On Tue, Oct 2, 2012 at 9:02 PM, Robert Relyea <rrel...@redhat.com> wrote:
>
> But we can use it go seed the prng. There's a pretty easy way to get NSS to
> use HW generated values to get some initial entropy: If you create a PKCS
> #11 module that advertises a RNG (See the PKCS #11 spec), NSS will mix
> entropy from it's own internal PRNG as well as extract random values to mix
> into it's internal PRNG. Such a scheme would allow even old version of NSS
> to benefit from HW RNGs.
>
> As another step, there are a set of internal entropy collecting functions
> within NSS that are platform specific called:
> win_rand.c, unix_rand.c, and os2_rand.c. Mixing hardware generated bits into
> the RNG_SystemRNG() call would pick up new HW generated entropy whenever NSS
> decided it needs to reseed.

Yes, we can use it as an entropy source. I think the latter method is better.

I just verified that there is no DRBG validation certificate issued to Intel:
http://csrc.nist.gov/groups/STM/cavp/documents/drbg/drbgval.html

So I think we can only use it as an entropy source.

Wan-Teh
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to