Skip to content

20240416-fips-v6-fixes#7434

Merged
JacobBarthelmeh merged 6 commits intowolfSSL:masterfrom
douzzer:20240416-fips-v6-fixes
Apr 17, 2024
Merged

20240416-fips-v6-fixes#7434
JacobBarthelmeh merged 6 commits intowolfSSL:masterfrom
douzzer:20240416-fips-v6-fixes

Conversation

@douzzer
Copy link
Copy Markdown
Contributor

@douzzer douzzer commented Apr 17, 2024

fixes for --enable-32bit CFLAGS=-m32 --enable-fips=v6 (fixes "#error ED448 requires SHAKE256").

(includes fixes for a fair number of casting flubs detected by -Wconversion tests.)

also, in configure.ac setup for enable-all and enable-all-crypto with enable-32bit, fix inconsistency whereby SHAKE was enabled but SHA512 and SHA3 weren't; remove unneeded+unwanted ENABLED_32BIT conditional force-off of SHA512, SHA384, SHA3, ED25519 (harmonizes with FIPS v6).

tested with wolfssl-multi-test.sh ... super-quick-check '.*m32.*'

(.*m32.* matches defaults-cryptonly-Wconversion-noasm-fips-140-3-dev-m32-build defaults-cryptonly-Wconversion-noasm-fips-140-3-v6-m32-build defaults-cryptonly-c99-Wconversion-m32-build allcryptonly-c99-Wconversion-m32-build defaults-cryptonly-c89-Wconversion-m32-build allcryptonly-c89-Wconversion-m32-build all-sp-m32 all-crypto-sp-m32.)

also several related and minor fixes necessary to get super-quick-check to pass locally:

wolfcrypt/src/fe_448.c: fix several out-of-order declarations in fe448_mul_8().

wolfcrypt/src/aes.c: in AES-XTS AESNI, use cautious strategy as in AESGCM_STREAM for SAVE_VECTOR_REGISTERS, due to random failures seen with DEBUG_VECTOR_REGISTER_ACCESS_FUZZING using the old per-call fallback strategy.

(tested with wolfssl-multi-test.sh ... linuxkm-legacy-.\*, and a loop for a couple hours on linuxkm-aesxts-cryptonly-aesni-fips-dev-dyn-hash-LKCAPI-no-twc-insmod-6.1.73-fortify-fallback-fuzzing linuxkm-all-cryptonly-aesni-fips-dev-dyn-hash-LKCAPI-insmod-6.1.73-fortify-fallback-fuzzing linuxkm-all-cryptonly-aesni-fips-dev-dyn-hash-LKCAPI-insmod-mainline-fallback-fuzzing.)

scripts/aria-cmake-build-test.sh: fix masked exit value.

douzzer added 6 commits April 17, 2024 00:43
…SGCM_STREAM for SAVE_VECTOR_REGISTERS, due to random failures seen with DEBUG_VECTOR_REGISTER_ACCESS_FUZZING using the old per-call fallback strategy.
…le-32bit, fix inconsistency whereby SHAKE was enabled but SHA512 and SHA3 weren't; remove unneeded+unwanted ENABLED_32BIT conditional force-off of SHA512, SHA384, SHA3, ED25519 (harmonizes with FIPS v6).
…erRedundantCheck in src/ssl_load.c (true positive).
@douzzer douzzer assigned douzzer and wolfSSL-Bot and unassigned douzzer Apr 17, 2024
@JacobBarthelmeh JacobBarthelmeh merged commit 58167a2 into wolfSSL:master Apr 17, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants