User Details
- User Since
- Nov 28 2018, 5:50 PM (316 w, 3 d)
- Availability
- Available
Nov 29 2022
Sure, but this will need adaption in FIPS mode as it fails with:
Patch using SHA1 instead of MD5.
Feb 1 2022
Thanks, Werner. This was originally reported by Alejandro Masino.
Jan 29 2022
Jan 19 2022
Jan 17 2022
I'm not completely sure but it might be convenient to mark HMAC keys with lengths less that 112 as non-approved in FIPS mode for both generation and verification. It could be easily implemented by adding a check using cipher/mac-hmac.c:hmac_get_keylen() or at the algo level. What do you think?
Sep 21 2021
Just FYI, see also how GnuTLS has proposed to implement the service indicator:
https://gitlab.com/gnutls/gnutls/-/merge_requests/1465
Jul 14 2020
Great! That fixes it. Many thanks!
Jul 11 2020
Yes, I forgot to include the full build log, I'm attaching it here. I've seen this in OpenSUSE Tumbleweed; the compiler is gcc10; and I can see this on any architecture. The test fails when building against gpg-2.2.21 but not with previous versions.
Jul 10 2020
Mar 27 2020
Mar 10 2020
Jul 25 2019
I can confirm that the patch from the referenced commit fixes the issue. Thanks for the quick action!
Adding the patch here.
Apr 29 2019
Feb 26 2019
Builds fine now with GCC 9. Thanks for looking into this so quickly.
Feb 15 2019
Dec 12 2018
Adding the patch here.