The fipsinstall program runs the platform tests. I.e. you need to run fipsinstall on the device at some point.
> Or are you suggesting that the presence of a standalone tool might influence > the contents of such a security policy? Yes. Well maybe. I’ll posit the possibility at the next planning meeting. Pauli -- Dr Paul Dale | Distinguished Architect | Cryptographic Foundations Phone +61 7 3031 7217 Oracle Australia > On 28 Jul 2020, at 9:51 am, Thomas Dwyer III <tom...@tomiii.com> wrote: > > On Mon, Jul 27, 2020 at 3:39 PM Dr Paul Dale <paul.d...@oracle.com > <mailto:paul.d...@oracle.com>> wrote: > These are questions better asked of a FIPS lab since they are the experts and > we are not. > > > > That is a fair response. > > > I expect that your alternative installation process’s validity will depend on > the security policy and what it says needs to be done. This hasn’t been > written yet so there is no answer at this point. > > Skipping the self tests is definitely not permitted. The full suite of self > tests *must* be run before the module can be used. > > > > Oops, I didn't mean to suggest skipping the self-tests. I was talking about > the callback that fipsinstall currently uses to display results and/or inject > faults in the self-tests. I don't think I need that. As long as > OSSL_PROVIDER_load() succeeds it seems safe (?) to assume that all the > self-tests passed at some point. > > > > You question prompts the possibility of making fipsinstall a standalone > executable, this is something we could look into if we get time. I expect > we’d look favourably on a pull request that allowed either or both options. > > > > This is encouraging. However, since there is no draft security policy written > yet would this be premature? Or are you suggesting that the presence of a > standalone tool might influence the contents of such a security policy? > > > Thanks, > Tom.III > > > > Pauli > -- > Dr Paul Dale | Distinguished Architect | Cryptographic Foundations > Phone +61 7 3031 7217 > Oracle Australia > > > > >> On 28 Jul 2020, at 6:19 am, Thomas Dwyer III <tom...@tomiii.com >> <mailto:tom...@tomiii.com>> wrote: >> >> Hi all, >> >> I'm replacing OpenSSL 1.0.2 with OpenSSL 3.0 in an embedded environment with >> very limited flash space. We need and use libcrypto and libssl but we have >> no need for the openssl binary. To date it was never necessary to ship this >> utility in our product. Now with OpenSSL 3.0 it appears the only way to get >> FIPS support is to run "openssl fipsinstall ..." to create a FIPS config >> file to be included by the main config file. However, at nearly 1MB in size >> this binary is prohibitively large. >> >> I am able to reproduce the output of "openssl fipsinstall ..." with a >> (considerably smaller) standalone tool that links with libcrypto and >> generates HMAC-SHA256 (using FIPS_KEY_STRING from fipskey.h) but I'm unclear >> on what the actual FIPS requirements are for this. Would I still be >> considered FIPS compliant if I use my own standalone tool instead of the >> openssl binary to generate the FIPS config? I presume I don't need to bother >> with the self-test callback and that it only matters whether or not >> OSSL_PROVIDER_load(NULL, "fips") succeeds? >> >> >> Thanks, >> Tom.III >> >