08169c02ae
This reverts commit 78cdb407b8
.
Sorry, wrong branch
79 lines
3.6 KiB
Diff
79 lines
3.6 KiB
Diff
diff -up gnupg-2.0.19/g10/encode.c.fips gnupg-2.0.19/g10/encode.c
|
|
--- gnupg-2.0.19/g10/encode.c.fips 2012-03-27 10:00:37.000000000 +0200
|
|
+++ gnupg-2.0.19/g10/encode.c 2012-11-22 15:51:23.314371267 +0100
|
|
@@ -732,7 +732,7 @@ encrypt_filter( void *opaque, int contro
|
|
if( efx->cfx.dek->algo == -1 ) {
|
|
/* because 3DES is implicitly in the prefs, this can only
|
|
* happen if we do not have any public keys in the list */
|
|
- efx->cfx.dek->algo = DEFAULT_CIPHER_ALGO;
|
|
+ efx->cfx.dek->algo = gcry_fips_mode_active() ? CIPHER_ALGO_AES : DEFAULT_CIPHER_ALGO;
|
|
}
|
|
|
|
/* In case 3DES has been selected, print a warning if
|
|
diff -up gnupg-2.0.19/g10/gpg.c.fips gnupg-2.0.19/g10/gpg.c
|
|
--- gnupg-2.0.19/g10/gpg.c.fips 2012-11-22 15:51:23.308371138 +0100
|
|
+++ gnupg-2.0.19/g10/gpg.c 2012-11-22 15:51:23.315371289 +0100
|
|
@@ -1973,7 +1973,7 @@ main (int argc, char **argv)
|
|
opt.compress_algo = -1; /* defaults to DEFAULT_COMPRESS_ALGO */
|
|
opt.s2k_mode = 3; /* iterated+salted */
|
|
opt.s2k_count = 0; /* Auto-calibrate when needed. */
|
|
- opt.s2k_cipher_algo = CIPHER_ALGO_CAST5;
|
|
+ opt.s2k_cipher_algo = gcry_fips_mode_active() ? CIPHER_ALGO_AES : CIPHER_ALGO_CAST5;
|
|
opt.completes_needed = 1;
|
|
opt.marginals_needed = 3;
|
|
opt.max_cert_depth = 5;
|
|
diff -up gnupg-2.0.19/g10/mainproc.c.fips gnupg-2.0.19/g10/mainproc.c
|
|
--- gnupg-2.0.19/g10/mainproc.c.fips 2012-03-27 10:00:37.000000000 +0200
|
|
+++ gnupg-2.0.19/g10/mainproc.c 2012-11-22 16:43:51.876084682 +0100
|
|
@@ -685,9 +685,11 @@ proc_plaintext( CTX c, PACKET *pkt )
|
|
often. There is no good way to specify what algorithms to
|
|
use in that case, so these three are the historical
|
|
answer. */
|
|
- gcry_md_enable( c->mfx.md, DIGEST_ALGO_RMD160 );
|
|
+ if( !gcry_fips_mode_active() )
|
|
+ gcry_md_enable( c->mfx.md, DIGEST_ALGO_RMD160 );
|
|
gcry_md_enable( c->mfx.md, DIGEST_ALGO_SHA1 );
|
|
- gcry_md_enable( c->mfx.md, DIGEST_ALGO_MD5 );
|
|
+ if( !gcry_fips_mode_active() )
|
|
+ gcry_md_enable( c->mfx.md, DIGEST_ALGO_MD5 );
|
|
}
|
|
if( opt.pgp2_workarounds && only_md5 && !opt.skip_verify ) {
|
|
/* This is a kludge to work around a bug in pgp2. It does only
|
|
@@ -2157,24 +2159,30 @@ proc_tree( CTX c, KBNODE node )
|
|
else if( !c->any.data ) {
|
|
/* detached signature */
|
|
free_md_filter_context( &c->mfx );
|
|
- if (gcry_md_open (&c->mfx.md, sig->digest_algo, 0))
|
|
- BUG ();
|
|
+ if (gcry_md_open (&c->mfx.md, sig->digest_algo, 0)) {
|
|
+ log_error("Digest algorithm not available probably due to FIPS mode.\n");
|
|
+ return;
|
|
+ }
|
|
|
|
if( !opt.pgp2_workarounds )
|
|
;
|
|
else if( sig->digest_algo == DIGEST_ALGO_MD5
|
|
&& is_RSA( sig->pubkey_algo ) ) {
|
|
/* enable a workaround for a pgp2 bug */
|
|
- if (gcry_md_open (&c->mfx.md2, DIGEST_ALGO_MD5, 0))
|
|
- BUG ();
|
|
+ if (gcry_md_open (&c->mfx.md2, DIGEST_ALGO_MD5, 0)) {
|
|
+ log_error("Digest algorithm not available probably due to FIPS mode.\n");
|
|
+ return;
|
|
+ }
|
|
}
|
|
else if( sig->digest_algo == DIGEST_ALGO_SHA1
|
|
&& sig->pubkey_algo == PUBKEY_ALGO_DSA
|
|
&& sig->sig_class == 0x01 ) {
|
|
/* enable the workaround also for pgp5 when the detached
|
|
* signature has been created in textmode */
|
|
- if (gcry_md_open (&c->mfx.md2, sig->digest_algo, 0 ))
|
|
- BUG ();
|
|
+ if (gcry_md_open (&c->mfx.md2, sig->digest_algo, 0 )) {
|
|
+ log_error("Digest algorithm not available.\n");
|
|
+ return;
|
|
+ }
|
|
}
|
|
#if 0 /* workaround disabled */
|
|
/* Here we have another hack to work around a pgp 2 bug
|