1d20b5f
diff -up openssl-0.9.8j/crypto/o_init.c.fipsmode openssl-0.9.8j/crypto/o_init.c
1d20b5f
--- openssl-0.9.8j/crypto/o_init.c.fipsmode	2008-11-05 19:36:36.000000000 +0100
1d20b5f
+++ openssl-0.9.8j/crypto/o_init.c	2009-01-14 17:57:39.000000000 +0100
1d20b5f
@@ -59,6 +59,45 @@
1d20b5f
 #include <e_os.h>
1d20b5f
 #include <openssl/err.h>
1d20b5f
 
1d20b5f
+#ifdef OPENSSL_FIPS
1d20b5f
+#include <sys/types.h>
1d20b5f
+#include <sys/stat.h>
1d20b5f
+#include <fcntl.h>
1d20b5f
+#include <unistd.h>
1d20b5f
+#include <errno.h>
1d20b5f
+#include <stdlib.h>
1d20b5f
+#include <openssl/fips.h>
1d20b5f
+#include <openssl/evp.h>
1d20b5f
+#include <openssl/rand.h>
1d20b5f
+
1d20b5f
+#define FIPS_MODE_SWITCH_FILE "/proc/sys/crypto/fips_enabled"
1d20b5f
+
1d20b5f
+static void init_fips_mode(void)
1d20b5f
+	{
1d20b5f
+	char buf[2] = "0";
1d20b5f
+	int fd;
1d20b5f
+	
1d20b5f
+	if (getenv("OPENSSL_FORCE_FIPS_MODE") != NULL)
1d20b5f
+		{
1d20b5f
+		buf[0] = '1';
1d20b5f
+		}
1d20b5f
+	else if ((fd = open(FIPS_MODE_SWITCH_FILE, O_RDONLY)) >= 0)
1d20b5f
+		{
1d20b5f
+		while (read(fd, buf, sizeof(buf)) < 0 && errno == EINTR);
1d20b5f
+		close(fd);
1d20b5f
+		}
1d20b5f
+	/* Failure reading the fips mode switch file means just not
1d20b5f
+	 * switching into FIPS mode. We would break too many things
1d20b5f
+	 * otherwise. 
1d20b5f
+	 */
1d20b5f
+	
1d20b5f
+	if (buf[0] == '1')
1d20b5f
+		{
1d20b5f
+		FIPS_mode_set(1);
1d20b5f
+		}
1d20b5f
+	}
1d20b5f
+#endif
1d20b5f
+
1d20b5f
 /* Perform any essential OpenSSL initialization operations.
1d20b5f
  * Currently only sets FIPS callbacks
1d20b5f
  */
1d20b5f
@@ -73,11 +112,10 @@ void OPENSSL_init(void)
1d20b5f
 #ifdef CRYPTO_MDEBUG
1d20b5f
 		CRYPTO_malloc_debug_init();
1d20b5f
 #endif
1d20b5f
-#ifdef OPENSSL_ENGINE
1d20b5f
+		init_fips_mode();
1d20b5f
 		int_EVP_MD_init_engine_callbacks();
1d20b5f
 		int_EVP_CIPHER_init_engine_callbacks();
1d20b5f
 		int_RAND_init_engine_callbacks();
1d20b5f
-#endif
1d20b5f
 		done = 1;
1d20b5f
 		}
1d20b5f
 #endif