diff options
author | wtc%netscape.com <devnull@localhost> | 2002-07-31 00:55:35 +0000 |
---|---|---|
committer | wtc%netscape.com <devnull@localhost> | 2002-07-31 00:55:35 +0000 |
commit | 26ddc781050bc08b2f0b579a44353e3d2076b1ad (patch) | |
tree | 956d6b54f6ec601ac701563a3385d2ec0ba3c991 | |
parent | 2d8e3b1f32cc4c5ca2e320046b611223682282cd (diff) | |
download | nss-hg-26ddc781050bc08b2f0b579a44353e3d2076b1ad.tar.gz |
Bug 148220: FIPS 198's key size requirement broke the NSS QA. Backing it
out.
-rw-r--r-- | security/nss/lib/softoken/alghmac.c | 5 |
1 files changed, 0 insertions, 5 deletions
diff --git a/security/nss/lib/softoken/alghmac.c b/security/nss/lib/softoken/alghmac.c index c138e0f45..0b9ae6642 100644 --- a/security/nss/lib/softoken/alghmac.c +++ b/security/nss/lib/softoken/alghmac.c @@ -64,11 +64,6 @@ HMAC_Create(const SECHashObject *hash_obj, const unsigned char *secret, int i; unsigned char hashed_secret[SHA1_LENGTH]; - /* required by FIPS 198 */ - if (secret_len < hash_obj->length/2) { - PORT_SetError(SEC_ERROR_INVALID_ARGS); - return NULL; - } cx = (HMACContext*)PORT_ZAlloc(sizeof(HMACContext)); if (cx == NULL) return NULL; |