summaryrefslogtreecommitdiffstats
path: root/lib/libssl/src
diff options
context:
space:
mode:
authorderaadt <deraadt@openbsd.org>2014-04-17 12:48:51 +0000
committerderaadt <deraadt@openbsd.org>2014-04-17 12:48:51 +0000
commitb3586c85c2e2a77fede42aaeab1c154ca5f79cf4 (patch)
treed32e37a1c6899516684040284ce663b1c3af3bbd /lib/libssl/src
parentDon't limit the DCS buffer to 256 bytes, expand it as needed. Requested (diff)
downloadwireguard-openbsd-b3586c85c2e2a77fede42aaeab1c154ca5f79cf4.tar.xz
wireguard-openbsd-b3586c85c2e2a77fede42aaeab1c154ca5f79cf4.zip
1. RAND_seed is now DEPRECATED
2. Even passing a digest in as entropy is sloppy. But apparently the OpenSSL guys could find no objects of lesser value to pass to the pluggable random subsystem, and had to resort to private keys and digests. Classy. ok djm
Diffstat (limited to 'lib/libssl/src')
-rw-r--r--lib/libssl/src/crypto/dsa/dsa_asn1.c1
-rw-r--r--lib/libssl/src/crypto/ecdsa/ecs_sign.c1
2 files changed, 0 insertions, 2 deletions
diff --git a/lib/libssl/src/crypto/dsa/dsa_asn1.c b/lib/libssl/src/crypto/dsa/dsa_asn1.c
index 60585343746..19528dcd7ac 100644
--- a/lib/libssl/src/crypto/dsa/dsa_asn1.c
+++ b/lib/libssl/src/crypto/dsa/dsa_asn1.c
@@ -154,7 +154,6 @@ int DSA_sign(int type, const unsigned char *dgst, int dlen, unsigned char *sig,
unsigned int *siglen, DSA *dsa)
{
DSA_SIG *s;
- RAND_seed(dgst, dlen);
s=DSA_do_sign(dgst,dlen,dsa);
if (s == NULL)
{
diff --git a/lib/libssl/src/crypto/ecdsa/ecs_sign.c b/lib/libssl/src/crypto/ecdsa/ecs_sign.c
index 353d5af5146..a60c327e4df 100644
--- a/lib/libssl/src/crypto/ecdsa/ecs_sign.c
+++ b/lib/libssl/src/crypto/ecdsa/ecs_sign.c
@@ -84,7 +84,6 @@ int ECDSA_sign_ex(int type, const unsigned char *dgst, int dlen, unsigned char
EC_KEY *eckey)
{
ECDSA_SIG *s;
- RAND_seed(dgst, dlen);
s = ECDSA_do_sign_ex(dgst, dlen, kinv, r, eckey);
if (s == NULL)
{