summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authormiod <>2014-07-09 17:36:58 +0000
committermiod <>2014-07-09 17:36:58 +0000
commit8f147593f649791212451b70b61f2560f8cd408b (patch)
tree5ca70911551fb5fc0dd2488879e16bf54a97ac1c /src
parenta78955ae4a5a81f10fff6443c03c56c6240709ac (diff)
downloadopenbsd-8f147593f649791212451b70b61f2560f8cd408b.tar.gz
openbsd-8f147593f649791212451b70b61f2560f8cd408b.tar.bz2
openbsd-8f147593f649791212451b70b61f2560f8cd408b.zip
Remove mention that the PRNG needs to be seeded before invoking some
functions.
Diffstat (limited to 'src')
-rw-r--r--src/lib/libcrypto/doc/DES_set_key.pod4
-rw-r--r--src/lib/libcrypto/doc/DH_generate_parameters.pod3
-rw-r--r--src/lib/libcrypto/doc/DSA_generate_key.pod2
-rw-r--r--src/lib/libcrypto/doc/DSA_sign.pod3
-rw-r--r--src/lib/libcrypto/doc/EVP_DigestSignInit.pod3
-rw-r--r--src/lib/libcrypto/doc/EVP_DigestVerifyInit.pod3
-rw-r--r--src/lib/libcrypto/doc/EVP_SealInit.pod3
-rw-r--r--src/lib/libcrypto/doc/EVP_SignInit.pod4
-rw-r--r--src/lib/libcrypto/doc/RSA_blinding_on.pod3
-rw-r--r--src/lib/libcrypto/doc/RSA_generate_key.pod3
-rw-r--r--src/lib/libcrypto/doc/RSA_padding_add_PKCS1_type_1.pod3
-rw-r--r--src/lib/libcrypto/doc/RSA_public_encrypt.pod2
-rw-r--r--src/lib/libcrypto/doc/RSA_sign_ASN1_OCTET_STRING.pod3
-rw-r--r--src/lib/libssl/src/doc/crypto/BN_generate_prime.pod1
-rw-r--r--src/lib/libssl/src/doc/crypto/BN_rand.pod2
-rw-r--r--src/lib/libssl/src/doc/crypto/DES_set_key.pod4
-rw-r--r--src/lib/libssl/src/doc/crypto/DH_generate_parameters.pod3
-rw-r--r--src/lib/libssl/src/doc/crypto/DSA_generate_key.pod2
-rw-r--r--src/lib/libssl/src/doc/crypto/DSA_sign.pod3
-rw-r--r--src/lib/libssl/src/doc/crypto/EVP_DigestSignInit.pod3
-rw-r--r--src/lib/libssl/src/doc/crypto/EVP_DigestVerifyInit.pod3
-rw-r--r--src/lib/libssl/src/doc/crypto/EVP_SealInit.pod3
-rw-r--r--src/lib/libssl/src/doc/crypto/EVP_SignInit.pod4
-rw-r--r--src/lib/libssl/src/doc/crypto/RSA_blinding_on.pod3
-rw-r--r--src/lib/libssl/src/doc/crypto/RSA_generate_key.pod3
-rw-r--r--src/lib/libssl/src/doc/crypto/RSA_padding_add_PKCS1_type_1.pod3
-rw-r--r--src/lib/libssl/src/doc/crypto/RSA_public_encrypt.pod2
-rw-r--r--src/lib/libssl/src/doc/crypto/RSA_sign_ASN1_OCTET_STRING.pod3
28 files changed, 8 insertions, 73 deletions
diff --git a/src/lib/libcrypto/doc/DES_set_key.pod b/src/lib/libcrypto/doc/DES_set_key.pod
index b49545877a..75638a149a 100644
--- a/src/lib/libcrypto/doc/DES_set_key.pod
+++ b/src/lib/libcrypto/doc/DES_set_key.pod
@@ -114,9 +114,7 @@ consists of 8 bytes with odd parity. The least significant bit in
114each byte is the parity bit. The key schedule is an expanded form of 114each byte is the parity bit. The key schedule is an expanded form of
115the key; it is used to speed the encryption process. 115the key; it is used to speed the encryption process.
116 116
117DES_random_key() generates a random key. The PRNG must be seeded 117DES_random_key() generates a random key.
118prior to using this function (see L<rand(3)|rand(3)>). If the PRNG
119could not generate a secure key, 0 is returned.
