You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* allow for fips-dev in v7|ready|dev ENABLED_SHA256_DRBG and ENABLED_SHA512_DRBG setup and change from AC_MSG_WARN to AC_MSG_ERROR if user tries to disable outside fips-dev;
* set ENABLED_SHA512_DRBG=no in lean-aesgcm setup;
wolfcrypt/test/test.c: suppress concurrency-mt-unsafe in myFipsCb();
.wolfssl_known_macro_extras: fix lexical order.
Copy file name to clipboardExpand all lines: configure.ac
+9-8Lines changed: 9 additions & 8 deletions
Original file line number
Diff line number
Diff line change
@@ -6350,14 +6350,14 @@ AS_CASE([$FIPS_VERSION],
6350
6350
SLHDSA_PARAM_SHA2_256F="yes"])
6351
6351
6352
6352
# SHA-256 DRBG -- cannot be disabled at build time in FIPS mode
6353
-
AS_IF([test "$enable_sha256_drbg" = "no"],
6354
-
[AC_MSG_WARN([Can not disable SHA256-DRBG at build time in FIPS mode, disable at run-time with wc_Sha256Drbg_Disable() or wc_Sha256Drbg_Disable_fips()])])
6355
-
ENABLED_SHA256_DRBG="yes"
6353
+
AS_IF([test "$ENABLED_SHA256_DRBG" != "yes" &&
6354
+
test "$FIPS_VERSION" != "dev"],
6355
+
[AC_MSG_ERROR([Can not disable SHA256-DRBG at build time in FIPS mode. Disable at run-time with wc_Sha256Drbg_Disable() or wc_Sha256Drbg_Disable_fips()])])
6356
6356
6357
6357
# SHA-512 DRBG -- cannot be disabled at build time in FIPS mode
6358
-
AS_IF([test "$enable_sha512_drbg" = "no"],
6359
-
[AC_MSG_WARN([Can not disable SHA512-DRBG at build time in FIPS mode, disable it at run-time with wc_Sha512Drbg_Disable() or wc_Sha512Drbg_Disable_fips()])])
6360
-
ENABLED_SHA512_DRBG="yes"
6358
+
AS_IF([test "$ENABLED_SHA512_DRBG" != "yes" &&
6359
+
test "$FIPS_VERSION" != "dev"],
6360
+
[AC_MSG_ERROR([Can not disable SHA512-DRBG at build time in FIPS mode. Disable it at run-time with wc_Sha512Drbg_Disable() or wc_Sha512Drbg_Disable_fips()])])
6361
6361
6362
6362
# Old TLS requires MD5 + HMAC, which is not allowed under FIPS 140-3
6363
6363
AS_IF([test "$ENABLED_OLD_TLS" != "no"],
@@ -6683,7 +6683,7 @@ AS_CASE([$FIPS_VERSION],
6683
6683
6684
6684
AS_IF([test "$ENABLED_SHA512" != "no" &&
6685
6685
(test "$FIPS_VERSION" != "lean-aesgcm-dev" || test "$enable_sha512" != "yes")],
0 commit comments