forked from wolfSSL/wolfssl
FIPS Revalidation
1. Enable SHA-224 by default if building for FIPSv2.
This commit is contained in:
@@ -2043,8 +2043,9 @@ then
|
|||||||
AM_CFLAGS="$AM_CFLAGS -DHAVE_FIPS"
|
AM_CFLAGS="$AM_CFLAGS -DHAVE_FIPS"
|
||||||
# Add the FIPS flag.
|
# Add the FIPS flag.
|
||||||
AS_IF([test "x$FIPS_VERSION" = "xv2"],
|
AS_IF([test "x$FIPS_VERSION" = "xv2"],
|
||||||
[AM_CFLAGS="$AM_CFLAGS -DHAVE_FIPS_VERSION=2 -DWOLFSSL_KEY_GEN"
|
[AM_CFLAGS="$AM_CFLAGS -DHAVE_FIPS_VERSION=2 -DWOLFSSL_KEY_GEN -DWOLFSSL_SHA224"
|
||||||
ENABLED_KEYGEN="yes"
|
ENABLED_KEYGEN="yes"
|
||||||
|
ENABLED_SHA224="yes"
|
||||||
AS_IF([test "x$ENABLED_AESCCM" != "xyes"],
|
AS_IF([test "x$ENABLED_AESCCM" != "xyes"],
|
||||||
[ENABLED_AESCCM="yes"
|
[ENABLED_AESCCM="yes"
|
||||||
AM_CFLAGS="$AM_CFLAGS -DHAVE_AESCCM"])
|
AM_CFLAGS="$AM_CFLAGS -DHAVE_AESCCM"])
|
||||||
@@ -2090,7 +2091,7 @@ AM_CONDITIONAL([BUILD_SELFTEST], [test "x$ENABLED_SELFTEST" = "xyes"])
|
|||||||
SHA224_DEFAULT=no
|
SHA224_DEFAULT=no
|
||||||
if test "$host_cpu" = "x86_64" || test "$host_cpu" = "aarch64"
|
if test "$host_cpu" = "x86_64" || test "$host_cpu" = "aarch64"
|
||||||
then
|
then
|
||||||
if test "x$ENABLED_FIPS" = "xno"
|
if test "x$ENABLED_FIPS" = "xno" || test "x$FIPS_VERSION" = "xv2"
|
||||||
then
|
then
|
||||||
SHA224_DEFAULT=yes
|
SHA224_DEFAULT=yes
|
||||||
fi
|
fi
|
||||||
|
Reference in New Issue
Block a user