120 118
121Before a DES key can be used, it must be converted into the 119Before a DES key can be used, it must be converted into the
122architecture dependent I<DES_key_schedule> via the 120architecture dependent I<DES_key_schedule> via the
diff --git a/src/lib/libcrypto/doc/DH_generate_parameters.pod b/src/lib/libcrypto/doc/DH_generate_parameters.pod
index d19e0217ee..3832c25315 100644
--- a/src/lib/libcrypto/doc/DH_generate_parameters.pod
+++ b/src/lib/libcrypto/doc/DH_generate_parameters.pod
@@ -17,8 +17,7 @@ DH_generate_parameters, DH_check - generate and check Diffie-Hellman parameters
17 17
18DH_generate_parameters() generates Diffie-Hellman parameters that can 18DH_generate_parameters() generates Diffie-Hellman parameters that can
19be shared among a group of users, and returns them in a newly 19be shared among a group of users, and returns them in a newly
20allocated B<DH> structure. The pseudo-random number generator must be 20allocated B<DH> structure.
21seeded prior to calling DH_generate_parameters().
22 21
23B<prime_len> is the length in bits of the safe prime to be generated. 22B<prime_len> is the length in bits of the safe prime to be generated.
24B<generator> is a small number E<gt> 1, typically 2 or 5. 23B<generator> is a small number E<gt> 1, typically 2 or 5.
diff --git a/src/lib/libcrypto/doc/DSA_generate_key.pod b/src/lib/libcrypto/doc/DSA_generate_key.pod
index af83ccfaa1..069a05767c 100644
--- a/src/lib/libcrypto/doc/DSA_generate_key.pod
+++ b/src/lib/libcrypto/doc/DSA_generate_key.pod
@@ -15,8 +15,6 @@ DSA_generate_key - generate DSA key pair
15DSA_generate_key() expects B<a> to contain DSA parameters. It generates 15DSA_generate_key() expects B<a> to contain DSA parameters. It generates
16a new key pair and stores it in B<a-E<gt>pub_key> and B<a-E<gt>priv_key>. 16a new key pair and stores it in B<a-E<gt>pub_key> and B<a-E<gt>priv_key>.
17 17
18The PRNG must be seeded prior to calling DSA_generate_key().
19
20=head1 RETURN VALUE 18=head1 RETURN VALUE
21 19
22DSA_generate_key() returns 1 on success, 0 otherwise. 20DSA_generate_key() returns 1 on success, 0 otherwise.
diff --git a/src/lib/libcrypto/doc/DSA_sign.pod b/src/lib/libcrypto/doc/DSA_sign.pod
index 97389e8ec8..4e78a71390 100644
--- a/src/lib/libcrypto/doc/DSA_sign.pod
+++ b/src/lib/libcrypto/doc/DSA_sign.pod
@@ -38,9 +38,6 @@ B<dsa> is the signer's public key.
38 38
39The B<type> parameter is ignored. 39The B<type> parameter is ignored.
40 40
41The PRNG must be seeded before DSA_sign() (or DSA_sign_setup())
42is called.
43
44=head1 RETURN VALUES 41=head1 RETURN VALUES
45 42
46DSA_sign() and DSA_sign_setup() return 1 on success, 0 on error. 43DSA_sign() and DSA_sign_setup() return 1 on success, 0 on error.
diff --git a/src/lib/libcrypto/doc/EVP_DigestSignInit.pod b/src/lib/libcrypto/doc/EVP_DigestSignInit.pod
index 7aec6daecc..e70b88a4a9 100644
--- a/src/lib/libcrypto/doc/EVP_DigestSignInit.pod
+++ b/src/lib/libcrypto/doc/EVP_DigestSignInit.pod
@@ -56,9 +56,6 @@ and public key algorithms. This meant that "clone" digests such as EVP_dss1()
56needed to be used to sign using SHA1 and DSA. This is no longer necessary and 56needed to be used to sign using SHA1 and DSA. This is no longer necessary and
57the use of clone digest is now discouraged. 57the use of clone digest is now discouraged.
58 58
59For some key types and parameters the random number generator must be seeded
60or the operation will fail.
61
62The call to EVP_DigestSignFinal() internally finalizes a copy of the digest 59The call to EVP_DigestSignFinal() internally finalizes a copy of the digest
63context. This means that calls to EVP_DigestSignUpdate() and 60context. This means that calls to EVP_DigestSignUpdate() and
64EVP_DigestSignFinal() can be called later to digest and sign additional data. 61EVP_DigestSignFinal() can be called later to digest and sign additional data.
diff --git a/src/lib/libcrypto/doc/EVP_DigestVerifyInit.pod b/src/lib/libcrypto/doc/EVP_DigestVerifyInit.pod
index 60666bfddc..9eebb15d22 100644
--- a/src/lib/libcrypto/doc/EVP_DigestVerifyInit.pod
+++ b/src/lib/libcrypto/doc/EVP_DigestVerifyInit.pod
@@ -56,9 +56,6 @@ and public key algorithms. This meant that "clone" digests such as EVP_dss1()
56needed to be used to sign using SHA1 and DSA. This is no longer necessary and 56needed to be used to sign using SHA1 and DSA. This is no longer necessary and
57the use of clone digest is now discouraged. 57the use of clone digest is now discouraged.
58 58
59For some key types and parameters the random number generator must be seeded
60or the operation will fail.
61
62The call to EVP_DigestVerifyFinal() internally finalizes a copy of the digest 59The call to EVP_DigestVerifyFinal() internally finalizes a copy of the digest
63context. This means that calls to EVP_VerifyUpdate() and EVP_VerifyFinal() can 60context. This means that calls to EVP_VerifyUpdate() and EVP_VerifyFinal() can
64be called later to digest and verify additional data. 61be called later to digest and verify additional data.
diff --git a/src/lib/libcrypto/doc/EVP_SealInit.pod b/src/lib/libcrypto/doc/EVP_SealInit.pod
index 172f210c64..ff73a04fd9 100644
--- a/src/lib/libcrypto/doc/EVP_SealInit.pod
+++ b/src/lib/libcrypto/doc/EVP_SealInit.pod
@@ -55,9 +55,6 @@ failure.
55 55
56=head1 NOTES 56=head1 NOTES
57 57
58Because a random secret key is generated the random number generator
59must be seeded before calling EVP_SealInit().
60
61The public key must be RSA because it is the only OpenSSL public key 58The public key must be RSA because it is the only OpenSSL public key
62algorithm that supports key transport. 59algorithm that supports key transport.
63 60
diff --git a/src/lib/libcrypto/doc/EVP_SignInit.pod b/src/lib/libcrypto/doc/EVP_SignInit.pod
index 682724b157..6ea6df655e 100644
--- a/src/lib/libcrypto/doc/EVP_SignInit.pod
+++ b/src/lib/libcrypto/doc/EVP_SignInit.pod
@@ -60,10 +60,6 @@ digest algorithm must be used with the correct public key type. A list of
60algorithms and associated public key algorithms appears in 60algorithms and associated public key algorithms appears in
61L<EVP_DigestInit(3)|EVP_DigestInit(3)>. 61L<EVP_DigestInit(3)|EVP_DigestInit(3)>.
62 62
63When signing with DSA private keys the random number generator must be seeded
64or the operation will fail. The random number generator does not need to be
65seeded for RSA signatures.
66
67The call to EVP_SignFinal() internally finalizes a copy of the digest context. 63The call to EVP_SignFinal() internally finalizes a copy of the digest context.
68This means that calls to EVP_SignUpdate() and EVP_SignFinal() can be called 64This means that calls to EVP_SignUpdate() and EVP_SignFinal() can be called
69later to digest and sign additional data. 65later to digest and sign additional data.
diff --git a/src/lib/libcrypto/doc/RSA_blinding_on.pod b/src/lib/libcrypto/doc/RSA_blinding_on.pod
index e6af8d4355..33990207f7 100644
--- a/src/lib/libcrypto/doc/RSA_blinding_on.pod
+++ b/src/lib/libcrypto/doc/RSA_blinding_on.pod
@@ -21,8 +21,7 @@ must be used to protect the RSA operation from that attack.
21 21
22RSA_blinding_on() turns blinding on for key B<rsa> and generates a 22RSA_blinding_on() turns blinding on for key B<rsa> and generates a
23random blinding factor. B<ctx> is B<NULL> or a pre-allocated and 23random blinding factor. B<ctx> is B<NULL> or a pre-allocated and
24initialized B<BN_CTX>. The random number generator must be seeded 24initialized B<BN_CTX>.
25prior to calling RSA_blinding_on().
26 25
27RSA_blinding_off() turns blinding off and frees the memory used for 26RSA_blinding_off() turns blinding off and frees the memory used for
28the blinding factor. 27the blinding factor.
diff --git a/src/lib/libcrypto/doc/RSA_generate_key.pod b/src/lib/libcrypto/doc/RSA_generate_key.pod
index 52dbb14a53..867390884b 100644
--- a/src/lib/libcrypto/doc/RSA_generate_key.pod
+++ b/src/lib/libcrypto/doc/RSA_generate_key.pod
@@ -14,8 +14,7 @@ RSA_generate_key - generate RSA key pair
14=head1 DESCRIPTION 14=head1 DESCRIPTION
15 15
16RSA_generate_key() generates a key pair and returns it in a newly 16RSA_generate_key() generates a key pair and returns it in a newly
17allocated B<RSA> structure. The pseudo-random number generator must 17allocated B<RSA> structure.
