libica/libica-sles15sp5-FIPS-hmac-key.patch
Nikolay Gueorguiev e688997ad5 - Upgrade libica to version 4.4.0 (jsc#PED-3277, jsc#PED-10289)
* Updates for FIPS 140-3 certification 2024
  * Various bug fixes and housekeeping 
- Removed obsolete patches
  * libica-01-fips-update-remove-sigVer-from-fips-ECDSA-kat.patch
  * libica-02-fips-update-Change-service-indicator-implementation.patch
  * libica-03-fips-update-Dynamically-update-service-indicator-based-on-IV-usage.patch
  * libica-04-fips-update-provide-test-for-dynamic-service-indicator.patch

OBS-URL: https://build.opensuse.org/package/show/security:tls/libica?expand=0&rev=31
2024-12-31 10:55:20 +00:00

16 lines
713 B
Diff

--- libica-4.3.0/src/fips.c 2020-05-04 17:01:23.238805001 -0400
+++ libica-4.3.0/src/fips.c 2020-05-04 16:58:51.352241763 -0400
@@ -65,10 +65,9 @@
* integrity test. The recommended key size for HMAC-SHA256 is 64 bytes.
* The known HMAC is supposed to be provided as hex string in a file
* .libica.so.VERSION.hmac in the same directory as the .so module.
- */
+ /* HMAC key is hexidecimal for: "orboDeJITITejsirpADONivirpUkvarP" */
static const char hmackey[] =
- "0000000000000000000000000000000000000000000000000000000000000000"
- "0000000000000000000000000000000000000000000000000000000000000000";
+ "6f72626f44654a49544954656a7369727041444f4e6976697270556b76617250";
#endif /* ICA_INTERNAL_TEST */