Skip to content

Conversation

@LinuxJedi
Copy link
Member

When PBKDF2 is used for PIN handling, if the pin is too small, this produces an error. This breaks our ability to have empty PINs.

Instead, we used a padded empty value.

When PBKDF2 is used for PIN handling, if the pin is too small, this
produces an error. This breaks our ability to have empty PINs.

Instead, we used a padded empty value.
Copy link
Collaborator

@dgarske dgarske left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Discussed with Andrew. This workaround for NSS trying to use a zero length pin is fine. For the cases where a PIN < HMAC_MIN_KEYLEN (14) it should produce an error in FIPS mode. Add WOLFPKCS11_NSS around it and code comment.

@dgarske dgarske self-assigned this Aug 29, 2025
@dgarske dgarske merged commit 2178eaf into wolfSSL:master Aug 29, 2025
65 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants