Skip to content

protocol correctness, OpenSSL-compat hardening, and sensitive-memory zeroization#10426

Open
JeremiahM37 wants to merge 5 commits intowolfSSL:masterfrom
JeremiahM37:fenrir-8
Open

protocol correctness, OpenSSL-compat hardening, and sensitive-memory zeroization#10426
JeremiahM37 wants to merge 5 commits intowolfSSL:masterfrom
JeremiahM37:fenrir-8

Conversation

@JeremiahM37
Copy link
Copy Markdown
Contributor

Fixes F-1837, F-1838, F-2086, F-2883, F-2884, F-3218, F-3239, F-3240, F-3454, F-3457, F-3491, F-3677, F-3679, F-3685, F-3688.

  • des: fix sizeof(Des3) -> sizeof(Des) (F-2883/2884).
  • x509: correct NOT_BEFORE_FIELD reason string (F-3218).
  • ocsp: pendingCAs fallback uses parent hash, not seed (F-3677).
  • dtls13: reject seq diff >= 2^32 in window update (F-2086).
  • dtls13: rtx ctx match accounts for handshake header + length (F-3454).
  • tls13: illegal_parameter alert for non-zero CertReq ctx (F-3457).
  • pkcs7: return WOLFSSL_FAILURE on alloc fail (F-3679).
  • rand: implement RAND_load_file (file I/O + DRBG reseed) (F-3685).
  • rand: probe global RNG in RAND_status (F-3688).
  • dtls13: zero epoch keys on free; ForceZero in slot reuse (F-3491).
  • sniffer: zero keylog stack secrets on return (F-1837).
  • sniffer: zero SecretNode before free (F-1838).
  • tls13: zero Exporter scratch on all returns (F-3239).
  • keys: zero shaOutput in master derive (F-3240).

@JeremiahM37 JeremiahM37 self-assigned this May 7, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant