Changelog

Version 1.0.0

Date:

April 14, 2025

Version 0.6.0

Date:

October 31, 2024

Version 0.5.0

Date:

August 5, 2024

  • @kamil-kielbasa : Changed build system from Make to CMake.

  • @kamil-kielbasa : Added building library code with clang compiler.

  • @kamil-kielbasa : Added new module test for scenario:

    • X.509 chain, cipher suite 2, static DH keys, single EAD token.

  • @marek-serafin : Fixed setting correct cases for static dh methods.

  • @kamil-kielbasa : Refactored message_2 and message_3 for common code:

    • CBOR utilities.

    • MAC 2/3 context generation.

    • MAC 2/3 computation.

    • Signature_or_MAC 2/3 computation and verification.

  • @kamil-kielbasa : Fixed setting correct cases for methods for message_3.

  • @kamil-kielbasa : Added any cborised authentication credentials option.

  • @kamil-kielbasa : Fixed end entity certificate according to COSE X.509 chain.

  • @kamil-kielbasa : Fixed wrong MAC length for static DH in test suite.

  • @kamil-kielbasa : Refactored EDHOC API and EDHOC interfaces.

  • @kamil-kielbasa : Added library zephyrization.

  • @kamil-kielbasa : Refactored function edhoc_set_methods for more flexibility.

  • @kamil-kielbasa : Added support for MSVC _alloca (lack of VLA).

Version 0.4.0

Date:

July 5, 2024

  • @marek-serafin : Fixed typo in setting peer_cid while processing message 1.

  • @marek-serafin : Fixed zcbor. Added a method to avoid generation of duplicated types.

  • @kamil-kielbasa : Added EDHOC error message compose & process with unit tests.

  • @kamil-kielbasa : Added EDHOC PRK exporter with unit test.

  • @kamil-kielbasa : Fixed CDDL models for COSE X.509 chain and COSE X.509 hash.

    • added unit test with two certificates for X.509 chain for cipher suite 0.

    • added unit test with one certificate for X.509 chain for cipher suite 2 with multiple EAD tokens.

    • added unit test for X.509 hash for cipher suite 2 with single EAD token.

  • @kamil-kielbasa : Changed licence from GPL-2.0 to MIT.

  • @kamil-kielbasa : Forbidden passing empty byte string for connection identifier.

  • @kamil-kielbasa : Added EDHOC error getters for: error code and cipher suites.

    • added test scenarios according to RFC 9528: 6.3.2. Examples. Covered figures 8 and 9.

Version 0.3.0

Date:

May 20, 2024

  • @kamil-kielbasa : Full support of RFC 9528 (EDHOC).

    • add missing static diffie hellman keys authentication method.

  • @kamil-kielbasa : Implementation is verified with RFC 9529 (EDHOC traces) for chapter 3.

  • @kamil-kielbasa : Create documentation for sphinx including:

    • move README to sphinx.

    • move ChangeLog to sphinx.

    • create API documentation and fix header files.

  • @kamil-kielbasa : Add documentation deployment step for github actions.

Version 0.2.0

Date:

April 28, 2024

  • @kamil-kielbasa : Update implementation for RFC 9528 (EDHOC) including:

    • external authorization data aligned with RFC.

    • add message 4 compose & process.

    • keyUpdate method.

  • @kamil-kielbasa : Separate interface for EAD.

  • @kamil-kielbasa : Implementation is verified with RFC 9529 (EDHOC traces) for chapter 2.

    • extended unit tests with EAD single/multiple tokens.

    • used RFC 9529 certificates to verify authentication identified by ‘x5chain’.

  • @kamil-kielbasa : Example implementation of cipher suite 2.

  • @kamil-kielbasa : EDHOC context structure with private members.

  • @kamil-kielbasa : Fix connection identifiers encoding option.

  • @kamil-kielbasa : Fix authentication credentials encoding option.

  • @kamil-kielbasa : Fix CBOR memory requirements for integer, byte string and text string.

  • @kamil-kielbasa : Add build, run unit tests and verification by cppcheck and valgrind for github actions.

  • @kamil-kielbasa : Update README.

Version 0.1.0

Date:

April 01, 2024

  • @kamil-kielbasa : EDHOC implementation for version 16:

    • limited support for authentication methods only via signatures.

    • support EAD encoded as byte string.

    • support authentication identified by: ‘kid’, ‘x5chain’, ‘x5t’.

  • @kamil-kielbasa : CoAP friendly EDHOC API.

  • @kamil-kielbasa : Separate interfaces for:

    • cryptographics keys.

    • cryptographics operations.

    • authentication credentials.

  • @kamil-kielbasa : Authentication credentials fetch callback accept only private key identifier.

  • @kamil-kielbasa : Example implementation of cipher suite 0 with PSA.

  • @kamil-kielbasa : Unit test with test vectors for authentication with signatures, X.509 identified by ‘kid’, ‘x5chain’ and ‘x5t’.