To quote from several places:

Once you call FIPS_mode_set (and assuming it returns non-zero), you are using 
the NIST approved DRBGs.
>From OpenSSL's Random Numbers wiki page:

The default DRBG is 256-bit CTR AES using a derivation function ... To use the 
FIPS random number generator, simply use
RAND_bytes as described earlier. Note that the call to FIPS_mode_set must 
succeed in order to operate in FIPS 140 mode.

But if I look at the OpenSSL/FIPS security policy it lists:

CTR DRBG (AES), no derivation function

as being approved but there is no mention of whether CTR DRBG (AES) with a 
derivation function is approved or not.

Thoughts?

Thanks in advance,
Steve
_______________________________________________
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Reply via email to