summaryrefslogtreecommitdiffstats
path: root/base/kra/shared
diff options
context:
space:
mode:
authorAde Lee <alee@redhat.com>2017-03-24 10:27:37 -0400
committerAde Lee <alee@redhat.com>2017-03-24 16:38:43 -0400
commitc063947c5a2e70ef588a796038c6e108ad013876 (patch)
tree81e5d07460c2ff7c7070fbbd3446719888d080d5 /base/kra/shared
parent874825f2d8e41b276aa3674d0cff5912dc6a55fa (diff)
downloadpki-c063947c5a2e70ef588a796038c6e108ad013876.tar.gz
pki-c063947c5a2e70ef588a796038c6e108ad013876.tar.xz
pki-c063947c5a2e70ef588a796038c6e108ad013876.zip
Modify storage unit to generate a new IV
Currently, the storage unit reuses the same IV each time a record is stored. This works (probably) for DES3, but not for AES. The getWrappingParams() method is modified to check the config as follows (in order): -- if the iv is defined, use that iv -- if the length is defined, generate a byte array of that length -- return null To ensure that the same IV used to encrypt the secret is stored in the DB, the wrapping param is defined once in the archival process, and passed in to the wrapping functions in storageUnit. Change-Id: Ia6696adf56fc7a4e90f83948c7549b64a38ab854
Diffstat (limited to 'base/kra/shared')
-rw-r--r--base/kra/shared/conf/CS.cfg2
1 files changed, 1 insertions, 1 deletions
diff --git a/base/kra/shared/conf/CS.cfg b/base/kra/shared/conf/CS.cfg
index a6e915d33..a38a3b174 100644
--- a/base/kra/shared/conf/CS.cfg
+++ b/base/kra/shared/conf/CS.cfg
@@ -285,7 +285,7 @@ kra.storageUnit.wrapping.1.payloadEncryptionPadding=PKCS5Padding
kra.storageUnit.wrapping.1.sessionKeyKeyGenAlgorithm=AES
kra.storageUnit.wrapping.1.payloadEncryptionAlgorithm=AES
kra.storageUnit.wrapping.1.payloadEncryptionMode=CBC
-kra.storageUnit.wrapping.1.payloadEncryptionIV=AQEBAQEBAQEBAQEBAQEBAQ==
+kra.storageUnit.wrapping.1.payloadEncryptionIVLen=16
kra.storageUnit.wrapping.1.payloadWrapAlgorithm=AES KeyWrap/Padding
kra.storageUnit.wrapping.1.sessionKeyType=AES
kra.storageUnit.wrapping.choice=1