Re: non-approved PRNG in FIPS mode

2009-04-29 Thread Wan-Teh Chang
On Wed, Apr 29, 2009 at 4:01 PM, wrote: > > In the link you have sent it is stated that, > > "The initial value of XKEY is derived using the following procedure. > > We obtain 1024 bytes from the system random number generator. On > Windows XP SP 2, we call the CryptGenRandom function in the Cryp

Re: non-approved PRNG in FIPS mode

2009-04-29 Thread ksreedhar74
Thanks Wan-Teh for the reply. In the link you have sent it is stated that, "The initial value of XKEY is derived using the following procedure. We obtain 1024 bytes from the system random number generator. On Windows XP SP 2, we call the CryptGenRandom function in the CryptoAPI. On Solaris, HP-U

Re: non-approved PRNG in FIPS mode

2009-04-28 Thread Wan-Teh Chang
On Tue, Apr 28, 2009 at 6:02 PM, wrote: > > For FIPS, Continuous RNG test should be performed on approved or non > approved RNG that are used. > > If I understand correctly, NSS uses /dev/urandom as entropy source but > it does not generate the random number twice from /dev/urandom and > compare

Re: non-approved PRNG in FIPS mode

2009-04-28 Thread ksreedhar74
Hello Nelson, I didn't frame my original question correctly. For FIPS, Continuous RNG test should be performed on approved or non approved RNG that are used. If I understand correctly, NSS uses /dev/urandom as entropy source but it does not generate the random number twice from /dev/urandom and

Re: non-approved PRNG in FIPS mode

2009-04-24 Thread Nelson B Bolyard
ksreedha...@gmail.com wrote, On 2009-04-24 14:04: > Hello, > > I am using NSS 3.11.4 and NSPR 4.6.4 > > Will the non-approved PRNG of NSS be functional/usable when NSS is in > FIPS mode. What "non-approved PRNG of NSS" ? -- dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https:/