Skip to content

Conversation

@aidangarske
Copy link
Contributor

@aidangarske aidangarske commented Jul 28, 2025

Description

  • Add kmod workflow for v33
  • WPFF doesn't do anything since we only parse so no need for WPFF in this case
  • needs patch here

@aidangarske aidangarske self-assigned this Jul 28, 2025
@aidangarske aidangarske marked this pull request as ready for review July 29, 2025 19:06
kmod_ref: [ 'v33' ]
wolfssl_ref: [ 'master', 'v5.8.0-stable' ]
openssl_ref: [ 'openssl-3.5.0' ]
# Note: No WOLFPROV_FORCE_FAIL needed - kmod is only a signature parser,
Copy link
Contributor

@padelsbach padelsbach Jul 29, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If this is true, then are we actually testing wolfprovider?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Because WP is used to parse it just doesn't verify. WPFF shouldn't have any effect on the parsing functions that are used so there is no reason to test WPFF. We should still test WP for the parsing functions however since WP does use these.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

WPFF shouldn't have any effect on the parsing functions

Can you elaborate on the reasoning behind this? I thought WPFF was our main mechanism for ensuring that WP is actually being used by the test.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yep it is. Honestly the main reason is for IGEL

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Any idea why we don't use WPFF in the parsing functions? Should we add it? Maybe @ColtonWilley can chime in here

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Im not sure why we do not. This is a @ColtonWilley question for sure.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@padelsbach Colton and I have verified that kmod does use openssl to be able to do the parsing operation d2i_PKCS7_bio but this doesn't dispatch to any real crypto implementation that would call wolfProvider. So Basically Kmod needs openssl but it doesn't actually call any provider functionality. Either way we need this workflow to be implemented for IGEL.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this doesn't dispatch to any real crypto implementation that would call wolfProvider

So this doesn't actually call into wolfProvider? If that's true, why do we need this workflow?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I agree with @padelsbach if there is no crypto usage this should not be a workflow

@aidangarske
Copy link
Contributor Author

Jenkins retest this please

Retesting to see if this is a consistent failure with FIPS

@aidangarske aidangarske closed this Aug 6, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants