We’re releasing Pico HSM v6.6, with a strong focus on security hardening, platform support, and build/runtime reliability.
Compared to v6.4, this release also includes important updates from the bundled Pico Keys SDK stack.
Highlights
- Secure Boot support for ESP32 (beta integration path).
- ESP32 LED HIGH/LOW support and ESP32-S2 support.
- Upgrade to Pico Keys SDK 8.6.
- Upgrade to Mbed TLS 3.6.6.
- New security regression tests (including PKCS#11 regression coverage).
- Added SDK BULK command support to reduce communication bandwidth.
- Added SDK OpenSSL backend for emulation flows.
Security and Hardening Improvements
This release tightens several sensitive paths:
- Improved ACL setup and ACL macro usage.
- Private objects are now protected from read access without authentication.
- PIN/MKEK handling migrated to a newer internal system.
- Secure messaging validation strengthened (including MAC-length checks).
- Anti-rollback and secure-boot/OTP internals updated.
Reliability and Build Fixes
We fixed multiple issues reported across environments and toolchains:
cyw43and LED-related build issues.- MLKEM build fixes.
- Include/link fixes (including mbedtls/OpenSSL backend linkage).
- Strict non-prototype declaration warnings.
- Secure Boot enable/check integration issues.
- Bounds checking fixes in
UPDATE EF. secp521r1compatibility fixes with newer OpenSSL.- Rare SDK race-condition fix.
- Better handling for
sc-hsm-toolfalse-negative exit codes.
Behavioral Changes
- Removed legacy debug/unused code.
- Removed legacy session PIN command/path.
- OTP FIDO is no longer exposed through CCID when unavailable.
- Memory layout and tests were updated accordingly.
Upgrade Notes
If you are upgrading from v6.4:
- Rebuild with the updated SDK/toolchain settings.
- Re-run your integration and PKCS#11 regression tests.
- Validate secure-boot and ACL-related behavior in your target environment.
- Review CCID behavior if your setup relied on OTP FIDO exposure.
Closing
v6.6 is a hardening and maturity release: better security defaults, broader ESP32 support, and a cleaner foundation for future features.
As always, feedback from production and lab deployments is welcome.