'no-asm' used to be a violation of the security policy with the 1.1.x
series, but it is explicitly allowed in the 1.2 policy.

If you read it, you too will see this. :)

-Kyle H

On Fri, Jan 9, 2009 at 3:13 PM, PGNet <pgnet.trash+...@gmail.com> wrote:
> Kyle,
>
> On Fri, Jan 9, 2009 at 2:37 PM, Kyle Hamilton <aerow...@gmail.com> wrote:
>> Delete the directory, untar it fresh, and reconfigure with that config line.
>
> ok,
>
>> rm -rf openssl-fips-1.2
>> tar zxf openssl-fips-1.2.tar.gz
>> cd openssl-fips-1.2/
>    Directory: /usr/local/src/openssl/openssl-fips-1.2
>> ./config fipscanisterbuild no-asm
>  Operating system: i686-whatever-linux2
>  Configuring for linux-elf
>  Configuring for linux-elf
>    no-asm          [option]   OPENSSL_NO_ASM
>    ...
>  make[1]: Nothing to be done for `all'.
>  make[1]: Leaving directory `/usr/local/src/openssl/openssl-fips-1.2/tools'
>>
>
>> What you're seeing is a situation caused by prior builds not being
>> completely cleaned.  The problem is that if you do anything that isn't
>> in the security policy (including 'make clean'), the result cannot be
>> claimed to be FIPS-validated.
>
> got it. but it poses an interesting quandary ... isn't adding "no-asm"
> (or anything, for that matter) to the command line in violation of the
> security policy as well?
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           majord...@openssl.org
>
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to