Date: Tue, 29 May 2018 16:50:35 +0000 From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 222684] IPv6 AH hmac-sha2-384 is incompatible with Linux AH hmac(sha384) Message-ID: <bug-222684-227-uejkqzHHag@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-222684-227@https.bugs.freebsd.org/bugzilla/> References: <bug-222684-227@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D222684 --- Comment #6 from Jason Mader <jasonmader@gmail.com> --- (In reply to Conrad Meyer from comment #5) Nope, only because I don't believe Linux ip xfrm has that algorithm,=20 >From IP-XFRM(8): Authentication algorithms include digest_null, hmac(md5), hmac(sha1), hmac(sha256), hmac(sha384), hmac(sha512), hmac(rmd610), and xcbc(aes). Here's what I saw yesterday about the security audit, http://blog.netbsd.org/tnf/entry/network_security_audit --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-222684-227-uejkqzHHag>