mirror of
https://github.com/openssl/openssl.git
synced 2024-11-27 05:21:51 +08:00
92c03668c0
The change to a more configuration based approach to enable FIPS mode operation highlights a shortcoming in the default should do something approach we've taken for bad configuration files. Currently, a bad configuration file will be automatically loaded and once the badness is detected, it will silently stop processing the configuration and continue normal operations. This is good for remote servers, allowing changes to be made without bricking things. It's bad when a user thinks they've configured what they want but got something wrong and it still appears to work. Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com> (Merged from https://github.com/openssl/openssl/pull/16171)
20 lines
474 B
INI
20 lines
474 B
INI
openssl_conf = openssl_init
|
|
|
|
# Comment out the next line to ignore configuration errors
|
|
config_diagnostics = 1
|
|
|
|
.include fipsmodule.cnf
|
|
|
|
[openssl_init]
|
|
providers = provider_sect
|
|
alg_section = evp_properties
|
|
|
|
[evp_properties]
|
|
# Ensure FIPS non-approved algorithms in the FIPS module are suppressed (e.g.
|
|
# TEST-RAND). This also means that EVP_default_properties_is_fips_enabled()
|
|
# returns the expected value
|
|
default_properties = "fips=yes"
|
|
|
|
[provider_sect]
|
|
fips = fips_sect
|