-
Notifications
You must be signed in to change notification settings - Fork 172
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support for specifying PKCS#12 MAC parameters #772
Comments
You are right, the example code provided in #654 had another error and I skipped the main question. Should we add a binding for |
I think adding the PKCS12_set_mac() binding would be beneficial to maintain backward compatibility with legacy OpenSSL. |
rhenium
added a commit
to rhenium/ruby-openssl
that referenced
this issue
Aug 16, 2024
Add a binding for PKCS12_set_mac() to set MAC parameters and (re-)calculate MAC for the content. This allows generating PKCS ruby#12 with consistent MAC parameters with different OpenSSL versions. OpenSSL 3.0 changed the default hash function used for HMAC and the KDF from SHA-1 to SHA-256. Fixes: ruby#772
rhenium
added a commit
to rhenium/ruby-openssl
that referenced
this issue
Aug 16, 2024
Add a binding for PKCS12_set_mac() to set MAC parameters and (re-)calculate MAC for the content. This allows generating PKCS ruby#12 with consistent MAC parameters with different OpenSSL versions. OpenSSL 3.0 changed the default hash function used for HMAC and the KDF from SHA-1 to SHA-256. Fixes: ruby#772
rhenium
added a commit
to rhenium/ruby-openssl
that referenced
this issue
Aug 16, 2024
Add a binding for PKCS12_set_mac() to set MAC parameters and (re-)calculate MAC for the content. This allows generating PKCS ruby#12 with consistent MAC parameters with different OpenSSL versions. OpenSSL 3.0 changed the default hash function used for HMAC and the KDF from SHA-1 to SHA-256. Fixes: ruby#772
rhenium
added a commit
to rhenium/ruby-openssl
that referenced
this issue
Oct 31, 2024
Add a binding for PKCS12_set_mac() to set MAC parameters and (re-)calculate MAC for the content. This allows generating PKCS ruby#12 with consistent MAC parameters with different OpenSSL versions. OpenSSL 3.0 changed the default hash function used for HMAC and the KDF from SHA-1 to SHA-256. Fixes: ruby#772
rhenium
added a commit
to rhenium/ruby-openssl
that referenced
this issue
Oct 31, 2024
Add a binding for PKCS12_set_mac() to set MAC parameters and (re-)calculate MAC for the content. This allows generating PKCS ruby#12 with consistent MAC parameters with different OpenSSL versions. OpenSSL 3.0 changed the default hash function used for HMAC and the KDF from SHA-1 to SHA-256. Fixes: ruby#772
rhenium
added a commit
to rhenium/ruby-openssl
that referenced
this issue
Dec 7, 2024
Add a binding for PKCS12_set_mac() to set MAC parameters and (re-)calculate MAC for the content. This allows generating PKCS ruby#12 with consistent MAC parameters with different OpenSSL versions. OpenSSL 3.0 changed the default hash function used for HMAC and the KDF from SHA-1 to SHA-256. Fixes: ruby#772
rhenium
added a commit
to rhenium/ruby
that referenced
this issue
Dec 21, 2024
Add a binding for PKCS12_set_mac() to set MAC parameters and (re-)calculate MAC for the content. This allows generating PKCS ruby#12 with consistent MAC parameters with different OpenSSL versions. OpenSSL 3.0 changed the default hash function used for HMAC and the KDF from SHA-1 to SHA-256. Fixes: ruby/openssl#772 ruby/openssl@f5ed2a74b6
rhenium
added a commit
to rhenium/ruby
that referenced
this issue
Dec 21, 2024
Add a binding for PKCS12_set_mac() to set MAC parameters and (re-)calculate MAC for the content. This allows generating PKCS ruby#12 with consistent MAC parameters with different OpenSSL versions. OpenSSL 3.0 changed the default hash function used for HMAC and the KDF from SHA-1 to SHA-256. Fixes: ruby/openssl#772 ruby/openssl@f5ed2a74b6
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Issue #654 closed but it doesn't seem to be resolved.
Here's what we created using the legacy provider:
It uses sha256 instead of sha1.
current
OpenSSL::PKCS12.create
not support-macalg
pyca/cryptography#7293 (comment)
The text was updated successfully, but these errors were encountered: