Resolves: RHEL-61274
Allow RSA-OAEP in Fips mode Add the algorithms to fips_algorythms and add additional checks. fix release number in changelog
This commit is contained in:
parent
145f798e4c
commit
0f76bd6054
@ -20,6 +20,7 @@ typedef enum {
|
|||||||
SFTKFIPSChkHash, /* make sure the base hash of KDF functions is FIPS */
|
SFTKFIPSChkHash, /* make sure the base hash of KDF functions is FIPS */
|
||||||
SFTKFIPSChkHashTls, /* make sure the base hash of TLS KDF functions is FIPS */
|
SFTKFIPSChkHashTls, /* make sure the base hash of TLS KDF functions is FIPS */
|
||||||
SFTKFIPSChkHashSp800, /* make sure the base hash of SP-800-108 KDF functions is FIPS */
|
SFTKFIPSChkHashSp800, /* make sure the base hash of SP-800-108 KDF functions is FIPS */
|
||||||
|
SFTKFIPSRSAOAEP, /* make sure that both hashes use the same FIPS compliant algorithm */
|
||||||
} SFTKFIPSSpecialClass;
|
} SFTKFIPSSpecialClass;
|
||||||
|
|
||||||
/* set according to your security policy */
|
/* set according to your security policy */
|
||||||
@ -79,6 +80,7 @@ SFTKFIPSAlgorithmList sftk_fips_mechs[] = {
|
|||||||
#define AES_FB_KEY 128, 256
|
#define AES_FB_KEY 128, 256
|
||||||
#define AES_FB_STEP 64
|
#define AES_FB_STEP 64
|
||||||
{ CKM_RSA_PKCS_KEY_PAIR_GEN, { RSA_FB_KEY, CKF_KPG }, RSA_FB_STEP, SFTKFIPSNone },
|
{ CKM_RSA_PKCS_KEY_PAIR_GEN, { RSA_FB_KEY, CKF_KPG }, RSA_FB_STEP, SFTKFIPSNone },
|
||||||
|
{ CKM_RSA_PKCS_OAEP, { RSA_FB_KEY, CKF_ENC }, RSA_FB_STEP, SFTKFIPSRSAOAEP },
|
||||||
|
|
||||||
/* -------------- RSA Multipart Signing Operations -------------------- */
|
/* -------------- RSA Multipart Signing Operations -------------------- */
|
||||||
{ CKM_SHA224_RSA_PKCS, { RSA_FB_KEY, CKF_SGN }, RSA_FB_STEP, SFTKFIPSNone },
|
{ CKM_SHA224_RSA_PKCS, { RSA_FB_KEY, CKF_SGN }, RSA_FB_STEP, SFTKFIPSNone },
|
||||||
|
20
nss-3.101-allow-fips-rsa-oaep.patch
Normal file
20
nss-3.101-allow-fips-rsa-oaep.patch
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
diff -up ./lib/softoken/pkcs11u.c.fipsrsaoaep ./lib/softoken/pkcs11u.c
|
||||||
|
--- ./lib/softoken/pkcs11u.c.fipsrsaoaep 2024-10-24 09:27:17.971673855 +0200
|
||||||
|
+++ ./lib/softoken/pkcs11u.c 2024-10-24 09:23:35.006352872 +0200
|
||||||
|
@@ -2565,6 +2565,16 @@ sftk_handleSpecial(SFTKSlot *slot, CK_ME
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return sftk_checkKeyLength(targetKeyLength, 112, 512, 1);
|
||||||
|
+ case SFTKFIPSRSAOAEP:;
|
||||||
|
+ CK_RSA_PKCS_OAEP_PARAMS *rsaoaep = (CK_RSA_PKCS_OAEP_PARAMS *)
|
||||||
|
+ mech->pParameter;
|
||||||
|
+
|
||||||
|
+ HASH_HashType hash_msg = sftk_GetHashTypeFromMechanism(rsaoaep->hashAlg);
|
||||||
|
+ HASH_HashType hash_pad = sftk_GetHashTypeFromMechanism(rsaoaep->mgf);
|
||||||
|
+ /* message hash and mask generation function must be the same */
|
||||||
|
+ if (hash_pad != hash_msg) return PR_FALSE;
|
||||||
|
+
|
||||||
|
+ return sftk_checkFIPSHash(rsaoaep->hashAlg, PR_FALSE, PR_FALSE);
|
||||||
|
default:
|
||||||
|
break;
|
||||||
|
}
|
8
nss.spec
8
nss.spec
@ -1,6 +1,6 @@
|
|||||||
%global nss_version 3.101.0
|
%global nss_version 3.101.0
|
||||||
%global nspr_version 4.35.0
|
%global nspr_version 4.35.0
|
||||||
%global baserelease 9
|
%global baserelease 10
|
||||||
%global nss_release %baserelease
|
%global nss_release %baserelease
|
||||||
# NOTE: To avoid NVR clashes of nspr* packages:
|
# NOTE: To avoid NVR clashes of nspr* packages:
|
||||||
# use "%%global nspr_release %%[%%baserelease+n]" to handle offsets when
|
# use "%%global nspr_release %%[%%baserelease+n]" to handle offsets when
|
||||||
@ -201,6 +201,7 @@ Patch85: nss-3.101-fix-cms-abi-break.patch
|
|||||||
Patch86: nss-3.101-long-pwd-fix.patch
|
Patch86: nss-3.101-long-pwd-fix.patch
|
||||||
Patch87: nss-3.101-fix-shlibsign-fips.patch
|
Patch87: nss-3.101-fix-shlibsign-fips.patch
|
||||||
Patch88: nss-3.101-fips-check-ec25519-size.patch
|
Patch88: nss-3.101-fips-check-ec25519-size.patch
|
||||||
|
Patch89: nss-3.101-allow-fips-rsa-oaep.patch
|
||||||
|
|
||||||
Patch100: nspr-config-pc.patch
|
Patch100: nspr-config-pc.patch
|
||||||
Patch101: nspr-gcc-atomics.patch
|
Patch101: nspr-gcc-atomics.patch
|
||||||
@ -1202,11 +1203,14 @@ update-crypto-policies &> /dev/null || :
|
|||||||
|
|
||||||
|
|
||||||
%changelog
|
%changelog
|
||||||
|
* Mon Nov 11 2024 Frantisek Krenzelok <krenzelok.frantisek@gmail.com> - 3.101.0-10
|
||||||
|
- Allow RSA-OAEP in FIPS mode
|
||||||
|
|
||||||
* Mon Nov 11 2024 Frantisek Krenzelok <krenzelok.frantisek@gmail.com> - 3.101.0-9
|
* Mon Nov 11 2024 Frantisek Krenzelok <krenzelok.frantisek@gmail.com> - 3.101.0-9
|
||||||
- Add SEC_OID_CURVE25519 to FIPS checks.
|
- Add SEC_OID_CURVE25519 to FIPS checks.
|
||||||
- This will mark algorithms using it as FIPS unapproved.
|
- This will mark algorithms using it as FIPS unapproved.
|
||||||
|
|
||||||
* Mon Nov 4 2024 Bob Relyea <rrelyea@redhat.com> - 3.101.0-7
|
* Mon Nov 4 2024 Bob Relyea <rrelyea@redhat.com> - 3.101.0-8
|
||||||
- fix shlibsign in FIPS mode
|
- fix shlibsign in FIPS mode
|
||||||
- remove dbm from pkgconfig
|
- remove dbm from pkgconfig
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user