diff options
| author | deraadt <> | 2014-04-17 12:14:26 +0000 |
|---|---|---|
| committer | deraadt <> | 2014-04-17 12:14:26 +0000 |
| commit | 568af76a0d1a807b73087c7dcdc4cb57b4c044df (patch) | |
| tree | af52f9c7f7962a9cca944bfe4ead5df91c5dfff3 /src/lib/libcrypto/pem | |
| parent | 90d4a4eef2b7d8b8f45fbaa5423ed8f8d574ed9b (diff) | |
| download | openbsd-568af76a0d1a807b73087c7dcdc4cb57b4c044df.tar.gz openbsd-568af76a0d1a807b73087c7dcdc4cb57b4c044df.tar.bz2 openbsd-568af76a0d1a807b73087c7dcdc4cb57b4c044df.zip | |
Do not feed RSA private key information to the random subsystem as
entropy. It might be fed to a pluggable random subsystem....
What were they thinking?!
ok guenther
Diffstat (limited to 'src/lib/libcrypto/pem')
| -rw-r--r-- | src/lib/libcrypto/pem/pem_lib.c | 1 |
1 files changed, 0 insertions, 1 deletions
diff --git a/src/lib/libcrypto/pem/pem_lib.c b/src/lib/libcrypto/pem/pem_lib.c index 74baa2ec1c..0dfa7c7376 100644 --- a/src/lib/libcrypto/pem/pem_lib.c +++ b/src/lib/libcrypto/pem/pem_lib.c | |||
| @@ -384,7 +384,6 @@ int PEM_ASN1_write_bio(i2d_of_void *i2d, const char *name, BIO *bp, | |||
| 384 | } | 384 | } |
| 385 | kstr=(unsigned char *)buf; | 385 | kstr=(unsigned char *)buf; |
| 386 | } | 386 | } |
| 387 | RAND_add(data,i,0);/* put in the RSA key. */ | ||
| 388 | OPENSSL_assert(enc->iv_len <= (int)sizeof(iv)); | 387 | OPENSSL_assert(enc->iv_len <= (int)sizeof(iv)); |
| 389 | if (RAND_pseudo_bytes(iv,enc->iv_len) < 0) /* Generate a salt */ | 388 | if (RAND_pseudo_bytes(iv,enc->iv_len) < 0) /* Generate a salt */ |
| 390 | goto err; | 389 | goto err; |
