forked from pool/libica
943bbccb27
- Added the following patches for FIPS certification (bsc#1162533) * libica-sles15sp2-FIPS-introduce-HMAC-based-library-integrity-check.patch * libica-sles15sp2-FIPS-hmac-key.patch - Added a BuildRequires for the fipscheck package. - Made a couple of changes to the spec file based upon recommendations by spec-cleaner. - Added the following patches for FIPS certification. * libica-sles15sp2-Fix-DES-and-TDES-key-length.patch (bsc#1166071) Although a DES key has only 56 effective bits, all 64 bits must be considered, because the parity bits are spread over all 8 bytes of the key. * libica-sles15sp2-FIPS-provide-output-iv-as-required-by-FIPS-tests.patch (bsc#1166210) FIPS tests require the output iv to be the iv resulting from decrypting the last block with a zero iv as input. * libica-sles15sp2-icainfo-bugfix-for-RSA-and-EC-related-info-for-softw.patch (bsc#1166224) The output from icainfo never shows 'yes' for RSA ME, RSA CRT, ECDH, ECDSA sign, ECDSA verify, and ECKGEN, due to the missing ICA_FLAG_SW flag in the icaList. OBS-URL: https://build.opensuse.org/request/show/801383 OBS-URL: https://build.opensuse.org/package/show/devel:openSUSE:Factory/libica?expand=0&rev=42
49 lines
1.9 KiB
Diff
49 lines
1.9 KiB
Diff
From a4a9381d1597b78374925385a6d71cf8ccb16c21 Mon Sep 17 00:00:00 2001
|
|
From: Joerg Schmidbauer <jschmidb@de.ibm.com>
|
|
Date: Fri, 27 Mar 2020 15:25:33 +0100
|
|
Subject: [PATCH] icainfo: bugfix for RSA and EC related info for software
|
|
column.
|
|
|
|
The software column did never show 'yes' for RSA ME, RSA CRT, ECDH,
|
|
ECDSA sign, ECDSA verify, and ECKGEN, due to the missing ICA_FLAG_SW
|
|
flag in the icaList.
|
|
|
|
Signed-off-by: Joerg Schmidbauer <jschmidb@de.ibm.com>
|
|
---
|
|
src/s390_crypto.c | 12 ++++++------
|
|
1 file changed, 6 insertions(+), 6 deletions(-)
|
|
|
|
diff --git a/src/s390_crypto.c b/src/s390_crypto.c
|
|
index ab7a269..8fb5662 100644
|
|
--- a/src/s390_crypto.c
|
|
+++ b/src/s390_crypto.c
|
|
@@ -489,10 +489,10 @@ libica_func_list_element_int icaList[] = {
|
|
{AES_GCM_KMA, MSA8, AES_128_GCM_ENCRYPT, 0, 0},
|
|
{AES_XTS, MSA4, AES_128_XTS_ENCRYPT, 0, 0},
|
|
{P_RNG, ADAPTER, 0, ICA_FLAG_SHW | ICA_FLAG_SW, 0}, // SHW (CPACF) + SW
|
|
- {EC_DH, ADAPTER, 0, 0, 0},
|
|
- {EC_DSA_SIGN, ADAPTER, 0, 0, 0},
|
|
- {EC_DSA_VERIFY, ADAPTER, 0, 0, 0},
|
|
- {EC_KGEN, ADAPTER, 0, 0, 0},
|
|
+ {EC_DH, ADAPTER, 0, ICA_FLAG_SW, 0},
|
|
+ {EC_DSA_SIGN, ADAPTER, 0, ICA_FLAG_SW, 0},
|
|
+ {EC_DSA_VERIFY, ADAPTER, 0, ICA_FLAG_SW, 0},
|
|
+ {EC_KGEN, ADAPTER, 0, ICA_FLAG_SW, 0},
|
|
{ED25519_KEYGEN, MSA9, SCALAR_MULTIPLY_ED25519, 0, 0},
|
|
{ED25519_SIGN, MSA9, EDDSA_SIGN_ED25519, 0, 0},
|
|
{ED25519_VERIFY, MSA9, EDDSA_VERIFY_ED25519, 0, 0},
|
|
@@ -503,8 +503,8 @@ libica_func_list_element_int icaList[] = {
|
|
{X25519_DERIVE, MSA9, SCALAR_MULTIPLY_X25519, 0, 0},
|
|
{X448_KEYGEN, MSA9, SCALAR_MULTIPLY_X448, 0, 0},
|
|
{X448_DERIVE, MSA9, SCALAR_MULTIPLY_X448, 0, 0},
|
|
- {RSA_ME, ADAPTER, 0, 0, 0},
|
|
- {RSA_CRT, ADAPTER, 0, 0, 0},
|
|
+ {RSA_ME, ADAPTER, 0, ICA_FLAG_SW, 0},
|
|
+ {RSA_CRT, ADAPTER, 0, ICA_FLAG_SW, 0},
|
|
{RSA_KEY_GEN_ME, ADAPTER, 0, ICA_FLAG_SW, 0}, // SW (openssl)
|
|
{RSA_KEY_GEN_CRT, ADAPTER, 0, ICA_FLAG_SW, 0}, // SW (openssl)
|
|
|
|
--
|
|
2.16.4
|
|
|