_LOCK
to allow setting a lock directory, eg for temprary directory so lock files do not persist across reboots.
- Fix GetRandom Memory Leak
- Fix some spelling mistakes
- Fix unit test test_parser
- Fix importing of RSA private key through pkcs11 interface should fail.
- Fix ECDSA signature length calculation.
- Fix memory leak of tokens.
- Fix suspicious sizeof usage in _str_padded_copy
- Fix encoding errors when importing a certificate into the pkcs11 store.
- Fix try/finally scope issues in tpm2_ptool.
- Fix, an OOB access in db upgrade path.
- Fix ECDSA length calculation that was causing issues with Mutual TLS in Firefox and Chrome.
- remove unused macro set_safe_rc
- Add support for OpenSSL 3. Note that calls through engine are no longer supported on OpenSSL3.
- Add tpm2_ptool export commandlet for exporting token keys into PEM and TPM blob format.
- DB Schema Change from 5 to 7.
- Backup your DB before upgrading
- Fixed compilation issues with GCC11.
- Fixed errors on releases due to newer compilers from failing by only adding
-Werror
for non-release builds. - Fixed error message when the DB is too new in tpm2_ptool.
- Added support for tpm2_ptool import with ssh-keygen format keys. Note: Requires cryptography >= 3.0.
- Changed default long level from error to warning.
- Added better error message for FAPI backend errors along with docs/FAPI.md document.
- Changed
tpm2_ptool
make--algorithm
optional. - Fixed error message of wrong attribute name on expected attribute check to be false.
- Added support for ECDSA 256, 384 and 512.
- Fixed a bug in the Python code DB upgrade path from 4 to 5 where it didn't add AES mode CTR to CKA_ALLOWED_MECHANISMS.
- Added tpm2_ptool support for ECC key size 192.
- Added support passwordless login for tokens, ie not setting CKF_LOGIN_REQUIRED.
- Fixed Running integration tests when Java version has the
-ea
, like on Debian 11 and OpenJDK 17. - Added support for HMAC keys using tpm2_ptool and the C_Sign and C_Verify interfaces.
The following interfaces in ptool have support:
- addkey: previous working versions of tpm2-tools will support this.
- link: previous working versions of tpm2-tools will support this.
- import: requires tpm2-tools 5.2+ for support.
- Fixed leaking of temp file descriptors in tpm2_ptool.
- Fixed wrong free in tpm code, should use Esys_Free.
- Fixed a space formatting issue in tpm2_ptool verify.
- Fixed leaked file descriptor in tpm2_ptool.
- Fixed a few suspicious sizeof usages in str_padded_copy
- Fixed a memory leak of the token list on a failure condition in initialization.
- Spelling and grammar fixes throughout the project.
- tpm2_ptool: fix bug in verify commandlet where
--sopin
leads to local variable referenced before assignment. See #624. - Docs: add a document describing SSH Hostkey configuration using tpm2-pkcs11.
- Support changes in tpm2-tss-engine using TPM2_RH_OWNER instead of 0.
- Since upstream commit tpm2-software/tpm2-tss-engine@06f57a3.
- Fix endian issue in test_db.
- Fix tpm2_ptool error messages when exceptions are raised during execution of tpm2-tools commands.
- Support CKA_DERIVE=true which will support the newest pkcs11-tool EC template.
- Fix requirement of having ESYS >= 2.4, see #632 for details.
- Fix docs/INITIALIZING.md reference to
--pobj-pin
, should be--hierarchy-auth
. - Fix missing libyaml dependency in documentation.
- Fix bug in DB update logic where errors in handlers were ignored.
- Fix NPD bug when ESAPI and FAPI return 0 tokens.
- Add support for over TPM sized AES buffers.
- Add support for mechanism CKM_AES_CBC_PAD.
- Add support for mechanism CKM_AES_CTR.
- Add support for RSA 3072 (3k) keys.
- Remove usage of function Esys_TR_GetTpmHandle. FAPI Backend will no longer depend on ESAPI 2.4 or greater.
- Add Experimental RSA 4096 support. Use at your own risk.
- C_Decrypt: Fix CKM_RSA_PKCS11 scheme not removing PKCS v1.5 block padding from returned plaintext.
- C_Digest/C_DigestFinal: Fix Section 5.2 style returns.
- C_OpenSession: fix valid session handles starting at 0, 0 is invalid per the spec.
- C_OpenSession: fix handle issuance bug where handles could be exhausted at out of bounds.
- Support swtpm in testing infrastructure.
- Fix C_Encrypt/C_Decrypt interface not setting size when output buffer in NULL.
- Fix warning ../configure: line 14383: ]: command not found
- Fix CKM_RSA_PKCS_PSS mechanism.
