openssl/crypto/rand
Pauli 8094a69458 Squashed commit of the following:
Digest stored entropy for CRNG test.

Via the FIPS lab, NIST confirmed:

    The CMVP had a chance to discuss this inquiry and we agree that
    hashing the NDRNG block does meet the spirit and letter of AS09.42.

    However, the CMVP did have a few questions: what hash algorithm would
    be used in this application? Is it approved? Is it CAVs tested?

SHA256 is being used here and it will be both approved and CAVs tested.

This means that no raw entropy needs to be kept between RNG seedings, preventing
a potential attack vector aganst the randomness source and the DRBG chains.

It also means the block of secure memory allocated for this purpose is no longer
required.

Reviewed-by: Matthias St. Pierre <Matthias.St.Pierre@ncp-e.com>
(Merged from https://github.com/openssl/openssl/pull/8790)
2019-04-30 13:43:19 +10:00
..
build.info Add the FIPS related continuous random number generator (CRNG) testing. 2019-03-29 17:50:48 +10:00
drbg_ctr.c Reseeding without derivation function is not supported in FIPS mode. 2019-04-11 08:52:22 +10:00
drbg_hash.c Following the license change, modify the boilerplates in crypto/rand/ 2018-12-06 15:14:05 +01:00
drbg_hmac.c Following the license change, modify the boilerplates in crypto/rand/ 2018-12-06 15:14:05 +01:00
drbg_lib.c Add the FIPS related continuous random number generator (CRNG) testing. 2019-03-29 17:50:48 +10:00
rand_crng_test.c Squashed commit of the following: 2019-04-30 13:43:19 +10:00
rand_egd.c Following the license change, modify the boilerplates in crypto/rand/ 2018-12-06 15:14:05 +01:00
rand_err.c Reseeding without derivation function is not supported in FIPS mode. 2019-04-11 08:52:22 +10:00
rand_lcl.h Squashed commit of the following: 2019-04-30 13:43:19 +10:00
rand_lib.c Add prediction resistance capability to the DRBG reseeding process. 2019-04-12 18:16:20 +10:00
rand_unix.c Clear seed source structures. 2019-03-29 20:11:41 +10:00
rand_vms.c Clear seed source structures. 2019-03-29 20:11:41 +10:00
rand_win.c Revert "crypto/rand/rand_win.c: include "e_os.h" to get the default _WIN32_WINNT" 2019-04-02 14:49:54 +02:00
randfile.c Circumvent a problem of lacking GetEnvironmentVariable() in WindowsCE. 2019-03-29 09:51:24 +00:00