Thanks Wan-Teh for the reply.
In the link you have sent it is stated that,
The initial value of XKEY is derived using the following procedure.
We obtain 1024 bytes from the system random number generator. On
Windows XP SP 2, we call the CryptGenRandom function in the CryptoAPI.
On Solaris,
On Wed, Apr 29, 2009 at 4:01 PM, ksreedha...@gmail.com wrote:
In the link you have sent it is stated that,
The initial value of XKEY is derived using the following procedure.
We obtain 1024 bytes from the system random number generator. On
Windows XP SP 2, we call the CryptGenRandom
-approved PRNG of NSS be functional/usable when NSS is in
FIPS mode.
What non-approved PRNG of NSS ?
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
On Tue, Apr 28, 2009 at 6:02 PM, ksreedha...@gmail.com wrote:
For FIPS, Continuous RNG test should be performed on approved or non
approved RNG that are used.
If I understand correctly, NSS uses /dev/urandom as entropy source but
it does not generate the random number twice from
Hello,
I am using NSS 3.11.4 and NSPR 4.6.4
Will the non-approved PRNG of NSS be functional/usable when NSS is in
FIPS mode.
Thanks,
Sreedhar
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto
ksreedha...@gmail.com wrote, On 2009-04-24 14:04:
Hello,
I am using NSS 3.11.4 and NSPR 4.6.4
Will the non-approved PRNG of NSS be functional/usable when NSS is in
FIPS mode.
What non-approved PRNG of NSS ?
--
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https
6 matches
Mail list logo