846be6085c
* bmo#1623338 - ride along: remove a duplicated doc page * bmo#1623338 - remove a reference to IRC * bmo#1831983 - clang-format lib/freebl/stubs.c * bmo#1831983 - Add a constant time select function * bmo#1774657 - Updating an old dbm with lots of certs with keys to sql results in a database that is slow to access. * bmo#1830973 - output early build errors by default * bmo#1804505 - Update the technical constraints for KamuSM * bmo#1822921 - Add BJCA Global Root CA1 and CA2 root certificates * bmo#1790763 - Enable default UBSan Checks * bmo#1786018 - Add explicit handling of zero length records * bmo#1829391 - Tidy up DTLS ACK Error Handling Path * bmo#1786018 - Refactor zero length record tests * bmo#1829112 - Fix compiler warning via correct assert * bmo#1755267 - run linux tests on nss-t/t-linux-xlarge-gcp * bmo#1806496 - In FIPS mode, nss should reject RSASSA-PSS salt lengths larger than the output size of the hash function used, or provide an indicator * bmo#1784163 - Fix reading raw negative numbers * bmo#1748237 - Repairing unreachable code in clang built with gyp * bmo#1783647 - Integrate Vale Curve25519 * bmo#1799468 - Removing unused flags for Hacl* * bmo#1748237 - Adding a better error message * bmo#1727555 - Update HACL* till 51a72a953a4ee6f91e63b2816ae5c4e62edf35d6 * bmo#1782980 - Fall back to the softokn when writing certificate trust * bmo#1806010 - FIPS-104-3 requires we restart post programmatically * bmo#1826650 - cmd/ecperf: fix dangling pointer warning on gcc 13 * bmo#1818766 - Update ACVP dockerfile for compatibility with debian package changes OBS-URL: https://build.opensuse.org/package/show/mozilla:Factory/mozilla-nss?expand=0&rev=418
112 lines
3.1 KiB
Diff
112 lines
3.1 KiB
Diff
Index: nss/coreconf/Linux.mk
|
|
===================================================================
|
|
--- nss.orig/coreconf/Linux.mk
|
|
+++ nss/coreconf/Linux.mk
|
|
@@ -136,7 +136,7 @@ OS_CFLAGS = $(DSO_CFLAGS) $(OS_REL_CFLA
|
|
ifeq ($(KERNEL),Linux)
|
|
OS_CFLAGS += -DLINUX -Dlinux
|
|
endif
|
|
-OS_LIBS = $(OS_PTHREAD) -ldl -lc
|
|
+OS_LIBS = $(OS_PTHREAD) -ldl -lc -ljitterentropy
|
|
|
|
ifeq ($(OS_TARGET),Android)
|
|
OS_LIBS += -llog
|
|
Index: nss/lib/freebl/drbg.c
|
|
===================================================================
|
|
--- nss.orig/lib/freebl/drbg.c
|
|
+++ nss/lib/freebl/drbg.c
|
|
@@ -6,6 +6,8 @@
|
|
#include "stubs.h"
|
|
#endif
|
|
|
|
+#include <jitterentropy.h>
|
|
+
|
|
#include <unistd.h>
|
|
|
|
#include "prerror.h"
|
|
@@ -107,6 +109,45 @@ typedef struct RNGContextStr RNGContext;
|
|
static RNGContext *globalrng = NULL;
|
|
static RNGContext theGlobalRng;
|
|
|
|
+/* Jitterentropy */
|
|
+#define JITTER_FLAGS JENT_FORCE_FIPS
|
|
+static struct rand_data *jitter;
|
|
+
|
|
+static ssize_t
|
|
+FIPS_jent_get_entropy (void *dest, ssize_t len)
|
|
+{
|
|
+ int result = -1;
|
|
+
|
|
+ /* Ensure that the jitterentropy generator is initialized */
|
|
+
|
|
+ if (!jitter)
|
|
+ {
|
|
+ if (jent_entropy_init_ex (1, JITTER_FLAGS))
|
|
+ goto out;
|
|
+
|
|
+ jitter = jent_entropy_collector_alloc (1, JITTER_FLAGS);
|
|
+ if (!jitter)
|
|
+ goto out;
|
|
+ }
|
|
+
|
|
+ /* Get some entropy */
|
|
+
|
|
+ result = jent_read_entropy_safe (&jitter, dest, len);
|
|
+
|
|
+out:
|
|
+ return result;
|
|
+}
|
|
+
|
|
+static void
|
|
+FIPS_jent_deinit (void)
|
|
+{
|
|
+ if (jitter)
|
|
+ {
|
|
+ jent_entropy_collector_free (jitter);
|
|
+ jitter = NULL;
|
|
+ }
|
|
+}
|
|
+
|
|
/*
|
|
* The next several functions are derived from the NIST SP 800-90
|
|
* spec. In these functions, an attempt was made to use names consistent
|
|
@@ -180,7 +221,7 @@ static PRCallOnceType coRNGInitEntropy;
|
|
static PRStatus
|
|
prng_initEntropy(void)
|
|
{
|
|
- size_t length;
|
|
+ ssize_t length;
|
|
PRUint8 block[PRNG_ENTROPY_BLOCK_SIZE];
|
|
SHA256Context ctx;
|
|
|
|
@@ -203,8 +244,8 @@ prng_initEntropy(void)
|
|
/* For FIPS 140-2 4.9.2 continuous random number generator test,
|
|
* fetch the initial entropy from the system RNG and keep it for
|
|
* later comparison. */
|
|
- length = RNG_SystemRNG(block, sizeof(block));
|
|
- if (length == 0) {
|
|
+ length = FIPS_jent_get_entropy(block, sizeof(block));
|
|
+ if (length < 1) {
|
|
coRNGInitEntropy.status = PR_FAILURE;
|
|
__sync_synchronize ();
|
|
coRNGInitEntropy.initialized = 1;
|
|
@@ -244,8 +285,8 @@ prng_getEntropy(PRUint8 *buffer, size_t
|
|
* iteratively fetch fixed sized blocks from the system and
|
|
* compare consecutive blocks. */
|
|
while (total < requestLength) {
|
|
- size_t length = RNG_SystemRNG(block, sizeof(block));
|
|
- if (length == 0) {
|
|
+ ssize_t length = FIPS_jent_get_entropy(block, sizeof(block));
|
|
+ if (length < 1) {
|
|
rv = SECFailure; /* error is already set */
|
|
goto out;
|
|
}
|
|
@@ -792,6 +833,7 @@ RNG_RNGShutdown(void)
|
|
/* clear */
|
|
prng_freeRNGContext(globalrng);
|
|
globalrng = NULL;
|
|
+ FIPS_jent_deinit ();
|
|
/* reset the callonce struct to allow a new call to RNG_RNGInit() */
|
|
coRNGInit = pristineCallOnce;
|
|
}
|