From 2aeab31c8c9142d2b6f71bf39560baba4a926073 Mon Sep 17 00:00:00 2001 From: Tom Hochstein Date: Fri, 23 Jul 2021 09:26:12 -0500 Subject: imx-seco-libs: Upgrade to NXP release 5.10.35-2.0.0 44caf51 HSM-590: license update 9da5d5a V2XA-687: add the support of BR256T1 to key exchange 0d5b232 HSM-558: hsm_prepare_signature specify max number of pre-calculated values 4bddb34 V2XA-687: remove BR256T1 support from some API 501203b V2XA-654: add tests for standalone butterfly key expansion a5620c0 V2XA-654: standalone butterfly key expansion 784f861 V2XA-654: standalone butterfly key expansion API ecf2715 V2XA-648: add SM2 support to butterfly key expansion and pubk reconstruction services 35bfeaa HSM-555: fix indentation 7f37241 HSM-555 reopen nvm session when read fail from mu 2bea9d9 HSM-557: fix segment fault when run not in root 00ab3f1 HSM-552: specify min_mac_len FIPS approved mode constraints c565919 HSM-524: she_api_document 1.3 hsm_api_document 3.7 105951b V2XA-567: remove tests refering to previous implementation b6e84aa Key exchange for KEK generation supported on QXP. 789544a V2XA-628: initialize missing fields in key_exchange API calls 01f19fb HSM-476: allow V2X abort respons (2 words) 713dd56 HSM-476: add FATAL error definition 56c0427 HSM-461: Clarify that auth_enc IV flags are only for encryption operations 4d06665 HSM-476: allow retries on NVM errors eb50867 HSM-481: clarify hsm_tls_finish support b927ff4 HSM-481: hsm_api_document 3.2 amendment fc52d67 HSM-473: fix build c4e40e4 V2XA-567: add tests for AES GCM IV enhancement a51e6ad HSM-473: Add support for per-key min mac length 7069412 HSM-461: specify IV constraints for key injection 8f88b3b HSM-461: doc updates 5731389 HSM-461: Reformat revision history entry for version 3.3 831d398 HSM-461: Clarify API usage for auth_enc based on review comments e4c87f4 HSM-461: Add enhancements to AES GSM IV generation fe47c46 HSM-460: Specify that TLS_FINISH flags are not supported for DXL a56da9c HSM-460: Add EMS option in key exchange for TLS KDF 55c8e04 HSM-454: Add hsm_tls_finish message, update hsm_key_exchange usage Signed-off-by: Tom Hochstein --- recipes-bsp/imx-seco/imx-seco-libs_git.bb | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) (limited to 'recipes-bsp/imx-seco/imx-seco-libs_git.bb') diff --git a/recipes-bsp/imx-seco/imx-seco-libs_git.bb b/recipes-bsp/imx-seco/imx-seco-libs_git.bb index af51529b..41128e28 100644 --- a/recipes-bsp/imx-seco/imx-seco-libs_git.bb +++ b/recipes-bsp/imx-seco/imx-seco-libs_git.bb @@ -1,17 +1,17 @@ -# Copyright (C) 2019-2020 NXP +# Copyright (C) 2019-2021 NXP SUMMARY = "NXP i.MX SECO library" DESCRIPTION = "NXP i.MX Security Controller library" SECTION = "base" LICENSE = "Proprietary" -LIC_FILES_CHKSUM = "file://EULA.txt;md5=228c72f2a91452b8a03c4cab30f30ef9" +LIC_FILES_CHKSUM = "file://EULA.txt;md5=85d06b38f17b935ca11784d67075b846" DEPENDS = "zlib" -SRCBRANCH = "imx_5.4.70_2.3.1" +SRCBRANCH = "lf-5.10.y_2.0.0" SRC_URI = "git://github.com/NXP/imx-seco-libs.git;protocol=https;branch=${SRCBRANCH} \ file://0002-Makefile-Fix-install-to-clear-host-user-contaminated.patch" -SRCREV = "79e5fb5d096c61b1c3163c9fa8e42719509d95a0" +SRCREV = "44caf511023012e9eda93f8bf64c90eaff1bade6" S = "${WORKDIR}/git" -- cgit v1.2.3-54-g00ecf