summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authormiod <miod@openbsd.org>2014-07-12 21:08:53 +0000
committermiod <miod@openbsd.org>2014-07-12 21:08:53 +0000
commitb7a050572725231e1d31fa2284db308ecf55d63d (patch)
treefc8b709c9cca0c313e1efd1bdb06c098f598a0e6
parentFix USB connect freeze by clearing the host port interrupt. (diff)
downloadwireguard-openbsd-b7a050572725231e1d31fa2284db308ecf55d63d.tar.xz
wireguard-openbsd-b7a050572725231e1d31fa2284db308ecf55d63d.zip
Remove this sentence:
``The probability that a randomly generated key is weak is -1/2^52, so it is not really worth checking for them.'' This kind of naively optimistic attitude is not compatible with security.
-rw-r--r--lib/libcrypto/doc/DES_set_key.pod5
-rw-r--r--lib/libssl/src/doc/crypto/DES_set_key.pod5
2 files changed, 4 insertions, 6 deletions
diff --git a/lib/libcrypto/doc/DES_set_key.pod b/lib/libcrypto/doc/DES_set_key.pod
index d6a35eacd44..d1bd43c5927 100644
--- a/lib/libcrypto/doc/DES_set_key.pod
+++ b/lib/libcrypto/doc/DES_set_key.pod
@@ -114,7 +114,7 @@ consists of 8 bytes with odd parity. The least significant bit in
each byte is the parity bit. The key schedule is an expanded form of
the key; it is used to speed the encryption process.
-DES_random_key() generates a random key.
+DES_random_key() generates a random key in odd parity.
Before a DES key can be used, it must be converted into the
architecture dependent I<DES_key_schedule> via the
@@ -134,8 +134,7 @@ depend on a global variable.
DES_set_odd_parity() sets the parity of the passed I<key> to odd.
DES_is_weak_key() returns 1 is the passed key is a weak key, 0 if it
-is ok. The probability that a randomly generated key is weak is
-1/2^52, so it is not really worth checking for them.
+is ok.
The following routines mostly operate on an input and output stream of
I<DES_cblock>s.
diff --git a/lib/libssl/src/doc/crypto/DES_set_key.pod b/lib/libssl/src/doc/crypto/DES_set_key.pod
index d6a35eacd44..d1bd43c5927 100644
--- a/lib/libssl/src/doc/crypto/DES_set_key.pod
+++ b/lib/libssl/src/doc/crypto/DES_set_key.pod
@@ -114,7 +114,7 @@ consists of 8 bytes with odd parity. The least significant bit in
each byte is the parity bit. The key schedule is an expanded form of
the key; it is used to speed the encryption process.
-DES_random_key() generates a random key.
+DES_random_key() generates a random key in odd parity.
Before a DES key can be used, it must be converted into the
architecture dependent I<DES_key_schedule> via the
@@ -134,8 +134,7 @@ depend on a global variable.
DES_set_odd_parity() sets the parity of the passed I<key> to odd.
DES_is_weak_key() returns 1 is the passed key is a weak key, 0 if it
-is ok. The probability that a randomly generated key is weak is
-1/2^52, so it is not really worth checking for them.
+is ok.
The following routines mostly operate on an input and output stream of
I<DES_cblock>s.