Dear all,

I'm trying to map the SP800-56b NIST document to the OpenSSL
capabilities running in FIPS mode.

There is a table full of "should not", "should", "shall" and so on,
needed to be filled by any NIST approved product, but there are
certain issues, that seems that OpenSSL doesn't pass, and the NIST
validators requires a rationale for deviation, for each "no".

I saw (two years ago may be?) a guy asking about this table in an
openssl mailing list, but the data wasn't available. So, is there
anyone that has filled this table and explained a rationale for
deviations? Or where could I find this information? You can see an
example of the table from a random company in
https://www.niap-ccevs.org/st/st_vid10523-st.pdf  (page 53) or in
https://www.niap-ccevs.org/st/st_vid10505-st.pdf (page 40)

For instance, in NIST SP800-56b section Reference 7.2.2.3, it says
that (talking about RSA-OAEP Decryption Operation) "the observable
behavior of the mask generation function *should not* reveal even
partial information about the MGF seed employed in the process ".
Do you know why OpenSSL doesn't fulfil that capability? I'm not able
to find why OpenSSL in FIPS mode may reveal partial information about
the MGF seed and I'm not able to find why this is not harmful.

Just for the records, the sections that I think that OpenSSL doesn't
fulfil, are: 6.6 (shall not), 7.2.1.3 (should not), 7.2.3.3 (should
not) and 8.3.2 (should not).

Thanks for your help in advance and kind regards,
Alberto.


-- 
Alberto Román

Engineering team
http://www.alienvault.com
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to