On 18 March 2016 at 16:55, Wan-Teh Chang <w...@google.com> wrote:

> On Fri, Mar 18, 2016 at 10:49 AM, Robert Relyea <rrel...@redhat.com>
> wrote:
> >
> > Yes, SECMOD_DeleteInternalModule() is a toggle which switches NSS between
> > FIPS and non-FIPS. If you don't have a database open, or the database is
> > open readOnly, the change only affects the running program.
>
> Hi Bob,
>
> Your answer surprised me. The latest NSS FIPS 140-2 Security Policy at
> http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp2564.pdf
> says user passwords are stored in salted form in the key database
> (Table 8 on page 26). So I don't understand how NSS can operate in
> FIPS mode without an NSS database. I guess without an NSS database the
> NSS crypto module will only provide services that don't require user
> authentication, such as hashing and random number generation?
>
>
Some more background,

Per my earlier e-mail, I'm trying to run HMAC (specifically, using
alghmac.h) using a "published" value as the key.  I've also got several
versions of this code:

- this one which puts NSS into what I'll call "memory only" FIPS mode; the
result is relatively close to OpenSSL
https://bitbucket.org/cagney/fipscheck/branch/nss

- an alternative that takes an NSS-DB and uses that to put NSS into FIPS
mode
https://bitbucket.org/cagney/fipscheck/branch/nss-db

The interesting thing about the latter is that, even though I initially
included code to provide the password to unlock the DB, that code never
executed.  To me this made sense since I'm not manipulating secure keys; I
just need secured algorithms.

Andrew


Thanks,
> Wan-Teh Chang
> --
> dev-tech-crypto mailing list
> dev-tech-crypto@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-tech-crypto
>
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to