FIPS-capable builds are not subject to any restrictions as to the
algorithms they can implement.  The only restriction is that, while in
FIPS mode (enabled by FIPS_mode_set()), the code within the
fipscanister is used for all cryptographic operations (including
encryption, decryption, hashing, and random number generation).

When they're not in FIPS mode, they don't have to use the Module's
code.  This means that they can implement whatever they want.

-Kyle H

On Sun, Jan 11, 2009 at 9:28 AM, PGNet <pgnet.trash+...@gmail.com> wrote:
> With the addition of fips object to the 'mix' of available build
> options, is openssl configure with
>
>  ./Configure ... enable-rc5 enable-mdc2 fips
>    (iiuc, CHANGES' stmt that 'idea' *is* enabled by default still holds?)
>
> sufficient to enable _all_ available algorithms, with the option to
> disable per-algorithm still as <no-xxx>?
>
> Reading SecuritPolicy-1.2.pdf @ "4.5  Cryptographic Algorithms", I note,
>
>  "The Module supports the following FIPS approved or allowed algorithms: ..."
>
> but am unclear as to which (any? all? none?) algos are enabled by
> default, per specification.  Is that specifically stated somewhere?
>
> Thanks.
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           majord...@openssl.org
>
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to