Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
swtpm: Determine whether OpenSSL needs to be configured (FIPs, SHA1 s…
…ignature) Get the list of enabled 'RuntimeAlgorithms' from libtpms and determine whether any of these enabled algorithms is disabled in OpenSSL due to FIPS mode. If FIPS mode on the host is enabled then disabled FIPS mode in OpenSSL so that the TPM 2 can function properly. The following algorithms are disabled when OpenSSL is in FIPS mode: - camellia - rsaes - tdes - ECC keys <224 bits Per openssl-ciphers man page it should be possible to disable the following algorithms use by cipher-suites: - AES128, AES256, AES - CAMELLIA128, CAMELLIA256, CAMELLIA - 3DES - SHA1, SHA, SHA256, SHA384 - CBC WIP: It's not clear at what API level these are disabled. I have not been able to use !SHA256 to disabled SHA256. Also test whether signatures with SHA1 are working. Signed-off-by: Stefan Berger <stefanb@linux.ibm.com>
- Loading branch information