Daniel Pouzzner
d4fc8c3791
linuxkm/: null out pointers with PTR_ERR()-encoded values before jumping to cleanup;
...
linuxkm/lkcapi_rsa_glue.c: in km_rsa_init(), implement error-path cleanup;
linuxkm/module_hooks.c: nix CONFIG_MODULE_SIG requirement in WOLFCRYPT_FIPS_CORE_DYNAMIC_HASH_VALUE builds;
wolfssl/wolfcrypt/settings.h: in WOLFSSL_LINUXKM setup, define WOLFSSL_ASN_INT_LEAD_0_ANY if LINUXKM_LKCAPI_REGISTER (required for kernel 5.10 crypto manager);
wolfcrypt/src/memory.c: add WC_NO_ERR_TRACE() to mock error returns in SAVE_VECTOR_REGISTERS2_fuzzer().
2025-04-22 16:44:07 -05:00
Daniel Pouzzner
fe244fb41b
linuxkm: clean up LKCAPI glue:
...
typography fixes;
static attr on const byte arrays;
refactor km_ecdsa_verify() to use a single heap allocation;
fix linuxkm_test_ecdsa_nist_driver() to copy sig and hash to a heap allocation before passing to sg_set_buf() (avoids unmapping of rodata);
in linuxkm_test_pkcs1_driver() move hash from stack to heap;
add LINUX_VERSION_CODE >= 5.4 assertion in linuxkm/lkcapi_glue.c;
streamline macro logic in linuxkm/lkcapi_sha_glue.c.
2025-04-18 18:21:57 -05:00
Daniel Pouzzner
28091e8842
Merge pull request #8685 from philljj/linuxkm_ecdh_forcezero
...
linuxkm ecdh: force zero shared secret buffer, and clear old key.
2025-04-17 09:35:35 -05:00
jordan
57ccabb25c
linuxkm ecdh: force zero shared secret buffer, and clear old key.
2025-04-16 21:15:32 -05:00
Daniel Pouzzner
78a9cd7c58
linuxkm/module_hooks.c: don't define FIPS_NO_WRAPPERS;
...
linuxkm/lkcapi_ecdh_glue.c: in km_ecdh_compute_shared_secret(), wrap wc_ecc_shared_secret() in PRIVATE_KEY_UNLOCK...PRIVATE_KEY_LOCK.
2025-04-16 18:29:43 -05:00
jordan
4ef7ef02d6
linuxkm ecdh: small cleanup.
2025-04-11 16:20:16 -04:00
jordan
380c3613ed
linuxkm: register ecdh.
2025-04-11 15:16:09 -04:00