Bug 1492784
| Summary: | new JSS failures: HMAC Unwrap and KeyWrapping FIPSMODE | |||
|---|---|---|---|---|
| Product: | Red Hat Enterprise Linux 7 | Reporter: | Matthew Harmsen <mharmsen> | |
| Component: | jss | Assignee: | Jack Magne <jmagne> | |
| Status: | CLOSED ERRATA | QA Contact: | ipa-qe <ipa-qe> | |
| Severity: | urgent | Docs Contact: | ||
| Priority: | urgent | |||
| Version: | 7.4 | CC: | aakkiang, cfu, edewata, elio.maldonado.batiz, extras-qa, jmagne, kengert, kwright, mharmsen, msauton, nkinder, rmeggins, rpattath | |
| Target Milestone: | rc | Keywords: | ZStream | |
| Target Release: | --- | |||
| Hardware: | All | |||
| OS: | Linux | |||
| Whiteboard: | ||||
| Fixed In Version: | jss-4.4.0-9.el7_4 | Doc Type: | No Doc Update | |
| Doc Text: |
Obscure issue created during development and solved before anything released.
|
Story Points: | --- | |
| Clone Of: | 1492781 | |||
| : | 1505690 (view as bug list) | Environment: | ||
| Last Closed: | 2018-04-10 17:56:52 UTC | Type: | Bug | |
| Regression: | --- | Mount Type: | --- | |
| Documentation: | --- | CRM: | ||
| Verified Versions: | Category: | --- | ||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
| Cloudforms Team: | --- | Target Upstream Version: | ||
| Embargoed: | ||||
| Bug Depends On: | 1492781 | |||
| Bug Blocks: | 1505690 | |||
|
Description
Matthew Harmsen
2017-09-18 15:42:44 UTC
Upstream checkin: author Jack Magne <jmagne> Thu, 28 Sep 2017 16:20:50 -0700 (3 weeks ago) changeset 2206 252c10f44897 parent 2205 3e9a5ae2149d push id 77 push user edewata push date 2017-10-05 20:11 +0000 bugs 1400884 Fix: Bug 1400884 - new JSS failures: HMAC Unwrap and KeyWrapping FIPSMODE. org/mozilla/jss/pkcs11/KeyType.java file | annotate | diff | comparison | revisions --- a/org/mozilla/jss/pkcs11/KeyType.java +++ b/org/mozilla/jss/pkcs11/KeyType.java @@ -199,19 +199,17 @@ public final class KeyType { KeyWrapAlgorithm.AES_KEY_WRAP, KeyWrapAlgorithm.AES_KEY_WRAP_PAD, EncryptionAlgorithm.AES_128_ECB, EncryptionAlgorithm.AES_128_CBC, EncryptionAlgorithm.AES_192_ECB, EncryptionAlgorithm.AES_192_CBC, EncryptionAlgorithm.AES_256_ECB, EncryptionAlgorithm.AES_256_CBC, - /* AES CBC PAD is the same as AES_256_CBC_PAD */ - /* shouldn't break backward compatibility 313798*/ - //EncryptionAlgorithm.AES_CBC_PAD, + EncryptionAlgorithm.AES_CBC_PAD, EncryptionAlgorithm.AES_128_CBC_PAD, EncryptionAlgorithm.AES_192_CBC_PAD, EncryptionAlgorithm.AES_256_CBC_PAD }, "AES" ); ////////////////////////////////////////////////////////////// [root@auto-hv-01-guest02 ~]# rpm -qi jss Name : jss Version : 4.4.0 Release : 9.el7_4 Architecture: x86_64 Install Date: Tue 14 Nov 2017 08:14:44 PM EST Group : System Environment/Libraries Size : 1029605 License : MPLv1.1 or GPLv2+ or LGPLv2+ Signature : RSA/SHA256, Fri 27 Oct 2017 02:50:00 PM EDT, Key ID 199e2f91fd431d51 Source RPM : jss-4.4.0-9.el7_4.src.rpm Build Date : Fri 27 Oct 2017 02:34:31 PM EDT Build Host : x86-039.build.eng.bos.redhat.com Relocations : (not relocatable) Packager : Red Hat, Inc. <http://bugzilla.redhat.com/bugzilla> Vendor : Red Hat, Inc. URL : http://www.mozilla.org/projects/security/pki/jss/ Summary : Java Security Services (JSS) Sanity testing using smartcards. Accidently marked the bug verified, moving back to ON_QA [root@nocp1 certdb]# rpm -qi jss Name : jss Version : 4.4.0 Release : 10.el7 Architecture: x86_64 Install Date: Tue 28 Nov 2017 02:30:31 PM EST Group : System Environment/Libraries Size : 1029659 License : MPLv1.1 or GPLv2+ or LGPLv2+ Signature : RSA/SHA256, Wed 01 Nov 2017 02:37:50 PM EDT, Key ID 199e2f91fd431d51 Source RPM : jss-4.4.0-10.el7.src.rpm Build Date : Wed 01 Nov 2017 02:19:14 PM EDT Build Host : x86-020.build.eng.bos.redhat.com Relocations : (not relocatable) Packager : Red Hat, Inc. <http://bugzilla.redhat.com/bugzilla> Vendor : Red Hat, Inc. URL : http://www.mozilla.org/projects/security/pki/jss/ Summary : Java Security Services (JSS) Sanity testing using smartcards. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2018:0958 |