mirror of
https://github.com/QuasarApp/openssl.git
synced 2025-05-11 17:09:40 +00:00
Ignore entropy from RAND_add()/RAND_seed() in FIPS mode [fixup]
Small correction to RAND_DRBG(7) (amends 3a50a8a91ad1) Reviewed-by: Paul Dale <paul.dale@oracle.com> (Merged from https://github.com/openssl/openssl/pull/8909)
This commit is contained in:
parent
3a50a8a91a
commit
ffa9bff8a2
@ -265,9 +265,9 @@ from the trusted entropy sources.
|
|||||||
=back
|
=back
|
||||||
|
|
||||||
NOTE: Manual reseeding is *not allowed* in FIPS mode, because
|
NOTE: Manual reseeding is *not allowed* in FIPS mode, because
|
||||||
NIST SP-800-90A mandates that entropy *shall not* be provided by the
|
[NIST SP-800-90Ar1] mandates that entropy *shall not* be provided by
|
||||||
consuming application, neither for instantiation, nor for reseeding.
|
the consuming application for instantiation (Section 9.1) or
|
||||||
[NIST SP 800-90Ar1, Sections 9.1 and 9.2]. For that reason the B<randomness>
|
reseeding (Section 9.2). For that reason, the B<randomness>
|
||||||
argument is ignored and the random bytes provided by the L<RAND_add(3)> and
|
argument is ignored and the random bytes provided by the L<RAND_add(3)> and
|
||||||
L<RAND_seed(3)> calls are treated as additional data.
|
L<RAND_seed(3)> calls are treated as additional data.
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user