- C_GetMechanismList: Fix index 0 of the returned list being invalid.
- C_GetMechanismInfo: Fix errors like ERROR: Unknown mechanism, got: 0xd.
- Docs: use full paths from project root to help fix 404 errors.
- tpm2_ptool init to attempt to persistent created primary object at 0x81000001 and fallback to first available address on failure.
-
Fix superfluous error message when falling back from TPM2_EncryptDecrypt2 interface.
-
Support importing EC keys via tpm2_ptool import.
-
C_InitToken: Fix improper SRK handle of 0x81000000, it should be 0x81000001.
-
Fix a leak in in tpm.c of an EVP_PKEY object.
-
C_GenerateKeyPair: was not adding PSS signatures as supported by RSA objects, add it.
-
Fix PSS signatures. Non-FIPS mode TPMs produce PSS signatures with a max salt len that poses interoperability issues with verifying clients, notably TLS in OpenSSL.
-
Fix Java PKCS11 Provider Signature Verification: #401
-
VerifyRecover support, known working with Public Key RSA objects and mechanism CKM_RSA_PKCS.
-
db: Modify search and create behavior. See docs/INITIALIZING.md for details.
-
Fix printf(3) format specifier errors.
-
ci: increase CI coverage to: Fedora 30, Ubuntu 16.04, Ubuntu 18.04.
-
configure: check for Python version >= 3.7 and pass to Automake. No need to set PYTHON_INTERPRETER anymore.
-
Fix segfault/memory corruption bugs in C_Destroy().
-
Fix segfault when no user pin is provisioned.
-
Support C_SetAttributeValue.
-
Support for selectable backend using TPM2_PKCS11_BACKEND=esysdb being current version.
-
Support for backend fapi that uses the tss2-fapi keystore instead of an sqlite db.
- This is auto-detected based on tss2-fapi being installed at configure time, and can be controlled via --enable/disable-fapi.
-
C_CreateObject: Support for CKO_DATA objects only with CKA_PRIVATE set to CK_TRUE. Token defaults to CK_TRUE.
-
Fix: src/lib/ssl_util.c:555:54: error: passing argument 3 of ‘EVP_PKEY_verify_recover’ from incompatible pointer type
-
Added tpm2_ptool link commandlet for linking existing tpm2 objects into a compatible token. For details see this document.
Supported tpm2 objects are:
- serialized TPM2B_PUBLIC and TPM2B_PRIVATE data structures, as produced by tpm2_create -u and -r outputs respectively.
- PEM encoded keys produced by tpm2tss-genkey
- Fix C_InitToken, ensure no embedded nul byte.
- Fix free of mutex being held in C_InitToken failures: #573
- Fix C_Login CKU_USER login attempt before pin is setup: #563
- Fix C_InitToken double init issues #577
- Fix double free.
- C_CreateObject: Support for CKO_DATA objects only with CKA_PRIVATE set to CK_TRUE. Token defaults to CK_TRUE.
- Fix Tests against simulator that support RSA 3072 keys
- Fix PSS signatures. Non-FIPS mode TPMs produce PSS signatures with a max salt len that poses interoperability issues with verifying clients, notably TLS in OpenSSL.
- Handle Esys_LoadExternal() API change where the hierarchy handle switches to an ESYS_TR rather than a TPM2_RH_.
- test/pkcs-get-mechanism: allow a maximum key size of 3072 bits.
- DB Schema Change from 1 to 3.
- Backup your DB before upgrading
- Support C_InitToken interface.
- Add Java PKCS11 Keystore support for RSA/ECB/RSAPKCS1.5 via public encrypt and private decrypt.
- Decouple handles from db primary keys. Key handles are no longer stable between runs.
- tpm2_ptool objmod:
- Support adding an attribute.
- Fix bug in variable name vtype over type.
- C_Sign: support mechanism CKM_RSA_X_509.
- C_GetTokenInfo: add missing mechanism CKM_SHA512_RSA_PKCS.
- Fix store search logic to fail when TPM2_PKCS11_STORE cannot be accessed.
- Fix potential double free in token_free() logic.
- Fix -Werror=format-truncation with GCC >= 7 #415
- Fix uninitialized variable warnings #416
- test: use release tarball vs source code.
- build: clean leftover file in make clean.
- release: add missing tests to tarball no matter configure options.
- test: fix invalid flags on CKM_SHA512_RSA_PKCS causing test failures.
- Switch OASIS pkcs11 headers to FSF Unlimited License Headers.
- test/pkcs-get-mechanism: allow a maximum key size of 3072 bits.
- Fix build issue about unused variable config. Notably fixes gcc10 builds.
- stop linking against libdl
- add missing test integration scripts to dist tarball.
- Initial Release