Skip to content

Commit 7c81d6a

Browse files
authored
Merge pull request #567 from danielinux/prepare-release-2.5.0
Preparing release 2.5.0
2 parents 21a726a + d587a79 commit 7c81d6a

File tree

9 files changed

+46
-12
lines changed

9 files changed

+46
-12
lines changed

.github/workflows/test-wolfhsm-simulator.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,8 @@ jobs:
5454
with:
5555
repository: wolfssl/wolfHSM-examples
5656
# Make sure to update this when the wolfHSM submodule is updated!
57-
ref: wolfHSM-v1.1.0
57+
#ref: wolfHSM-v1.1.0
58+
ref: 3e03bd4d4a8439ed4a8a9577823c89e4c37eb9be
5859
path: wolfHSM-examples
5960

6061
- name: Build example POSIX TCP server

README.md

Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -685,3 +685,35 @@ Use `make keysclean` to delete keys and regenerate.
685685
* wolfPKCS11 latest
686686
* wolfHSM latest
687687

688+
### V 2.5.0 - (2025-05-05)
689+
* New hardware targets
690+
* RP2350 (Raspberry Pi Pico 2, ARM Cortex-M33 with TrustZone)
691+
* NXP MCXA153
692+
* NXP MCXW716
693+
* STM32F1 series (STM32F103 “Blue Pill” board)
694+
* Improvements to supported targets
695+
* Xilinx UltraScale+ (ZynqMP)
696+
* Added hardware-accelerated SHA3 hashing via the CSU engine
697+
* Added support for enabling JTAG at runtime when `CSU_DEBUG` is set
698+
* Introduced support for the device’s PUF (Physically Unclonable Function) for unique key generation and secure key storage (requires eFuses)
699+
* Renesas RX
700+
* Added option for TSIP hardware crypto engine
701+
* Infineon TriCore (AURIX TC3xx)
702+
* Updated IDE project files for ARM Developer Studio 1.10.6, fixing build issues and ensuring support for latest toolchain
703+
* Fix to support write operations spanning over multiple sectors
704+
* New features and improvements
705+
* Added support for non-contiguous elf sections, scattered elf firmware loading and verification.
706+
* PQC: Simplified LMS/XMSS integration, deprecated support for third-party libraries
707+
* Support to build wolfBoot as a static library (`libwolfboot.a`) for easier integration and testing of the bootloader logic in custom workflows
708+
* Extended support for ARMORED glitch mitigations to the IAR toolchain
709+
* CMake build refactoring, extended support to more targets
710+
* Various documentation and configuration improvements
711+
* Bug fixes
712+
* Fix alignment enforcement on IAR compiler
713+
* Fix build error on Windows in key generation tool (`_chsize_s` declaration issue in `sign.c`)
714+
* Updated modules
715+
* wolfSSL v5.8.0
716+
* wolfTPM v3.9.0
717+
* wolfPKCS11 latest
718+
* wolfHSM latest
719+

include/user_settings.h

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -144,6 +144,7 @@ extern int tolower(int c);
144144
# define WOLFSSL_HAVE_SP_ECC
145145
# endif
146146

147+
#define WOLFSSL_PUBLIC_MP
147148

148149
/* Curve */
149150
# if defined(WOLFBOOT_SIGN_ECC256) || defined(WOLFCRYPT_SECURE_MODE) || \

include/wolfboot/version.h

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,8 +29,8 @@ extern "C" {
2929
#endif
3030

3131

32-
#define LIBWOLFBOOT_VERSION_STRING "2.4.0"
33-
#define LIBWOLFBOOT_VERSION_HEX 0x02040000
32+
#define LIBWOLFBOOT_VERSION_STRING "2.5.0"
33+
#define LIBWOLFBOOT_VERSION_HEX 0x02050000
3434

3535
#ifndef WOLFBOOT_VERSION
3636
#define WOLFBOOT_VERSION LIBWOLFBOOT_VERSION_HEX

lib/wolfHSM

Submodule wolfHSM updated 67 files

lib/wolfssl

Submodule wolfssl updated 1168 files

tools/test.mk

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -990,9 +990,9 @@ test-size-all:
990990
make keysclean
991991
make test-size SIGN=ED25519 LIMIT=11448 NO_ARM_ASM=1
992992
make keysclean
993-
make test-size SIGN=ECC256 LIMIT=17968 NO_ARM_ASM=1
993+
make test-size SIGN=ECC256 LIMIT=17988 NO_ARM_ASM=1
994994
make clean
995-
make test-size SIGN=ECC256 NO_ASM=1 LIMIT=13512 NO_ARM_ASM=1
995+
make test-size SIGN=ECC256 NO_ASM=1 LIMIT=13536 NO_ARM_ASM=1
996996
make keysclean
997997
make test-size SIGN=RSA2048 LIMIT=11232 NO_ARM_ASM=1
998998
make clean
@@ -1002,9 +1002,9 @@ test-size-all:
10021002
make clean
10031003
make test-size SIGN=RSA4096 NO_ASM=1 LIMIT=12096 NO_ARM_ASM=1
10041004
make keysclean
1005-
make test-size SIGN=ECC384 LIMIT=17536 NO_ARM_ASM=1
1005+
make test-size SIGN=ECC384 LIMIT=17556 NO_ARM_ASM=1
10061006
make clean
1007-
make test-size SIGN=ECC384 NO_ASM=1 LIMIT=14904 NO_ARM_ASM=1
1007+
make test-size SIGN=ECC384 NO_ASM=1 LIMIT=14924 NO_ARM_ASM=1
10081008
make keysclean
10091009
make test-size SIGN=ED448 LIMIT=13464 NO_ARM_ASM=1
10101010
make keysclean
@@ -1018,7 +1018,7 @@ test-size-all:
10181018
make keysclean
10191019
make test-size SIGN=XMSS XMSS_PARAMS='XMSS-SHA2_10_256' \
10201020
IMAGE_SIGNATURE_SIZE=2500 IMAGE_HEADER_SIZE?=4096 \
1021-
LIMIT=8252 NO_ARM_ASM=1
1021+
LIMIT=8292 NO_ARM_ASM=1
10221022
make keysclean
10231023
make clean
10241024
make test-size SIGN=ML_DSA ML_DSA_LEVEL=2 LIMIT=20168 \

0 commit comments

Comments
 (0)