Thanks Steve. So, that means, I don't need to add FIPS_rand_* function.

For DH key exchange algorithm, do I need to explicitly disable calling of
DH function in my code if it is in FIPS?
Or is there any DH algorithms loading issue in openssl-fips-1.2 that I am
consuming?

Thanks,
~Vimol


On Mon, Jan 23, 2012 at 10:21 PM, Dr. Stephen Henson <st...@openssl.org>wrote:

> On Mon, Jan 23, 2012, Vimol Kshetrimayum wrote:
>
> > Hi,
> >
> >
> > I have an application which uses RSA or  Diffie Hellman (DH) algorithms
> for
> > key exchange and RAND_seed and RAND_bytes to generate pseudo random
> number.
> >
> >
> > Now, I have added FIPS_mode_set(1) to enable FIPS. As per openSSL-fips
> > security policy document, my expectation is DH and RAND_seed and
> > RAND_bytesfunction should not be loaded in FIPS mode. However, these
> > functions are
> > loaded and still working fine even in FIPS mode.
> >
> >
> > Is this expected behaviour?
> >
> >
> > If I want to disable all the non FIPS approved algorithms what is the
> best
> > practice?
> >
> >
> > I am consuming openSSL-fips-1.2.0 and openSSL-9.8r.
> >
>
> When FIPS mode is enabled the RAND functions are redirected to an FIPS
> approved PRNG.
>
> Steve.
> --
> Dr Stephen N. Henson. OpenSSL project core developer.
> Commercial tech support now available see: http://www.openssl.org
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           majord...@openssl.org
>

Reply via email to