@@ -108,6 +108,113 @@ Set to any value to stop storage of token data.
108108
109109## Release Notes
110110
111+ ### wolfPKCS11 Release 2.0 (August 26, 2025)
112+
113+ ** Summary**
114+
115+ This release contains many new features so that it can be the PKCS11 backend for NSS. It also includes many bug fixes.
116+
117+ ** Detail**
118+
119+ * New examples added
120+ * Added certificate storage for wolfPKCS11
121+ * Added new AES algorithms:
122+ - ` AES-CCM `
123+ - ` AES-ECB `
124+ - ` AES-CTS `
125+ - ` AES-CTR `
126+ * Compiler fixes
127+ * Large improvements to TPM storage
128+ * Reduced memory usage for objects
129+ * Added support for MAXQ1065
130+ * Fixed RSA with no public exponent provided
131+ * Fixed ` CKA_CERTIFICATE_TYPE ` search for ` CKC_X_509 `
132+ * Fixed RSA with no modulus provided
133+ * Fixed bad memory access with ` C_FindObjects ` on a certificate object
134+ * Added new functionality:
135+ - ` C_Digest* `
136+ - ` C_SignEncryptUpdate `
137+ - ` C_DecryptVerifyUpdate `
138+ - ` C_GetOperationState ` and ` C_SetOperationState ` (Digest only)
139+ - ` C_SignRecoverInit ` and ` C_VerifyRecover `
140+ - ` wolfPKCS11_Debugging_On ` and ` wolfPKCS11_Debugging_Off `
141+ * Added new mechanisms:
142+ - ` CKM_ECDSA_SHA* `
143+ - ` CKM_SHA*_RSA* `
144+ - ` CKM_AES_CMAC_GENERAL `
145+ - ` CKM_AES_CMAC `
146+ - ` CKM_AES_CBC_ENCRYPT_DATA `
147+ - ` CKM_HKDF_DATA `
148+ - ` CKM_HKDF_KEY_GEN `
149+ - ` CKM_TLS12_KEY_AND_MAC_DERIVE `
150+ - ` CKM_TLS12_MASTER_KEY_DERIVE `
151+ - ` CKM_TLS12_MASTER_KEY_DERIVE_DH `
152+ - ` CKM_NSS_TLS_EXTENDED_MASTER_KEY_DERIVE ` (NSS builds only)
153+ - ` CKM_NSS_TLS_EXTENDED_MASTER_KEY_DERIVE_DH ` (NSS builds only)
154+ - ` CKM_NSS_TLS_PRF_GENERAL_SHA256 ` (NSS builds only)
155+ - ` CKM_TLS_MAC `
156+ - ` CKM_SHA1_RSA_PKCS `
157+ - ` CKM_SHA1_RSA_PKCS_PSS `
158+ - ` CKM_SHA3* `
159+ - ` CKM_MD5 `
160+ - ` CKM_NSS_PKCS12_PBE_SHA*_HMAC_KEY_GEN ` (NSS builds only)
161+ - ` CKM_PKCS5_PBKD2 `
162+ * Added new types:
163+ - ` CKO_DATA `
164+ - ` CKO_NSS_TRUST ` (NSS builds only)
165+ * Added new attributes:
166+ - ` CKA_CERTIFICATE_TYPE `
167+ - ` CKA_CERTIFICATE_CATEGORY `
168+ - ` CKA_ID `
169+ - ` CKA_ISSUER `
170+ - ` CKA_SERIAL_NUMBER `
171+ - ` CKA_PUBLIC_KEY_INFO `
172+ - ` CKA_URL `
173+ - ` CKA_HASH_OF_SUBJECT_PUBLIC_KEY `
174+ - ` CKA_HASH_OF_ISSUER_PUBLIC_KEY `
175+ - ` CKA_NAME_HASH_ALGORITHM `
176+ - ` CKA_CHECK_VALUE `
177+ - ` CKA_CERT_SHA1_HASH ` (NSS builds only)
178+ - ` CKA_CERT_MD5_HASH ` (NSS builds only)
179+ - ` CKA_TRUST_SERVER_AUTH ` (NSS builds only)
180+ - ` CKA_TRUST_CLIENT_AUTH ` (NSS builds only)
181+ - ` CKA_TRUST_EMAIL_PROTECTION ` (NSS builds only)
182+ - ` CKA_TRUST_CODE_SIGNING ` (NSS builds only)
183+ - ` CKA_TRUST_STEP_UP_APPROVED ` (NSS builds only)
184+ - ` CKA_NSS_EMAIL ` (NSS builds only)
185+ - ` CKA_NSS_DB ` (NSS builds only, not stored)
186+ * Added SHA3 support for digest and HMAC
187+ * Added AES key gen and key wrap
188+ * Added ` --enable-nss ` for NSS specific PKCS11 quirks
189+ * Fixed ECC derive key curve error
190+ * Fixed object boolean attributes and permissions
191+ * Fixed ` C_SetAttributeValue ` sometimes erasing keys
192+ * Fixed wolfCrypt FIPSv5 and FIPSv6 support
193+ * Fixed token erasure on load error
194+ * Fixed various memory leaks
195+ * Complete re-write of file based token path handling
196+ * Added debugging output
197+ * Fixed visibility issues
198+ * Fixed x963 usage for ECC keys
199+ * Added support for older wolfSSL versions
200+ * Fixed token overwriting previous objects
201+ * Fixed token load error handling
202+ * Improved error handling for ` C_Login `
203+ * Improved Debian packaging
204+ * Fixed build issues with wolfBoot
205+ * Fixed ` malloc(0) ` code path
206+ * Fixed ` C_CopyObject ` not doing a deep copy
207+ * Added ` CKM_RSA_PKCS ` to wrap / unwrap
208+ * Fixed ECC curve lookup for FIPSv5
209+ * Fixed default attributes for keys
210+ * ` C_DestroyObject ` now deletes files instead of leaving truncated files
211+ * Added support for STM32U5 DHUK wrapping
212+ * Added PBKDF2 support for pins
213+ - Enabled by default for FIPS
214+ - Enabled using ` --enable-pbkdf2 ` or defining ` WOLFPKCS11_PBKDF2 `
215+ * Added ` --pbkdf2-iterations ` and ` PBKDF2_ITERATIONS ` to set the number of
216+ PBKDF2 iterations for pin handling (default 600,000).
217+
111218### wolfPKCS11 Release 1.3 (Mar 22, 2024)
112219
113220** Summary**
0 commit comments