Mark Parr wrote: > Use of the FIPS OpenSSL is a mandated thing and not just something that we > are looking to do for the fun of it. In fact, the base OpenSSL was working > fine using the "FIPS AES 256 encryption" in a non "FIPS Certified" mode. > > ...
Yes, that was my assumption and the point I was trying to make: if you want to build your product from source in a clean and logical way then just leave the FIPS module creation out of it. You will suffer less hair-pulling and tooth gnashing. If you must use the FIPS validated module then IMHO your best approach is to build the validated module *once*, by hand with careful documentation, and henceforth just use that resulting validated binary. Otherwise you're trying to perform what is effectively a ritual ceremony in an inappropriate secular context: from the CMVP perspective the source code itself isn't validated, only the resulting binary when the specific peculiar build process has been followed, i.e. the "ritual". Perform that ritual once and you have one validated module that you can use many times -- perform it multiple times and you have multiple different validated modules. Or, here's another way to look at it. I can take the same source code and generate binaries two different ways, one by following the ritual and one by deviating from the ritual in some technically trivial way (by, say, adding a superfluous "--prefix" config option). The resulting binaries are functionally identical by any technical test that could be devised, yet one module is FIPS 140-2 validated and one isn't. -Steve M. -- Steve Marquess OpenSSL Software Foundation, Inc. 1829 Mount Ephraim Road Adamstown, MD 21710 USA +1 877-673-6775 marqu...@opensslfoundation.com ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager majord...@openssl.org