DNM: force jitter#25929
Conversation
Sashan
left a comment
There was a problem hiding this comment.
Thank you for PR and detailed analysis. To be honest I think @paulidale can provide better insight here. I could spot just few nits. But change seems to make sense to me.
| OSSL_PARAM params[1] = { OSSL_PARAM_END }; | ||
| PROV_JITTER *s = jitter_new(NULL, NULL, NULL); | ||
| if (s == NULL) | ||
| return ret; |
There was a problem hiding this comment.
Thank you for PR. I wonder if should raise some error like we do in similar situation in ossl_rand_get_entropy().
FIPS 3.0.9 provider does not honor runtime seed configuration, thus if one desires to use JITTER entropy source with FIPS 3.0.9 provider something like this needs to be applied to the core (libcrypto) build. Not sure if this is at all suitable for upstream.
|
This is an improvement, but we don't back port features which this is. OTC: back port or not? |
|
I gave a try this pull request for 3.4 branch. It looks like some work is needed here, because the relevant changes delivered here are not being compiled. The compile time option which enables jitrer entroy is controlled by compilation of 3.4 branch just succeeds with change above in. |
| } | ||
|
|
||
| # ifdef OPENSSL_NO_JITTER | ||
| static size_t rand_get_entropy(const OSSL_CORE_HANDLE *handle, |
There was a problem hiding this comment.
@Sashan the conditional in this PR is OPENSSL_NO_JITTER
The conditional in the #25930 PR targetting master/3.5 is OPENSSL_NO_FIPS_JITTER
Are you reviewing matching code with matching PRs as they are indeed different and use different conditionals. Depending on the version of the core being compiled and the configure settings of the core.
Please see https://github.com/openssl/openssl/pull/25929/files#r1840610093 The exact test cases I use to test this functionality is gdb batch scripts that break on syscall_random function and jitter ones. Like so |
|
OTC: no backport |
Force use jitter entropy in the FIPS 3.0.9 provider callback
FIPS 3.0.9 provider does not honor runtime seed configuration, thus if
one desires to use JITTER entropy source with FIPS 3.0.9 provider
something like this needs to be applied to the core (libcrypto) build.
Not sure if this is at all suitable for upstream.
This is backport of #25930 to codebase pre fips-jitter config option