diff options
author | 2014-04-17 12:48:51 +0000 | |
---|---|---|
committer | 2014-04-17 12:48:51 +0000 | |
commit | b3586c85c2e2a77fede42aaeab1c154ca5f79cf4 (patch) | |
tree | d32e37a1c6899516684040284ce663b1c3af3bbd /lib/libssl/src | |
parent | Don't limit the DCS buffer to 256 bytes, expand it as needed. Requested (diff) | |
download | wireguard-openbsd-b3586c85c2e2a77fede42aaeab1c154ca5f79cf4.tar.xz wireguard-openbsd-b3586c85c2e2a77fede42aaeab1c154ca5f79cf4.zip |
1. RAND_seed is now DEPRECATED
2. Even passing a digest in as entropy is sloppy.
But apparently the OpenSSL guys could find no objects of lesser value to
pass to the pluggable random subsystem, and had to resort to private keys
and digests. Classy.
ok djm
Diffstat (limited to 'lib/libssl/src')
-rw-r--r-- | lib/libssl/src/crypto/dsa/dsa_asn1.c | 1 | ||||
-rw-r--r-- | lib/libssl/src/crypto/ecdsa/ecs_sign.c | 1 |
2 files changed, 0 insertions, 2 deletions
diff --git a/lib/libssl/src/crypto/dsa/dsa_asn1.c b/lib/libssl/src/crypto/dsa/dsa_asn1.c index 60585343746..19528dcd7ac 100644 --- a/lib/libssl/src/crypto/dsa/dsa_asn1.c +++ b/lib/libssl/src/crypto/dsa/dsa_asn1.c @@ -154,7 +154,6 @@ int DSA_sign(int type, const unsigned char *dgst, int dlen, unsigned char *sig, unsigned int *siglen, DSA *dsa) { DSA_SIG *s; - RAND_seed(dgst, dlen); s=DSA_do_sign(dgst,dlen,dsa); if (s == NULL) { diff --git a/lib/libssl/src/crypto/ecdsa/ecs_sign.c b/lib/libssl/src/crypto/ecdsa/ecs_sign.c index 353d5af5146..a60c327e4df 100644 --- a/lib/libssl/src/crypto/ecdsa/ecs_sign.c +++ b/lib/libssl/src/crypto/ecdsa/ecs_sign.c @@ -84,7 +84,6 @@ int ECDSA_sign_ex(int type, const unsigned char *dgst, int dlen, unsigned char EC_KEY *eckey) { ECDSA_SIG *s; - RAND_seed(dgst, dlen); s = ECDSA_do_sign_ex(dgst, dlen, kinv, r, eckey); if (s == NULL) { |