Fabian Kaczmarczyck
9c673844d5
improved documentation, especially with regards to the extension
2020-07-09 19:06:42 +02:00
Fabian Kaczmarczyck
04278d91d8
adds code style improvements, including a new enum for permissions
2020-07-08 16:17:15 +02:00
Fabian Kaczmarczyck
3b6615520f
adds clarifications, improvements and tests
2020-07-06 12:39:52 +02:00
Fabian Kaczmarczyck
26595db810
adds new client Pin subcommand minPinLength implementation
2020-07-02 19:43:14 +02:00
Fabian Kaczmarczyck
9ff988d3a7
refactors the client PIN implementation into a new module
2020-07-02 19:30:15 +02:00
Julien Cretin
46df22fa7c
Remove unnecessary lifetime name
2020-06-19 17:40:24 +02:00
Julien Cretin
a0fe66d7ed
Merge branch 'master' into aaguid
2020-06-09 11:56:05 +02:00
Julien Cretin
935ccf3668
Revert "Propagate the NBYTES constant from Int256 to SecKey"
...
This reverts commit 0073c153d2 .
2020-06-09 11:55:36 +02:00
Julien Cretin
0073c153d2
Propagate the NBYTES constant from Int256 to SecKey
2020-06-04 14:32:04 +02:00
kaczmarczyck
0aa6e57d93
Merge branch 'master' into cred-protect
2020-06-04 14:10:12 +02:00
Julien Cretin
acd9d93107
Merge branch 'master' into aaguid
2020-06-03 11:26:59 +02:00
Julien Cretin
d74a5e8894
Add setter functions and fix tests
2020-06-02 11:35:17 +02:00
Julien Cretin
5f8cb116a5
Only write attestation if compiled with batch attestation
2020-06-02 11:00:26 +02:00
Julien Cretin
98a558a502
Access the persistent keys through the store
...
This permits to set them using a vendor command and thus not embed their value
in the application.
2020-05-30 20:15:59 +02:00
Fabian Kaczmarczyck
a95ef72a93
improved testing, addresses comments and a default level fix
2020-05-25 19:56:29 +02:00
Fabian Kaczmarczyck
43d77fd106
implements the credProtect extension
2020-05-13 16:38:14 +02:00
Julien Cretin
ecf02eb6ce
Only store the storage location in the Kernel
2020-05-08 17:00:59 +02:00
Julien Cretin
5c2b72ce83
Move storage bound checking to driver
2020-04-29 15:09:50 +02:00
Julien Cretin
892f950cc1
Add missing cfg
2020-04-29 12:59:22 +02:00
Julien Cretin
6247098069
Do not use writeable flash regions for persistent storage
...
They don't play well with DFU.
2020-04-29 12:52:31 +02:00
Julien Cretin
e1fa8549e1
Merge branch 'master' into wipe
2020-03-18 10:59:24 +01:00
Fabian Kaczmarczyck
8d52e8aad7
adding HMAC-secret support
2020-03-12 16:37:48 +01:00
Julien Cretin
61a4fb9784
Wipe sensitive data on entry deletion
...
When inserting (or replacing) entries in the store, the data may be marked as
sensitive. When that entry is deleted, the data is wiped by overwritting it with
zeroes. This may cost a few bytes of overhead per entry with sensitive data to
satisfy the constraint that words may only be written twice.
2020-03-10 14:27:07 +01:00
Julien Cretin
e52a671810
Support storing in RAM instead of flash
...
This permits to run without persistent storage. The benefit is that the board
doesn't implement a the syscall API in Tock. The disadvantage is that rebooting
the key will reset the storage.
2020-03-04 16:24:06 +01:00
Jean-Michel Picod
f91d2fd3db
Initial commit
2020-01-30 11:47:29 +01:00