summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/dsa/dsa_asn1.c
diff options
context:
space:
mode:
authorderaadt <>2014-04-17 12:48:51 +0000
committerderaadt <>2014-04-17 12:48:51 +0000
commitdb23630a69c385b130d22df984f16aa07cee6ba8 (patch)
treec40fe52cf6e39d5f7d63db229c175ecb23e66db1 /src/lib/libcrypto/dsa/dsa_asn1.c
parent15fc84771f45b60fe72767dec98cffde46869706 (diff)
downloadopenbsd-db23630a69c385b130d22df984f16aa07cee6ba8.tar.gz
openbsd-db23630a69c385b130d22df984f16aa07cee6ba8.tar.bz2
openbsd-db23630a69c385b130d22df984f16aa07cee6ba8.zip
1. RAND_seed is now DEPRECATED
2. Even passing a digest in as entropy is sloppy. But apparently the OpenSSL guys could find no objects of lesser value to pass to the pluggable random subsystem, and had to resort to private keys and digests. Classy. ok djm
Diffstat (limited to 'src/lib/libcrypto/dsa/dsa_asn1.c')
-rw-r--r--src/lib/libcrypto/dsa/dsa_asn1.c1
1 files changed, 0 insertions, 1 deletions
diff --git a/src/lib/libcrypto/dsa/dsa_asn1.c b/src/lib/libcrypto/dsa/dsa_asn1.c
index 6058534374..19528dcd7a 100644
--- a/src/lib/libcrypto/dsa/dsa_asn1.c
+++ b/src/lib/libcrypto/dsa/dsa_asn1.c
@@ -154,7 +154,6 @@ int DSA_sign(int type, const unsigned char *dgst, int dlen, unsigned char *sig,
154 unsigned int *siglen, DSA *dsa) 154 unsigned int *siglen, DSA *dsa)
155 { 155 {
156 DSA_SIG *s; 156 DSA_SIG *s;
157 RAND_seed(dgst, dlen);
158 s=DSA_do_sign(dgst,dlen,dsa); 157 s=DSA_do_sign(dgst,dlen,dsa);
159 if (s == NULL) 158 if (s == NULL)
160 { 159 {