[gnutls-devel] GnuTLS | nettle/rnd-fips: add FIPS 140-2 continuous RNG test (!1034)
Development of GNU's TLS library
gnutls-devel at lists.gnutls.org
Tue Jun 25 14:53:54 CEST 2019
Merge request https://gitlab.com/gnutls/gnutls/merge_requests/1034 was reviewed by Nikos Mavrogiannopoulos
--
Nikos Mavrogiannopoulos started a new discussion on lib/nettle/rnd-fips.c: https://gitlab.com/gnutls/gnutls/merge_requests/1034#note_185143935
> #include <rnd-common.h>
>
> +#define ENTROPY_BLOCK_SIZE SHA256_DIGEST_SIZE
Should we document here why we selected the sha2 digest size?
--
Nikos Mavrogiannopoulos started a new discussion on lib/nettle/rnd-fips.c: https://gitlab.com/gnutls/gnutls/merge_requests/1034#note_185143939
> /* Reseed a generator. */
> -static int drbg_reseed(struct drbg_aes_ctx *ctx)
> +static int drbg_reseed(struct drbg_aes_ctx *ctx,
is that function necessary to be separate after this rewrite?
--
Nikos Mavrogiannopoulos started a new discussion on lib/nettle/rnd-fips.c: https://gitlab.com/gnutls/gnutls/merge_requests/1034#note_185143944
> }
>
> +static int get_entropy(struct fips_ctx *fctx, uint8_t *buffer, size_t length)
Would this be reliable on a multi-threaded application? It looks to me that when called in parallel values may be overwritten.
--
Reply to this email directly or view it on GitLab: https://gitlab.com/gnutls/gnutls/merge_requests/1034
You're receiving this email because of your account on gitlab.com.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.gnupg.org/pipermail/gnutls-devel/attachments/20190625/1f0000f3/attachment-0001.html>
More information about the Gnutls-devel
mailing list