On Mon, Mar 5, 2018 at 3:04 AM, Dr. Matthias St. Pierre < matthias.st.pie...@ncp-e.com> wrote:
> > > On 05.03.2018 11:57, Dr. Matthias St. Pierre wrote: > > > > However, I am sceptical whether this approach will be accepted, > > because there are (at least) two potential problems: > > > > * Normally, it is mandatory to check the result of FIPS_mode_set() or > > FIPS_mode() to ensure that the FIPS initialization succeeded. However, > > an application which is not FIPS-aware won't check the result. > > * It can happen that applications which have their own configuration > > and enable/disable FIPS mode explicitely, call FIPS_mode_set(0) > > afterwards. > > > > > > HTH, > > Matthias > > > > One more obstacle: In FIPS mode it is not allowed to use low level > crypto algorithms, only the EVP interface is allowed. So most of your > non-fips-aware applications will malfunction when forced into FIPS mode. > The consequence is: it's probably not possible to do it. > Did you mean if an application uses the low level crypto algorithm functions (e.g. SHA256_Init/ SHA256_Update/ SHA256_Final) then they won't work under FIPS mode (and hence may cause unpredictable issues)? > > Matthias > > -- > openssl-users mailing list > To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users >
-- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users