Skip to content

Partial revert of "In essiv_aead_setkey(), use the same logic as crypto_authenc_esn_setkey() to zeroize keys on exit." #333

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Conversation

jallisonciq
Copy link

Fix a FIPS bug that got into the FIPS 9.2 code by mistake. This only affects the 9.2 FIPS kernel, no other kernel.

A bug was introduced while updating the kernel per atsec’s request. When key zeroization was added, setting the crypto algorithm key was removed in error. This re-adds the code to set the crypto key.

We can only fix this in compliant, as it touches the crypto code that is frozen in certified.

See this ticket for details:

https://ciqinc.atlassian.net/browse/LE-3197

Tested under non-FIPS and FIPS mode. NB. This bug only causes the algorithm to be unusable and an error message returned to users. No corruption or insecure algorithm use is allowed.

…to_authenc_esn_setkey() to zeroize keys on exit."

LE-3197

A bug was introduced while updating the kernel per atsec’s request. When
key zeroization was added, setting the crypto algorithm key was removed in
error. This re-adds the code to set the crypto key.

Tested under non-FIPS and FIPS mode. NB. This bug only causes the algorithm
to be unusable and an error message returned to users. No corruption or
insecure algorithm use is allowed.

[Sultan: touched up the commit message with what Jeremy wrote]

Signed-off-by: Jason Rodriguez <jrodriguez@ciq.com>
Signed-off-by: Jeremy Allison <jallison@ciq.com>
Signed-off-by: Sultan Alsawaf <sultan@ciq.com>
@kerneltoast kerneltoast force-pushed the {jallison}_fips-9-compliant/5.14.0-284.30.1 branch from 6cccbd3 to 6016b18 Compare June 13, 2025 19:08
@kerneltoast kerneltoast changed the title Reverting update where crypto_chiper_setkey was removed Partial revert of "In essiv_aead_setkey(), use the same logic as crypto_authenc_esn_setkey() to zeroize keys on exit." Jun 13, 2025
Copy link

@kerneltoast kerneltoast left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I touched up the commit message and fixed whitespace alignment of crypto_cipher_setkey() arguments.

@jallisonciq jallisonciq merged commit dd0d2f4 into fips-9-compliant/5.14.0-284.30.1 Jun 13, 2025
2 checks passed
@jallisonciq jallisonciq deleted the {jallison}_fips-9-compliant/5.14.0-284.30.1 branch June 13, 2025 22:15
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

Successfully merging this pull request may close these issues.

3 participants