Thank you David for your bluntness. Trust me, I'm aware of how significant
making wpa_supplicant FIPSable is. I've been working on it for several
months. Over the past few months I've been in the process of removing
non-compliant code, updating MD5 to SHA-1, etc. I'm close for the AP side
with hostapd and have pulled out a lot from wpa_supplicant until this latest
issue I seemed to be doing OK. You mentioned that SSL v3 uses MD5 but I read
that was the difference between v2 and v3 is that v3 went to SHA-1. Does v3
have a mixture of the two? What determines which SSL version is used? Is it
the CTX object, a configuration setting, etc.? I've tried tracing the code
on the OpenSSL side but it has me baffled even with a stack trace I'm having
trouble understanding its path. I would appreciate any help you can give on
the issue.

On Mon, Jul 20, 2009 at 10:03 PM, David Schwartz <dav...@webmaster.com>wrote:

>
> Michael Kurecka:
>
> > How do I disable SSLv3 so that I can use FIPS?
>
> Sorry to be blunt, but you don't. A FIPS wpa_supplicant is a significant
> task, you can't just flip a few switches and make one appear.
>
> DS
>
>
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           majord...@openssl.org
>

Reply via email to