Hi All:
>From the OpenSSL FIPS Security Policy chapter 4, it mentioned there are a
number of non-FIPS approved algorithms/ services which are still
implemented by the FIPS canister modules (e.g. RSA, DSA, DRDB, ECDSA etc).
Just wondering why these algorithms are still implemented by FIPS Canister
wrote:
>
> Am 05.03.2018 um 19:55 schrieb Alan Dean:
> > Thanks a lot Matthias for the suggestion.
> >
> > I have few follow-up questions below:
> >
>
> Please see my other replies.
>
> --
> openssl-users mailing list
> To unsubscribe: https://mta.openssl.
On Mon, Mar 5, 2018 at 3:04 AM, Dr. Matthias St. Pierre <
matthias.st.pie...@ncp-e.com> wrote:
>
>
> On 05.03.2018 11:57, Dr. Matthias St. Pierre wrote:
> >
> > However, I am sceptical whether this approach will be accepted,
> > because there are (at least) two potential problems:
> >
> > * Normal
Thanks a lot Matthias for the suggestion.
I have few follow-up questions below:
On Mon, Mar 5, 2018 at 2:57 AM, Dr. Matthias St. Pierre <
matthias.st.pie...@ncp-e.com> wrote:
>
>
> On 05.03.2018 10:46, Alan Dean wrote:
>
> Question 1: Is it even feasible to make the FIPS mo
Hi All:
I am working on a project to integrate the OpenSSL FIPS capable library
into our product platform. (We will be doing our own FIPS 140-2 level 1
certification)
There are a large number of third party applications/ library (e.g. wget,
libcurl, postfix, etc) run on our platform which use Ope