Thanks for the pointer - I should have found that myself!

I was thinking 2012 pre-dated the 2.0 FIPS module validation so the change
might have been picked up, but 2.0 started in 2011 so I understand your
point.

Kevin

On Tue, Nov 4, 2014 at 3:22 AM, Andy Polyakov via RT <r...@openssl.org> wrote:

> > Building openssl-fips-2.0.6 for linux-x86_64, using gcc 4.8.2 and I am
> > seeing these same warnings on three files:
> > cbc128.c
> > ccm128.c
> > gcm128.c
> >
> > This is first time I've built the FIPS module for this target. For other
> > targets I've built (using much older gcc cross-compilers, admittedly), I
> > have not seen such warnings.
> >
> > I'm not clear which patch Andy is referring to that fixed them for
> openssl
> > itself in 2012,
>
> 'git log crypto/modes/cbc128.c', 'git log crypto/modes/gcm128.c' tell
> the story. Alternatively you can browse trees at git.openssl.org and
> look at histories for files in question.
>
> > or if those fixes were applied to the openssl-fips (I would
> > think so..).
>
> No. Once validated, FIPS module does not change. Relevant question in
> this case is whether or not can you ignore the warnings. Or more
> specifically if it's *safe* to ignore. Well, nobody can give you
> guarantees (it's simply prohibitive to verify machine code), but I'd say
> that as long as tests pass...
>
>
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> Development Mailing List                       openssl-dev@openssl.org
> Automated List Manager                           majord...@openssl.org
>

Reply via email to