Skip to content

Security Hardening and TCG v185 compliance #496

Merged
dgarske merged 24 commits intowolfSSL:masterfrom
aidangarske:fenrir-fixes-10
Apr 29, 2026
Merged

Security Hardening and TCG v185 compliance #496
dgarske merged 24 commits intowolfSSL:masterfrom
aidangarske:fenrir-fixes-10

Conversation

@aidangarske
Copy link
Copy Markdown
Member

F-3503, F-3493, F-3494, F-3496, F-3272, F-3273, F-3274, F-3502, F-3504, F-3495, F-3497, F-3498, F-3499, F-3500, F-3508, F-3509, F-3505, F-3506, F-3511, F-3501, F-3510, F-3507

…_ATTEST_NV_DIGEST when NV_Certify size and offset are both zero
…t/flush: fix copy-paste so HMAC sessions loop walks 0x02000000-0x02000003
…set offset and fix loop continuation so detached PKCS7 body actually gets written
…ion: enable parameter encryption attrs for salted sessions, not only bind+salt
…stParams consumes ECDAA count field per Part 2 §11.2.1.5
…consumes ECDAA count field per Part 2 §11.2.1.5
…fyCreation consumes ECDAA count field per Part 2 Sec. 11.2.1.5
…et_ParseAttest decodes TPM_ST_ATTEST_NV_DIGEST as TPMS_NV_DIGEST_CERTIFY_INFO
…rypt Brainpool curves to TPM_ECC_BP_*_R1 (0x003X), not Barreto-Naehrig BN_P256
…uard primary unload against NULL on early init failure
…blicKey_ex: caller-controlled scheme, hashAlg, and objectAttributes for ECDH peer keys
…t/Decrypt return BUFFER_E for oversized input instead of silently truncating
…cheme/VerifyHashTicket: reject mismatched digest size for RSA, gate ECDSA

  pad/truncate
…uthPolicy: derive nameAlg from authPolicySz so SHA-384/SHA-512 policies are satisfiable
…et_ParsePublic resyncs to outer pub->size to prevent inner-size desync drift
…et_ParsePoint resyncs to outer point->size to prevent inner-size desync drift
…on/activate_credential: guard primary unload against NULL on early init failure
…yload: guard primary unload against NULL on early init failure
…t: scrub plaintext copy in rsaEncIn on every exit path
…plate_KeyedHash: scheme defaults to TPM_ALG_NULL when neither sign nor decrypt is requested
…et_AppendSignature/ParseSignature explicitly handles TPM_ALG_NULL and warns on unrecognized sigAlg
…on/activate_credential: zero-init tpmSession so early-failure cleanup is safe
Copilot AI review requested due to automatic review settings April 28, 2026 19:17

This comment was marked as resolved.

@dgarske dgarske merged commit 0011737 into wolfSSL:master Apr 29, 2026
127 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants