From ffa9bff8a2024bc8e6322be2cbff7d17fb8d828d Mon Sep 17 00:00:00 2001 From: "Dr. Matthias St. Pierre" Date: Sun, 12 May 2019 17:01:55 +1000 Subject: [PATCH] Ignore entropy from RAND_add()/RAND_seed() in FIPS mode [fixup] Small correction to RAND_DRBG(7) (amends 3a50a8a91ad1) Reviewed-by: Paul Dale (Merged from https://github.com/openssl/openssl/pull/8909) --- doc/man7/RAND_DRBG.pod | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/doc/man7/RAND_DRBG.pod b/doc/man7/RAND_DRBG.pod index 621f6ded5a..c51b8cb238 100644 --- a/doc/man7/RAND_DRBG.pod +++ b/doc/man7/RAND_DRBG.pod @@ -265,9 +265,9 @@ from the trusted entropy sources. =back NOTE: Manual reseeding is *not allowed* in FIPS mode, because -NIST SP-800-90A mandates that entropy *shall not* be provided by the -consuming application, neither for instantiation, nor for reseeding. -[NIST SP 800-90Ar1, Sections 9.1 and 9.2]. For that reason the B +[NIST SP-800-90Ar1] mandates that entropy *shall not* be provided by +the consuming application for instantiation (Section 9.1) or +reseeding (Section 9.2). For that reason, the B argument is ignored and the random bytes provided by the L and L calls are treated as additional data. -- 2.25.1