Cryptoauthlib

Latest version: v20230326

Safety actively analyzes 630130 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 2 of 3

3.2.5

New features
- Converted from travis-ci and appveyor to github actions workflows
- AES CCM & CBC-MAC upper layer API using AES-ECB primitives
- Additional software crypto library interface functions for asymmetric cryptography (sign, verify, ecdh, etc) for mbedtls integrations
- XC8 & XC16 compiler support

Fixes
- PKCS11 Pin length check rejecting valid pin lengths
- aes-gcm nist vector test failed with mbedtls crypto backend due to aad update not being executed when aad length was zero

3.2.4

New features
- Additional TA100 command support (requires NDA, consult with your FAE or submit a request through your myMicrochip account)
- Library build and install on linux now also installs the headers that were used to build the library including all configuration files like atca_config.h - customer applications building against the library will need to add the include/cryptoauthlib to their include search paths

Fixes
- Fixed errors produced when -fno-common was used during build of the library by resolving the variable declaration and exporting macros (tested with static/dynamic linkage on linux & windows platforms)
- Added a timeout during i2c plib commands in the Harmony3 hals to prevent system lockups from failed peripheral transfers that don't return errors.

3.2.3

Fixes
- Security patch for USB HALs. Removed deprecated HALs and removed enumeration from the hidapi HAL. Special thanks to Ruben Santamarta of [IOActive](https://blogs.ioactive.com/) for reporting
- Fix device matching logic to support older kits when using "auto detect" settings in the interface configuration
- Fix SPI HAL generation errors for SAMG55 & SAM71 (flexcom) devices
- Added a timeout for Harmony I2C calls to prevent infinite loops on peripheral failures. If a loop exists inside the peripheral library then it may still cause processor spins until a watchdog reset.

3.2.2

New Features
- ATECC608B support added

Fixes
- Consistent null pointer checks between calib & talib apis. Tracing enabled for most all status changes
- Fix for pkcs11 ecdh with the legacy slot write mode and encrypted read to pull the read key id from the correct slot (private key slot | 0x01)
- call the proper api from atcab_init_ext so it works with device structures that are not the global instance

3.2.1

Improvements
* PKCS11 configuration option to set token label to the device serial number

Fixes
* Fix OSX CLANG macro error
* Add missing c++ wrapper macros to calib_basic.h
* Ensure atcab_init_ext calls atcab_release_ext rather than atcab_release

3.2.0

- Extension of the existing API to support device context retention to allow
multiple independent contexts to be maintained. The application still needs
to ensure concurrency protections are used in the application to guard bus
communication.
- PKCS11 support has been moved into the main library and will be maintained
together.
- TNG/TFLEX support has been added to PKCS11 so enabling a TNG part in pkcs11
can be done by specifying the part number: `device = ATECC608A-TNGTLS`
- Several cryptographic library integrations have been added to enable
additional host/mcu side functionality. This includes replacing cryptoauthlib
software implementations of sha1 & sha256 with your preferred library. For
example using WolfSSL in Harmony 3 will also enable hardware acceleration of
those cryptographic functions. Cryptographic libraries enabled: WolfSSL,
mbedTLS, & OpenSSL
- Changes to atcacert ("compressed" certificate processing) to enable exact
certificate size retrival which will help with some use cases that had issues
with the max possible size answers.
- Consolidation of HALs into device families rather than exact processor model
This should reduce the amount of effort required to port the library to a
specific platform if the framework is one that is already known.

Page 2 of 3

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.