CTR_DRBG with or without a derivation function (re: FIPS 140-2)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



To quote from several places:

Once you call FIPS_mode_set (and assuming it returns non-zero), you are using the NIST approved DRBGs.
>From OpenSSL's Random Numbers wiki page:

The default DRBG is 256-bit CTR AES using a derivation function ... To use the FIPS random number generator, simply use
RAND_bytes as described earlier. Note that the call to FIPS_mode_set must succeed in order to operate in FIPS 140 mode.

But if I look at the OpenSSL/FIPS security policy it lists:

CTR DRBG (AES), no derivation function

as being approved but there is no mention of whether CTR DRBG (AES) with a derivation function is approved or not.

Thoughts?

Thanks in advance,
Steve
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mta.openssl.org/pipermail/openssl-users/attachments/20150821/a3b7c404/attachment-0001.html>


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux