On Wed, Apr 29, 2009 at 4:01 PM, wrote:
>
> In the link you have sent it is stated that,
>
> "The initial value of XKEY is derived using the following procedure.
>
> We obtain 1024 bytes from the system random number generator. On
> Windows XP SP 2, we call the CryptGenRandom function in the Cryp
Thanks Wan-Teh for the reply.
In the link you have sent it is stated that,
"The initial value of XKEY is derived using the following procedure.
We obtain 1024 bytes from the system random number generator. On
Windows XP SP 2, we call the CryptGenRandom function in the CryptoAPI.
On Solaris, HP-U
On Tue, Apr 28, 2009 at 6:02 PM, wrote:
>
> For FIPS, Continuous RNG test should be performed on approved or non
> approved RNG that are used.
>
> If I understand correctly, NSS uses /dev/urandom as entropy source but
> it does not generate the random number twice from /dev/urandom and
> compare
Hello Nelson,
I didn't frame my original question correctly.
For FIPS, Continuous RNG test should be performed on approved or non
approved RNG that are used.
If I understand correctly, NSS uses /dev/urandom as entropy source but
it does not generate the random number twice from /dev/urandom and
ksreedha...@gmail.com wrote, On 2009-04-24 14:04:
> Hello,
>
> I am using NSS 3.11.4 and NSPR 4.6.4
>
> Will the non-approved PRNG of NSS be functional/usable when NSS is in
> FIPS mode.
What "non-approved PRNG of NSS" ?
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https:/
5 matches
Mail list logo