Remove jent_read_entropy_safe usage from AWS-LC and modify entropy generation (fips-2021-10-20) #2109
+36
−9
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Issues:
P186365975
Description of changes:
These changes remove any usage of jent_read_entropy_safe function from AWS-LC. This function has an implementation vulnerability described here.
Entropy generation is also modified to use jent_read_entropy instead of jent_read_entropy_safe via this commit
jent_read_entropy_safe is now unused in our codebase, however, it is still present in the Jitter code. The changes to entropy generation are inside the FIPS boundary and will change the integrity hash value.
Call-outs:
Point out areas that need special attention or support during the review process. Discuss architecture or design changes.
Testing:
How is this change tested (unit tests, fuzz tests, etc.)? Are there any testing steps to be verified by the reviewer?
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license and the ISC license.