Bug 1371383
Summary: | RFE: scrypt rfc7914 addition to NSS | |||
---|---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | wibrown <wibrown> | |
Component: | nss | Assignee: | Bob Relyea <rrelyea> | |
Status: | CLOSED NEXTRELEASE | QA Contact: | BaseOS QE Security Team <qe-baseos-security> | |
Severity: | unspecified | Docs Contact: | ||
Priority: | high | |||
Version: | 7.2 | CC: | dueno, hkario, kengert, lucas.yamanishi, nmavrogi, rrelyea, szidek | |
Target Milestone: | rc | Keywords: | FutureFeature | |
Target Release: | 7.5 | |||
Hardware: | Unspecified | |||
OS: | Unspecified | |||
Whiteboard: | ||||
Fixed In Version: | Doc Type: | If docs needed, set a value | ||
Doc Text: | Story Points: | --- | ||
Clone Of: | ||||
: | 1468074 (view as bug list) | Environment: | ||
Last Closed: | 2017-07-06 00:27:59 UTC | Type: | Bug | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | ||||
Bug Blocks: | 1468074 |
Description
wibrown@redhat.com
2016-08-30 06:27:30 UTC
Any enhancement to the set of crypto algorithms supported by NSS will have to be requested and implemented by the upstream NSS development project. I couldn't fine an upstream bug, so nobody might have requested it yet. Who would like to file the upstream request? Bob, are you aware of anyone already working on scrypt at NSS upstream? No one is working on scrypt upstream. We would have to file an upstream bug and probably assign someone to it. Note that scrypt can also be used in PKCS#12 and PKCS#8 files; https://github.com/redhat-qe-security/keyfile-corpus/blob/master/rsa(2048%2Csha256)%2Cpkcs8(PBES2(scrypt(salt(8)%2CN(16384)%2Cr(8)%2Cp(1))%2Caes-256-cbc(IV(16))))%2Cpass(ascii).key https://github.com/redhat-qe-security/keyfile-corpus/blob/master/rsa(2048%2Csha256)%2Ccert%26key(PBES2(scrypt(salt(64)%2CN(16384)%2Cr(8)%2Cp(1))%2Caes-256-cbc(IV(16))))%2Cmac(sha512%2Csalt(64)%2Citer(1000000))%2Cpass(ascii).p12 |