On Wed, Dec 11, 2013, Ben Laurie wrote:

> On 11 December 2013 08:55, Tomas Mraz <tm...@redhat.com> wrote:
> > On Út, 2013-12-10 at 14:45 +0100, Dr. Stephen Henson wrote:
> >> On Mon, Dec 09, 2013, geoff_l...@mcafee.com wrote:
> >>
> >> > Shouldn't the code read:
> >> >
> >> >      if (!FIPS_mode())
> >> >           CRYPTO_w_[un]lock(CRYPTO_LOCK_RAND);
> >> >
> >> > Note the '!' operator.
> >> >
> >>
> >> Yes it should, sorry about that. Fixed now.
> >
> > But given skipping the locking in the FIPS mode doesn't that mean that
> > the reseed operation is now not being protected under lock at all? The
> > FIPS DRBG does not lock before calling the add/reseed callbacks.
> 
> Why would you need a lock? FIPS compliant modules are single threaded...
> 
> (Yes, I know this is stupid).

And they work in single user mode with no other processes running and all
hardware is encased in a safe made of pixie dust...

One of those is untrue and it says a lot about FIPS that it isn't obvious
which one ;-)

Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to