forked from wolfSSL/wolfssl
FIPS 140-3 misc fixes including fixes for rebase errors.
This commit is contained in:
@@ -253,7 +253,7 @@ AS_CASE([$ENABLED_FIPS],
|
|||||||
FIPS_VERSION="v1"
|
FIPS_VERSION="v1"
|
||||||
],
|
],
|
||||||
[
|
[
|
||||||
AC_MSG_ERROR([Invalid value for --enable-fips \"$ENABLED_FIPS\" (allowed: ready, rand, v1, v2, v5)])
|
AC_MSG_ERROR([Invalid value for --enable-fips "$ENABLED_FIPS" (allowed: ready, rand, v1, v2, v5)])
|
||||||
])
|
])
|
||||||
|
|
||||||
AS_CASE([$FIPS_VERSION],
|
AS_CASE([$FIPS_VERSION],
|
||||||
|
@@ -46857,7 +46857,7 @@ int wolfSSL_CRYPTO_set_mem_functions(
|
|||||||
return WOLFSSL_FAILURE;
|
return WOLFSSL_FAILURE;
|
||||||
}
|
}
|
||||||
|
|
||||||
#if defined(WOLFSSL_KEY_GEN) && !defined(HAVE_SELFTEST)
|
#if defined(WOLFSSL_KEY_GEN) && !defined(HAVE_SELFTEST) && !defined(NO_DH)
|
||||||
WOLFSSL_DH *wolfSSL_DH_generate_parameters(int prime_len, int generator,
|
WOLFSSL_DH *wolfSSL_DH_generate_parameters(int prime_len, int generator,
|
||||||
void (*callback) (int, int, void *), void *cb_arg)
|
void (*callback) (int, int, void *), void *cb_arg)
|
||||||
{
|
{
|
||||||
@@ -46924,7 +46924,7 @@ int wolfSSL_DH_generate_parameters_ex(WOLFSSL_DH* dh, int prime_len, int generat
|
|||||||
|
|
||||||
return WOLFSSL_SUCCESS;
|
return WOLFSSL_SUCCESS;
|
||||||
}
|
}
|
||||||
#endif /* WOLFSSL_KEY_GEN && !HAVE_SELFTEST */
|
#endif /* WOLFSSL_KEY_GEN && !HAVE_SELFTEST && !NO_DH */
|
||||||
|
|
||||||
int wolfSSL_ERR_load_ERR_strings(void)
|
int wolfSSL_ERR_load_ERR_strings(void)
|
||||||
{
|
{
|
||||||
|
@@ -6816,11 +6816,7 @@ static void TLSX_KeyShare_FreeAll(KeyShareEntry* list, void* heap)
|
|||||||
|
|
||||||
while ((current = list) != NULL) {
|
while ((current = list) != NULL) {
|
||||||
list = current->next;
|
list = current->next;
|
||||||
if (current->group >= MIN_FFHDE_GROUP &&
|
if ((current->group & NAMED_DH_MASK) == NAMED_DH_MASK) {
|
||||||
current->group <= MAX_FFHDE_GROUP) {
|
|
||||||
#ifndef NO_DH
|
|
||||||
wc_FreeDhKey((DhKey*)current->key);
|
|
||||||
#endif
|
|
||||||
}
|
}
|
||||||
else if (current->group == WOLFSSL_ECC_X25519) {
|
else if (current->group == WOLFSSL_ECC_X25519) {
|
||||||
#ifdef HAVE_CURVE25519
|
#ifdef HAVE_CURVE25519
|
||||||
|
@@ -9475,6 +9475,7 @@ int wc_AesGcmSetExtIV(Aes* aes, const byte* iv, word32 ivSz)
|
|||||||
|
|
||||||
if (aes == NULL || iv == NULL || !CheckAesGcmIvSize(ivSz)) {
|
if (aes == NULL || iv == NULL || !CheckAesGcmIvSize(ivSz)) {
|
||||||
ret = BAD_FUNC_ARG;
|
ret = BAD_FUNC_ARG;
|
||||||
|
}
|
||||||
|
|
||||||
if (ret == 0) {
|
if (ret == 0) {
|
||||||
XMEMCPY((byte*)aes->reg, iv, ivSz);
|
XMEMCPY((byte*)aes->reg, iv, ivSz);
|
||||||
|
@@ -16368,11 +16368,11 @@ static int dh_ffdhe_test(WC_RNG *rng, int name)
|
|||||||
ERROR_OUT(-8050, done);
|
ERROR_OUT(-8050, done);
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
pubSz = FFDHE_KEY_SIZE;
|
pubSz = MAX_DH_KEY_SZ;
|
||||||
pubSz2 = FFDHE_KEY_SIZE;
|
pubSz2 = MAX_DH_KEY_SZ;
|
||||||
#ifdef HAVE_PUBLIC_FFDHE
|
#ifdef HAVE_PUBLIC_FFDHE
|
||||||
privSz = FFDHE_KEY_SIZE;
|
privSz = MAX_DH_PRIV_SZ;
|
||||||
privSz2 = FFDHE_KEY_SIZE;
|
privSz2 = MAX_DH_PRIV_SZ;
|
||||||
#else
|
#else
|
||||||
privSz = wc_DhGetNamedKeyMinSize(name);
|
privSz = wc_DhGetNamedKeyMinSize(name);
|
||||||
privSz2 = privSz;
|
privSz2 = privSz;
|
||||||
|
Reference in New Issue
Block a user