[20.04 FEAT] openCryptoki exploitation of PRNO random numbers in ICA, CCA and EP11 tokens
Bug #1852088 reported by
bugproxy
This bug report is a duplicate of:
Bug #1852089: [20.04] Fix failure of EP11 to import an ECC public key.
Edit
Remove
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
Ubuntu on IBM z Systems |
Fix Released
|
Medium
|
Canonical Foundations Team | ||
opencryptoki (Ubuntu) |
Fix Released
|
Undecided
|
Skipper Bug Screeners |
Bug Description
Exploit CPACF functions to implement a NIST compliant pseudo random number generator that can be seed with true random numbers.
All z specific tokens (ica, cca and epp1) should provide a token specific C_GenerateRandom funcktion that computes random numbers using the PRNO instruction.
Available with opencryptoki 3.12
Upstream location:
https:/
tags: | added: architecture-s39064 bugnameltc-182138 severity-high targetmilestone-inin2004 |
Changed in ubuntu: | |
assignee: | nobody → Skipper Bug Screeners (skipper-screen-team) |
affects: | ubuntu → opencryptoki (Ubuntu) |
Changed in ubuntu-z-systems: | |
status: | New → Triaged |
importance: | Undecided → Medium |
assignee: | nobody → Canonical Foundations Team (canonical-foundations) |
Changed in opencryptoki (Ubuntu): | |
status: | New → Fix Released |
Changed in ubuntu-z-systems: | |
status: | Triaged → Fix Released |
information type: | Private → Public |
To post a comment you must log in.
------- Comment From <email address hidden> 2020-02-10 11:36 EDT-------
IBM Bugzilla status -> closed, Fix Released with focal