summaryrefslogtreecommitdiff
path: root/src/lib
diff options
context:
space:
mode:
authormiod <>2014-07-12 21:08:53 +0000
committermiod <>2014-07-12 21:08:53 +0000
commitc4c9f20d7b3d7f13656525bd09a2594ecb763d3c (patch)
tree80119ffb5e296ca0a51831a267e083d2e7640715 /src/lib
parent401d209b7bfa5cc946bfdcd2f24287ec1f34f117 (diff)
downloadopenbsd-c4c9f20d7b3d7f13656525bd09a2594ecb763d3c.tar.gz
openbsd-c4c9f20d7b3d7f13656525bd09a2594ecb763d3c.tar.bz2
openbsd-c4c9f20d7b3d7f13656525bd09a2594ecb763d3c.zip
Remove this sentence:
``The probability that a randomly generated key is weak is -1/2^52, so it is not really worth checking for them.'' This kind of naively optimistic attitude is not compatible with security.
Diffstat (limited to 'src/lib')
-rw-r--r--src/lib/libcrypto/doc/DES_set_key.pod5
-rw-r--r--src/lib/libssl/src/doc/crypto/DES_set_key.pod5
2 files changed, 4 insertions, 6 deletions
diff --git a/src/lib/libcrypto/doc/DES_set_key.pod b/src/lib/libcrypto/doc/DES_set_key.pod
index d6a35eacd4..d1bd43c592 100644
--- a/src/lib/libcrypto/doc/DES_set_key.pod
+++ b/src/lib/libcrypto/doc/DES_set_key.pod
@@ -114,7 +114,7 @@ consists of 8 bytes with odd parity. The least significant bit in
114each byte is the parity bit. The key schedule is an expanded form of 114each byte is the parity bit. The key schedule is an expanded form of
115the key; it is used to speed the encryption process. 115the key; it is used to speed the encryption process.
116 116
117DES_random_key() generates a random key. 117DES_random_key() generates a random key in odd parity.
118 118
119Before a DES key can be used, it must be converted into the 119Before a DES key can be used, it must be converted into the
120architecture dependent I<DES_key_schedule> via the 120architecture dependent I<DES_key_schedule> via the
@@ -134,8 +134,7 @@ depend on a global variable.
134DES_set_odd_parity() sets the parity of the passed I<key> to odd. 134DES_set_odd_parity() sets the parity of the passed I<key> to odd.
135 135
136DES_is_weak_key() returns 1 is the passed key is a weak key, 0 if it 136DES_is_weak_key() returns 1 is the passed key is a weak key, 0 if it
137is ok. The probability that a randomly generated key is weak is 137is ok.
1381/2^52, so it is not really worth checking for them.
139 138
140The following routines mostly operate on an input and output stream of 139The following routines mostly operate on an input and output stream of
141I<DES_cblock>s. 140I<DES_cblock>s.
diff --git a/src/lib/libssl/src/doc/crypto/DES_set_key.pod b/src/lib/libssl/src/doc/crypto/DES_set_key.pod
index d6a35eacd4..d1bd43c592 100644
--- a/src/lib/libssl/src/doc/crypto/DES_set_key.pod
+++ b/src/lib/libssl/src/doc/crypto/DES_set_key.pod
@@ -114,7 +114,7 @@ consists of 8 bytes with odd parity. The least significant bit in
114each byte is the parity bit. The key schedule is an expanded form of 114each byte is the parity bit. The key schedule is an expanded form of
115the key; it is used to speed the encryption process. 115the key; it is used to speed the encryption process.
116 116
117DES_random_key() generates a random key. 117DES_random_key() generates a random key in odd parity.
118 118
119Before a DES key can be used, it must be converted into the 119Before a DES key can be used, it must be converted into the
120architecture dependent I<DES_key_schedule> via the 120architecture dependent I<DES_key_schedule> via the
@@ -134,8 +134,7 @@ depend on a global variable.
134DES_set_odd_parity() sets the parity of the passed I<key> to odd. 134DES_set_odd_parity() sets the parity of the passed I<key> to odd.
135 135
136DES_is_weak_key() returns 1 is the passed key is a weak key, 0 if it 136DES_is_weak_key() returns 1 is the passed key is a weak key, 0 if it
137is ok. The probability that a randomly generated key is weak is 137is ok.
1381/2^52, so it is not really worth checking for them.
139 138
140The following routines mostly operate on an input and output stream of 139The following routines mostly operate on an input and output stream of
141I<DES_cblock>s. 140I<DES_cblock>s.