[20.04 FEAT] openCryptoki exploitation of PRNO random numbers in ICA, CCA and EP11 tokens

Bug #1852088 reported by bugproxy
14
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Ubuntu on IBM z Systems
Fix Released
Medium
Canonical Foundations Team
opencryptoki (Ubuntu)
Fix Released
Undecided
Skipper Bug Screeners

Bug Description

Exploit CPACF functions to implement a NIST compliant pseudo random number generator that can be seed with true random numbers.

All z specific tokens (ica, cca and epp1) should provide a token specific C_GenerateRandom funcktion that computes random numbers using the PRNO instruction.

Available with opencryptoki 3.12

Upstream location:
https://github.com/opencryptoki/opencryptoki

bugproxy (bugproxy)
tags: added: architecture-s39064 bugnameltc-182138 severity-high targetmilestone-inin2004
Changed in ubuntu:
assignee: nobody → Skipper Bug Screeners (skipper-screen-team)
affects: ubuntu → opencryptoki (Ubuntu)
Frank Heimes (fheimes)
Changed in ubuntu-z-systems:
status: New → Triaged
importance: Undecided → Medium
assignee: nobody → Canonical Foundations Team (canonical-foundations)
Frank Heimes (fheimes)
Changed in opencryptoki (Ubuntu):
status: New → Fix Released
Changed in ubuntu-z-systems:
status: Triaged → Fix Released
Revision history for this message
bugproxy (bugproxy) wrote : Comment bridged from LTC Bugzilla

------- Comment From <email address hidden> 2020-02-10 11:36 EDT-------
IBM Bugzilla status -> closed, Fix Released with focal

Frank Heimes (fheimes)
information type: Private → Public
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.