Hi Tomas,

You said that OpenSSH do not use the *FIPS_incore_fingerprint* call. But it
does *FIPS_mode_set* call and that does *FIPS_incore_fingerprint* call.

int FIPS_mode_set(int onoff)
    {
    int fips_set_owning_thread();
    int fips_clear_owning_thread();
    int ret = 0;

    fips_w_lock();
    fips_set_started();
    fips_set_owning_thread();

    if(onoff)
        {
        unsigned char buf[48];

        fips_selftest_fail = 0;
....

        if(!FIPS_check_incore_fingerprint())
            {
            fips_selftest_fail = 1;
            ret = 0;
            goto end;
            }
....
}

Did Red Hat Enterprise Linux OpenSSL and OpenSSH modules modify
FIPS_mode_set function, and this OpenSSL don't
use FIPS_check_incore_fingerprint() call ?

Regards,

Tatiana

2011/8/3 Tomas Mraz <[email protected]>

> On Wed, 2011-08-03 at 15:02 -0300, Tatiana Evers wrote:
> > Hi,
> >
> >
> > I'm a little confused with FIPS integrity test. I'm using openssh and
> > it is using fipscheck library (FIPSCHECK_verify) to verify integrity
> > of its binaries. But FIPS_mode_set function calls
> > FIPS_incore_fingerprint to verify in execution time the integrity of
> > the application. Why do we need an external validation?
> > Isn't FIPS_incore_fingerprint sufficient to verify integrity?
>
> You're mixing the OpenSSL upstream FIPS module with the Red Hat
> Enterprise Linux OpenSSL and OpenSSH modules. They use different
> integrity verification test and they do not use the
> FIPS_incore_fingerprint call.
> --
> Tomas Mraz
> No matter how far down the wrong road you've gone, turn back.
>                                              Turkish proverb
>
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> Development Mailing List                       [email protected]
> Automated List Manager                           [email protected]
>

Reply via email to