8000 FIPS Integrity Hash Tooling by skmcgrail · Pull Request #2296 · aws/aws-lc · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

FIPS Integrity Hash Tooling #2296

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Mar 31, 2025
Merged

Conversation

skmcgrail
Copy link
Member

Description of changes:

Renames the compare_hash tool to be integrity_tool. Now supports two optional flags -verify and -extract when passing in a single file path. Like before it will output the recorded FIPS module integrity hash. With -verify flag provided it will also compute the module hash based on the contents and validate that the recorded hash matches. -extract can also be specified which will dump the .text and .rodata subsection areas bounded by the BCM symbols. It will write these to temporary file paths in both binary and hex to aide in subsequent investigations.

Example Output

$ ./integrity_tool -verify -extract after/build/crypto/libcrypto.so
3ae14c6e301a93c4b98a4e1281e2919cacbedf35955733bdf261ab5b25ed3c6b
Integrity Hash: VERIFIED
Extracted BORINGSSL_bcm_text: /tmp/2817692511.BORINGSSL_bcm_text.bin
Extracted BORINGSSL_bcm_text: /tmp/1854918462.BORINGSSL_bcm_text.hex
Extracted BORINGSSL_bcm_rodata: /tmp/404959500.BORINGSSL_bcm_rodata.bin
Extracted BORINGSSL_bcm_rodata: /tmp/176508435.BORINGSSL_bcm_rodata.hex

By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license and the ISC license.

@skmcgrail skmcgrail requested a review from a team as a code owner March 28, 2025 19:40
@skmcgrail skmcgrail requested review from justsmth and smittals2 March 28, 2025 19:40
@justsmth justsmth merged commit 92e1332 into aws:main Mar 31, 2025
107 of 109 checks passed
skmcgrail added a commit to skmcgrail/aws-lc that referenced this pull request Mar 31, 2025
### Description of changes:
Renames the `compare_hash` tool to be `integrity_tool`. Now supports two
optional flags `-verify` and `-extract` when passing in a single file
path. Like before it will output the recorded FIPS module integrity
hash. With `-verify` flag provided it will also compute the module hash
based on the contents and validate that the recorded hash matches.
`-extract` can also be specified which will dump the `.text` and
`.rodata` subsection areas bounded by the BCM symbols. It will write
these to temporary file paths in both binary and hex to aide in
subsequent investigations.

# Example Output
``` sh
$ ./integrity_tool -verify -extract after/build/crypto/libcrypto.so
3ae14c6e301a93c4b98a4e1281e2919cacbedf35955733bdf261ab5b25ed3c6b
Integrity Hash: VERIFIED
Extracted BORINGSSL_bcm_text: /tmp/2817692511.BORINGSSL_bcm_text.bin
Extracted BORINGSSL_bcm_text: /tmp/1854918462.BORINGSSL_bcm_text.hex
Extracted BORINGSSL_bcm_rodata: /tmp/404959500.BORINGSSL_bcm_rodata.bin
Extracted BORINGSSL_bcm_rodata: /tmp/176508435.BORINGSSL_bcm_rodata.hex
```

By submitting this pull request, I confirm that my contribution is made
under the terms of the Apache 2.0 license and the ISC license.

(cherry picked from commit 92e1332)
@smittals2 smittals2 mentioned this pull request Mar 31, 2025
smittals2 added a commit that referenced this pull request Apr 1, 2025
## What's Changed
* FIPS Integrity Hash Tooling by @skmcgrail in
#2296
* Add more build options to match callback build by @andrewhop in
#2279
* Add req to OpenSSL CLI tool by @smittals2 in
#2284
* Turn on better logging for EC2 test framework by @andrewhop in
#2298




By submitting this pull request, I confirm that my contribution is made
under the terms of the Apache 2.0 license and the ISC license.
justsmth pushed a commit that referenced this pull request Apr 1, 2025
…2300)

### Description of changes: 
Cherry-pick \
92e1332
to fips-2024-09-27 branch.

This commit does not modify the fipsmodule boundary.

By submitting this pull request, I confirm that my contribution is made
under the terms of the Apache 2.0 license and the ISC license.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants
0