Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Rule to check for insufficient key size to HMAC #390

Merged
merged 1 commit into from
Mar 27, 2024

Conversation

ericwb
Copy link
Contributor

@ericwb ericwb commented Mar 26, 2024

HMAC algorithms require a minimum key size that corresponds to their digest size. Using a size less than the digest size is considered weak.

@ericwb ericwb force-pushed the hmac_weak_key branch 5 times, most recently from 901f0ed to 48fe9de Compare March 26, 2024 23:58
HMAC algorithms require a minimum key size that corresponds to
their digest size. Using a size less than the digest size is
considered weak.

Signed-off-by: Eric Brown <eric.brown@securesauce.dev>
@ericwb ericwb merged commit a519096 into securesauce:main Mar 27, 2024
7 checks passed
@ericwb ericwb deleted the hmac_weak_key branch March 27, 2024 01:59
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

1 participant