[Microchip TA-100] Fix port + update to cryptoauthlib v3.6.0#9702
[Microchip TA-100] Fix port + update to cryptoauthlib v3.6.0#9702danielinux wants to merge 14 commits intowolfSSL:masterfrom
Conversation
03c4ab8 to
199c152
Compare
There was a problem hiding this comment.
Pull request overview
Copilot reviewed 19 out of 19 changed files in this pull request and generated 11 comments.
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
|
Jenkins retest this please. |
f6c5f77 to
81086ff
Compare
|
Jenkins retest this please |
|
@danielinux Please rebase and squash this. Hopefully that will resolve things. |
81086ff to
36b0e21
Compare
|
@tmael can you please help get this PR rebased, merge conflicts resolved and ready for merge? This work has been lingering for way too long. |
|
Jenkins retest this please |
|
@tmael please change build errors. Might just need to rebase and force push. |
- Using correct slot ID for AES keys - Adjust IV length - Fallback operations to software for unsupported ECC curves (all tests passing)
ECC384 should be supported in TA-100
…e AS_IF to conditionally run the manual search fallback
…kg.m4 is unavailable
…#ifndef WOLFSSL_MICROCHIP_TA100
dgarske
left a comment
There was a problem hiding this comment.
Unrecognized macros used (new macros not registered in .wolfssl_known_macro_extras):
ATCA_HAL_I2C
ATCA_TFLEX_SUPPORT
ATECC_DEV_TYPE
TA100_ECC_TRACE
WOLFSSL_MANUALLY_SELECT_DEVICE_CONFIG
WOLFSSL_MICROCHIP_AESGCM
WOLFSSL_NO_DEL_HANDLE
Fix: Update .wolfssl_known_macro_extras in the PR branch:
Description
Rework of TA-100 support to match cryptoauthlib v3.6.0's API. AES-GCM now working.
Fixes zd#20640
Testing
Used wolfDemo board (STM32U585) + TA100 mikrobus module.
Test log (with verbose TA-100 interactions) attached.
test_12a16e6cc.log