[openssl/openssl] 12d299: fips: document that the EdDSA algorithms are not-v...

Pauli noreply at github.com
Tue Jan 24 12:38:45 UTC 2023


  Branch: refs/heads/openssl-3.1
  Home:   https://github.com/openssl/openssl
  Commit: 12d2997109f90e6638e38d962011b4860b480aa3
      https://github.com/openssl/openssl/commit/12d2997109f90e6638e38d962011b4860b480aa3
  Author: Pauli <pauli at openssl.org>
  Date:   2023-01-24 (Tue, 24 Jan 2023)

  Changed paths:
    M doc/man7/OSSL_PROVIDER-FIPS.pod
    M doc/man7/fips_module.pod
    M doc/man7/migration_guide.pod

  Log Message:
  -----------
  fips: document that the EdDSA algorithms are not-validated

Ed25519 and Ed448 are included in the FIPS 140-3 provider for
compatibility purposes but are flagged as "fips=no" to prevent their accidental
use.  This therefore requires that applications always specify the "fips=yes"
property query to enforce FIPS correctness.

Reviewed-by: Tomas Mraz <tomas at openssl.org>
Reviewed-by: Hugo Landau <hlandau at openssl.org>
(Merged from https://github.com/openssl/openssl/pull/20079)

(cherry picked from commit 8353b2dfacd723db5ba8b833b95e68e9600d1cf5)


  Commit: 6f09571af0e1f2ed654730669113ed76500ed3c8
      https://github.com/openssl/openssl/commit/6f09571af0e1f2ed654730669113ed76500ed3c8
  Author: Pauli <pauli at openssl.org>
  Date:   2023-01-24 (Tue, 24 Jan 2023)

  Changed paths:
    M providers/fips/fipsprov.c

  Log Message:
  -----------
  Put X25519 and X448 back as approved algorithms

CMVP's answer when questioned about this being:

    X448 and X25519 uses Curve448 and Curve25519, respectfully, within an
    ECDH scheme.  Therefore, it is possible for a key agreement scheme
    that uses Curve448 and Curve25519 to be used in the approved mode
    and be viewed as an allowed algorithm if requirements of Scenario
    X2 of IG D.8 and IG A.2 are met (or Scenario 3 of D.F and IG C.A for
    FIPS 140-3).  The use of EdDSA in the approved mode is not permitted
    until FIPS 186-5 is published and part of CMVP guidance.

Reviewed-by: Tomas Mraz <tomas at openssl.org>
Reviewed-by: Hugo Landau <hlandau at openssl.org>
(Merged from https://github.com/openssl/openssl/pull/20079)

(cherry picked from commit 8948b5749410084ed1dfabf17a90df65efcf0f82)


  Commit: d702d0144f8e1cead044d22ac1507043f8eac038
      https://github.com/openssl/openssl/commit/d702d0144f8e1cead044d22ac1507043f8eac038
  Author: Pauli <pauli at openssl.org>
  Date:   2023-01-24 (Tue, 24 Jan 2023)

  Changed paths:
    M CHANGES.md

  Log Message:
  -----------
  changes entry about non-approved FIPS algorithms

Reviewed-by: Tomas Mraz <tomas at openssl.org>
Reviewed-by: Hugo Landau <hlandau at openssl.org>
(Merged from https://github.com/openssl/openssl/pull/20079)

(cherry picked from commit d4e105f6d53002ebaac2caf0c723bbf734f4a21a)


  Commit: c46385e996fbebab4ad25da5c1bd9a9f9051e250
      https://github.com/openssl/openssl/commit/c46385e996fbebab4ad25da5c1bd9a9f9051e250
  Author: Pauli <pauli at openssl.org>
  Date:   2023-01-24 (Tue, 24 Jan 2023)

  Changed paths:
    M test/fips-and-base.cnf

  Log Message:
  -----------
  test: note that a default property query must be included for FIPS validity

Reviewed-by: Tomas Mraz <tomas at openssl.org>
Reviewed-by: Hugo Landau <hlandau at openssl.org>
(Merged from https://github.com/openssl/openssl/pull/20079)

(cherry picked from commit d8523bf16205399363604c8fc90256791ad8c019)


Compare: https://github.com/openssl/openssl/compare/f0af262bd8d0...c46385e996fb


More information about the openssl-commits mailing list