Cryptoauthlib

Latest version: v20250217

Safety actively analyzes 722525 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 1 of 3

3.7.7

**New Features**

- Extended atcacert module to support compressed certificate usage for TA devices
- Enhanced WPC application to support TA devices
- Updated PKCS11 and Openssl wiki documentation to include steps for using Openssl 3.0+ versions
- Updated PKCS11 module to add compatibility for higher [SHA-2](https://bitbucket.microchip.com/plugins/servlet/jira-integration/issues/SHA-2) (SHA384 and SHA512) functions
- Added NIST vector tests to cover AES CCM module validation
- Modified calib packet allocation to use memory from either heap or data segment based on user configuration instead of always using data segment.

**Fixes**

- Resolved SWI 1-wire communication failure occuring in hal_swi_gpio while using MPLABx Harmony projects
- delay routines in hal_cortex_m_delay are optimized to generate accurate delays for SAM cortex-m device family
- removed call stack overhead in hal_swi_gpio to meet required SWI bit timing
- Minimum required version for CMake is changed from 3.0.1 to 3.10.0
- Fixed compilation issues with atcac_get_subj_public_key when WolfSSL configuration is enabled

**API CHANGES**

- Replaced I/O buffers in atcacert with cal_buffer at few instances to support resource-constrained PIC18 devices
- Refer [lib/atcacert/MIGRATION.md] for details on atcacert API changes

3.7.6

New Features
- Add support for RSA key types, certificates and algorithms
- Add SHA384 and SHA512 support for host side software crypto (lib/crypto/) operations
- Modified WPC application to support ECC204 and TA010 devices

Fixes
- Shared library build (libcryptoauth.so) sets ABI version number (libcryptoauth.so.x)
- Fix atcacert_read_cert() API failure while using ECC204 and TA010 devices
- Resolve kit protocol compilation failure for PIC18 device (XC8) builds
- Fix PKCS11 layer C_DestroyObject failure when deleting a key pair
- Fix PKCS11 layer C_DeriveKey API usage sequence

3.5.1

New Features
- Add support for SHA104, SHA105, & SHA106 devices

3.5.0

New Features
- Add support for ECC204, TA010 and framework for future devices of the same generation

3.4.1

Hotfixes
- Update test_atcacert_build_start_signer to verify the structure fields since the structure is no longer packed
- Update Python ctypes_to_bytes routine to work for all python versions
- Add pkcs11 signature rule verification function to check mechanism and input parameters per section 5.2 of the specification
- Fix compilation error when PKCS11 monotonic counter is enabled
- Fix compilation error when no HALs are specified during configuration

3.4.0

New Features
- Added framework for fine grain library configuration including configuration check
header files `<api>_config_check.h` see lib/atca_config_check.h for the top level
header
- Added WPC application files with reference message generation/parsing and library
configuration file to optimize to the smallest footprint
- TA100 read/write apis updated to segment incoming buffer into partial read/write
operations if it exceeds the maximum supported packet size
- Added PKCS7 padding algorithm for use with AES-CBC
- Expose PKCS11 configuration options to CMake configuration


Fixes
- Improve ECC204 apis to match cryptoauthlib apis and abstract the device differences
- Support for strict C99 compliance and clean up warnings from -Wall and pedantic levels
- Add rsa2048 key size support to talib_rsaenc command
- Fix for ta100 devupdate to set the proper auth session exit flags so the library will
properly reconnect when the ta100 reboots
- Fix ECC608 verify failure when ReqRandom bit is set for a stored public key by using
tempkey in this situation rather than the message digest buffer. See the ECC608
datasheet for more details of this special condition
- Improve ta100 auth session handling of long messages by reporting the message size
exceeds the wrapped message limit earlier in the packet creation process
- Fixes and Improvements for PKCS11 interface based on compliance testing
- Add missing include for atca_device.h by mickeprag in https://github.com/MicrochipTech/cryptoauthlib/pull/264
- Fix no member named 'address' errors when using ATCA_ENABLE_DEPRECATED by rashedtalukder in https://github.com/MicrochipTech/cryptoauthlib/pull/273
- Fix undefined type error and ESP32 RTOS timer function call by rashedtalukder in https://github.com/MicrochipTech/cryptoauthlib/pull/277
- Fix model number for ATECC608 by AndreyLalaev in https://github.com/MicrochipTech/cryptoauthlib/pull/282
- Don't attempt to pack structures with pointers - should fix aarch64 issues by bryan-hunt in https://github.com/MicrochipTech/cryptoauthlib/pull/283
- Add fixes to cryptoauthlib to support Java PKCS11 requirements, to support Greengrass V2 by JamieHunter in https://github.com/MicrochipTech/cryptoauthlib/pull/290
- CKA_ID support to enable Java / Greengrass V2 by JamieHunter in https://github.com/MicrochipTech/cryptoauthlib/pull/291

New Contributors
* mickeprag made their first contribution in https://github.com/MicrochipTech/cryptoauthlib/pull/264
* rashedtalukder made their first contribution in https://github.com/MicrochipTech/cryptoauthlib/pull/273
* AndreyLalaev made their first contribution in https://github.com/MicrochipTech/cryptoauthlib/pull/282
* JamieHunter made their first contribution in https://github.com/MicrochipTech/cryptoauthlib/pull/290

**Full Changelog**: https://github.com/MicrochipTech/cryptoauthlib/compare/v3.3.3...v3.4.0

Page 1 of 3

© 2025 Safety CLI Cybersecurity Inc. All Rights Reserved.