Bug 1119738

Summary: [RFE] Support RFC 5649: Advanced Encryption Standard (AES) Key Wrap with Padding Algorithm
Product: Red Hat Enterprise Linux 7 Reporter: Petr Spacek <pspacek>
Component: opensslAssignee: Tomas Mraz <tmraz>
Status: CLOSED ERRATA QA Contact: Hubert Kario <hkario>
Severity: high Docs Contact:
Priority: high    
Version: 7.1CC: arubin, dpal, hkario, mkosek, sgrubb, tmraz, vondruch
Target Milestone: rcKeywords: FutureFeature
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: openssl-1.0.1e-37.el7 Doc Type: Enhancement
Doc Text:
The key wrapping support according to RFC 5649 was added to the EVP API.
Story Points: ---
Clone Of:
: 1121658 (view as bug list) Environment:
Last Closed: 2015-03-05 11:03:40 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1115294, 1121658, 1249775, 2084180    

Description Petr Spacek 2014-07-15 12:03:15 UTC
Description of problem:
Support for RFC 5649 is a requirement for DNSSEC support in FreeIPA.

Patches were sent upstream: http://rt.openssl.org/Ticket/Display.html?id=3434

Comment 1 Petr Spacek 2014-07-21 08:05:17 UTC
Support was merged upstream. Please see upstream commit: https://github.com/openssl/openssl/commit/d31fed73e25391cd71a0de488d88724db78f6f8a

Could we delete condNAK: upstream?

Comment 11 Jiri Herrmann 2014-12-12 15:31:53 UTC
If this Feature should be included in the 7.1 Release Notes, could you please change the Doc Type from Enhancement to "Release Note"?

Note that the Release Notes are intended to list the most prominent and customer-relevant new features rather than every single enhancement.

Cheers,
Jirka

Comment 12 Tomas Mraz 2015-01-02 10:12:05 UTC
No release note needed.

Comment 14 errata-xmlrpc 2015-03-05 11:03:40 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://rhn.redhat.com/errata/RHBA-2015-0478.html