From dfa2cc4fff78f3472dde1be61c432c7191af7590 Mon Sep 17 00:00:00 2001 From: Hylke Bons Date: Sat, 10 Mar 2018 12:34:18 +0000 Subject: [PATCH] ssh fetcher: Since MD5 -> SHA256 move Windows FIPS warning is no longer needed --- Sparkles/SSHFetcher.cs | 14 +------------- 1 file changed, 1 insertion(+), 13 deletions(-) diff --git a/Sparkles/SSHFetcher.cs b/Sparkles/SSHFetcher.cs index 9f3d609f..b86bef1e 100644 --- a/Sparkles/SSHFetcher.cs +++ b/Sparkles/SSHFetcher.cs @@ -44,19 +44,7 @@ namespace Sparkles { } if (RequiredFingerprint != null) { - string host_fingerprint; - - try { - host_fingerprint = DeriveFingerprint (host_key); - - } catch (InvalidOperationException e) { - // "Unapproved cryptographic algorithms" won't work when FIPS is enabled on Windows. - // Software like Cisco AnyConnect can demand this feature is on, so we show an error - Logger.LogInfo ("Auth", "Unable to derive fingerprint: ", e); - errors.Add ("error: Can't check fingerprint due to FIPS being enabled"); - - return false; - } + string host_fingerprint = DeriveFingerprint (host_key); if (host_fingerprint == null || RequiredFingerprint!= host_fingerprint) { Logger.LogInfo ("Auth", "Fingerprint doesn't match");