Skip to content

Conversation

@LinuxJedi
Copy link
Member

This PR:

  • Adds support for CKM_NSS_PKCS12_PBE_SHA*_HMAC_KEY_GEN
  • Adds support for CKM_PKCS5_PBKD2
  • Adds CKA_NSS_DB as an ignored attribute (to suppress errors)
  • Adds support for PBKDF2 pin hashing

The first three are required to make NSS pk12util work. The last one is enabled by default for FIPS, but the options --enable-pbkdf2 and --pbkdf2-iterations have been added to use it in other builds.

PBKDF2 for pin is set to 600,000 rounds by default, which is the OWASP recommendation.

FIPS doesn't have scrypt. This implements PBKDF2 instead. Enabled by
default at 600,000 rounds for FIPS.

600,000 being the current OWASP recommendation for SHA256 HMAC.
@LinuxJedi LinuxJedi force-pushed the fix-tests branch 3 times, most recently from aea1ad9 to d89b762 Compare August 21, 2025 15:15
Also fix line lengths
@LinuxJedi LinuxJedi requested a review from dgarske August 22, 2025 17:22
@LinuxJedi LinuxJedi removed their assignment Aug 22, 2025
@dgarske dgarske merged commit 9fe950c into wolfSSL:master Aug 22, 2025
70 of 72 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants