Skip to content

Conversation

@junaruga
Copy link
Member

This PR is working in progress.

I see the test failures on LibreSSL and AWS-LC cases.


  • Use the AES-256-CBC using PBKDF2 which is FIPS-approved, instead of the PBE-SHA1-3DES using PKCS12KDF which is not FIPS-approved. See also the man page openssl-pkcs12(1).
  • OpenSSL::PKCS12.create calling the PKCS12_create has the argument mac_iter which uses a MAC key using PKCS12KDF which is not FIPS-approved. In the FIPS case, set the mac_iter = -1 to omit the MAC key. See also the man page PKCS12_create(3).
  • As the test data OpenSSL::PKCS12.new calling PKCS12_parse verifies the MAC using PKCS12KDF which is not FIPS-approved, I created the test data without MAC by the openssl pkcs12 -nomac.

* Use the `AES-256-CBC` using `PBKDF2` which is FIPS-approved, instead of the
  `PBE-SHA1-3DES` using `PKCS12KDF` which is not FIPS-approved. See also the man
  page openssl-pkcs12(1).
* `OpenSSL::PKCS12.create` calling the `PKCS12_create` has the argument
  `mac_iter` which uses a MAC key using `PKCS12KDF` which is not FIPS-approved.
  In the FIPS case, set the `mac_iter = -1` to omit the MAC key. See also the
  man page PKCS12_create(3).
* As the test data `OpenSSL::PKCS12.new` calling `PKCS12_parse` verifies the MAC
  using `PKCS12KDF` which is not FIPS-approved, I created the test data without
  MAC by the `openssl pkcs12 -nomac`.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant