diff options
| author | tedu <> | 2014-04-18 19:54:57 +0000 |
|---|---|---|
| committer | tedu <> | 2014-04-18 19:54:57 +0000 |
| commit | 740cbe58fd15869edfd5302fffd6b33b5206d7fc (patch) | |
| tree | f93757885a74b745b5e71ac9581e2fb92d7e05c9 /src/lib/libssl/src/apps/genrsa.c | |
| parent | 92d1f3ded5071289b10a737cb549323b5c440123 (diff) | |
| download | openbsd-740cbe58fd15869edfd5302fffd6b33b5206d7fc.tar.gz openbsd-740cbe58fd15869edfd5302fffd6b33b5206d7fc.tar.bz2 openbsd-740cbe58fd15869edfd5302fffd6b33b5206d7fc.zip | |
$HOME/.rnd will never be a good source of entropy. ok beck
Diffstat (limited to 'src/lib/libssl/src/apps/genrsa.c')
| -rw-r--r-- | src/lib/libssl/src/apps/genrsa.c | 10 |
1 files changed, 0 insertions, 10 deletions
diff --git a/src/lib/libssl/src/apps/genrsa.c b/src/lib/libssl/src/apps/genrsa.c index fb879acad5..5b5fbc6fa9 100644 --- a/src/lib/libssl/src/apps/genrsa.c +++ b/src/lib/libssl/src/apps/genrsa.c | |||
| @@ -237,14 +237,6 @@ bad: | |||
| 237 | } | 237 | } |
| 238 | } | 238 | } |
| 239 | 239 | ||
| 240 | if (!app_RAND_load_file(NULL, bio_err, 1) && inrand == NULL && | ||
| 241 | !RAND_status()) { | ||
| 242 | BIO_printf(bio_err, "warning, not much extra random data, consider using the -rand option\n"); | ||
| 243 | } | ||
| 244 | if (inrand != NULL) | ||
| 245 | BIO_printf(bio_err, "%ld semi-random bytes loaded\n", | ||
| 246 | app_RAND_load_files(inrand)); | ||
| 247 | |||
| 248 | BIO_printf(bio_err, "Generating RSA private key, %d bit long modulus\n", | 240 | BIO_printf(bio_err, "Generating RSA private key, %d bit long modulus\n", |
| 249 | num); | 241 | num); |
| 250 | #ifdef OPENSSL_NO_ENGINE | 242 | #ifdef OPENSSL_NO_ENGINE |
| @@ -258,8 +250,6 @@ bad: | |||
| 258 | if (!BN_set_word(bn, f4) || !RSA_generate_key_ex(rsa, num, bn, &cb)) | 250 | if (!BN_set_word(bn, f4) || !RSA_generate_key_ex(rsa, num, bn, &cb)) |
| 259 | goto err; | 251 | goto err; |
| 260 | 252 | ||
| 261 | app_RAND_write_file(NULL, bio_err); | ||
| 262 | |||
| 263 | /* | 253 | /* |
| 264 | * We need to do the following for when the base number size is < | 254 | * We need to do the following for when the base number size is < |
| 265 | * long, esp windows 3.1 :-(. | 255 | * long, esp windows 3.1 :-(. |
