On Mon, 2015-06-08 at 16:18 +0200, Petr Spacek wrote:
> Hello,
> 
> Update PKCS#11 mechanism constants for AES key wrapping to PKCS#11 v2.40.
> 
> SoftHSM 2.0.0rc1 was updates to these new constants to avoid collision with
> Blowfish mechanisms.
> 
> 
> Older code *cannot* work SoftHSM 2.0.0rc1 and newer.
> 
> Symptoms include errors like this:
> 
> On DNSSEC key master:
> ipa-ods-exporter: _ipap11helper.Error: Error at key wrapping: get buffer
> length: 0x70
> 
> On DNSSEC replicas:
> ipa-dnskeysyncd: subprocess.CalledProcessError: Command
> ''/usr/libexec/ipa/ipa-dnskeysync-replica'' returned non-zero exit status 1
> 

Does this affect domains where some replicas use older versions and some
replicas newer versions ? Or is this a purely local issues confined to a
specific replica ?

Simo.

-- 
Simo Sorce * Red Hat, Inc * New York

-- 
Manage your subscription for the Freeipa-devel mailing list:
https://www.redhat.com/mailman/listinfo/freeipa-devel
Contribute to FreeIPA: http://www.freeipa.org/page/Contribute/Code

Reply via email to