summaryrefslogtreecommitdiffstats
path: root/CHANGES.md
diff options
context:
space:
mode:
authorDimitri John Ledkov <dimitri.ledkov@surgut.co.uk>2024-07-10 16:39:01 +0200
committerPauli <ppzgs1@gmail.com>2024-07-31 06:44:51 +0200
commitb28b3128048a83ba036c9d8a789badac9b1a2804 (patch)
treef484e9e8ea3d7d1b5c67f3838831f7aca15abfde /CHANGES.md
parentAdd FIPS indicator to CMAC. (diff)
downloadopenssl-b28b3128048a83ba036c9d8a789badac9b1a2804.tar.xz
openssl-b28b3128048a83ba036c9d8a789badac9b1a2804.zip
jitter: add a new provider containing a jitter entropy source alone
This entropy source can be used instead of SEED-SRC. Sample openssl.cnf configuration is provided. It is built as a separate provider, because it is likely to require less frequent updates than fips provider. The same build likely can span multiple generations of FIPS 140 standard revisions. Note that rand-instances currently chain from public/private instances to primary, prior to consuming the seed. Thus currently a unique ESV needs to be obtained, and resue of jitterentropy.a certificate is not possible as is. Separately a patch will be sent to allow for unchaining public/private RAND instances for the purpose of reusing ESV. Also I do wonder if it makes sense to create a fips variant of stock SEED-SRC entropy source, which in addition to using getrandom() also verifies that the kernel is operating in FIPS mode and thus is likely a validated entropy source. As in on Linux, check that /proc/sys/crypto/fips_enabled is set to 1, and similar checks on Windows / MacOS and so on. Reviewed-by: Shane Lontis <shane.lontis@oracle.com> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/24844)
Diffstat (limited to 'CHANGES.md')
-rw-r--r--CHANGES.md5
1 files changed, 5 insertions, 0 deletions
diff --git a/CHANGES.md b/CHANGES.md
index 594efc44de..13c28816ac 100644
--- a/CHANGES.md
+++ b/CHANGES.md
@@ -167,6 +167,11 @@ OpenSSL 3.3
### Changes between 3.2 and 3.3.0 [9 Apr 2024]
+ * Add a new random seed source RNG `JITTER` using a statically linked
+ jitterentropy library.
+
+ *Dimitri John Ledkov*
+
* The `-verify` option to the `openssl crl` and `openssl req` will make
the program exit with 1 on failure.