18be seeded prior to calling RSA_generate_key().
19 18
20The modulus size will be B<num> bits, and the public exponent will be 19The modulus size will be B<num> bits, and the public exponent will be
21B<e>. Key sizes with B<num> E<lt> 1024 should be considered insecure. 20B<e>. Key sizes with B<num> E<lt> 1024 should be considered insecure.
diff --git a/src/lib/libcrypto/doc/RSA_padding_add_PKCS1_type_1.pod b/src/lib/libcrypto/doc/RSA_padding_add_PKCS1_type_1.pod
index b8f678fe72..1c90b2b44d 100644
--- a/src/lib/libcrypto/doc/RSA_padding_add_PKCS1_type_1.pod
+++ b/src/lib/libcrypto/doc/RSA_padding_add_PKCS1_type_1.pod
@@ -85,9 +85,6 @@ simply copy the data
85 85
86=back 86=back
87 87
88The random number generator must be seeded prior to calling
89RSA_padding_add_xxx().
90
91RSA_padding_check_xxx() verifies that the B<fl> bytes at B<f> contain 88RSA_padding_check_xxx() verifies that the B<fl> bytes at B<f> contain
92a valid encoding for a B<rsa_len> byte RSA key in the respective 89a valid encoding for a B<rsa_len> byte RSA key in the respective
93encoding method and stores the recovered data of at most B<tlen> bytes 90encoding method and stores the recovered data of at most B<tlen> bytes
diff --git a/src/lib/libcrypto/doc/RSA_public_encrypt.pod b/src/lib/libcrypto/doc/RSA_public_encrypt.pod
index ab0fe3b2cd..4bbee53f09 100644
--- a/src/lib/libcrypto/doc/RSA_public_encrypt.pod
+++ b/src/lib/libcrypto/doc/RSA_public_encrypt.pod
@@ -49,8 +49,6 @@ Encrypting user data directly with RSA is insecure.
49B<flen> must be less than RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5 49B<flen> must be less than RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5
50based padding modes, less than RSA_size(B<rsa>) - 41 for 50based padding modes, less than RSA_size(B<rsa>) - 41 for
51RSA_PKCS1_OAEP_PADDING and exactly RSA_size(B<rsa>) for RSA_NO_PADDING. 51RSA_PKCS1_OAEP_PADDING and exactly RSA_size(B<rsa>) for RSA_NO_PADDING.
52The random number generator must be seeded prior to calling
53RSA_public_encrypt().
54 52
55RSA_private_decrypt() decrypts the B<flen> bytes at B<from> using the 53RSA_private_decrypt() decrypts the B<flen> bytes at B<from> using the
56private key B<rsa> and stores the plaintext in B<to>. B<to> must point 54private key B<rsa> and stores the plaintext in B<to>. B<to> must point
diff --git a/src/lib/libcrypto/doc/RSA_sign_ASN1_OCTET_STRING.pod b/src/lib/libcrypto/doc/RSA_sign_ASN1_OCTET_STRING.pod
index 315a9af9e8..664b46174b 100644
--- a/src/lib/libcrypto/doc/RSA_sign_ASN1_OCTET_STRING.pod
+++ b/src/lib/libcrypto/doc/RSA_sign_ASN1_OCTET_STRING.pod
@@ -26,9 +26,6 @@ memory.
26 26
27B<dummy> is ignored. 27B<dummy> is ignored.
28 28
29The random number generator must be seeded prior to calling
30RSA_sign_ASN1_OCTET_STRING().
31
32RSA_verify_ASN1_OCTET_STRING() verifies that the signature B<sigbuf> 29RSA_verify_ASN1_OCTET_STRING() verifies that the signature B<sigbuf>
33of size B<siglen> is the DER representation of a given octet string 30of size B<siglen> is the DER representation of a given octet string
34B<m> of size B<m_len>. B<dummy> is ignored. B<rsa> is the signer's 31B<m> of size B<m_len>. B<dummy> is ignored. B<rsa> is the signer's
diff --git a/src/lib/libssl/src/doc/crypto/BN_generate_prime.pod b/src/lib/libssl/src/doc/crypto/BN_generate_prime.pod
index 04fc80df9c..2c5e6fae0f 100644
--- a/src/lib/libssl/src/doc/crypto/BN_generate_prime.pod
+++ b/src/lib/libssl/src/doc/crypto/BN_generate_prime.pod
@@ -55,7 +55,6 @@ generator.
55If B<safe> is true, it will be a safe prime (i.e. a prime p so 55If B<safe> is true, it will be a safe prime (i.e. a prime p so
56that (p-1)/2 is also prime). 56that (p-1)/2 is also prime).
57 57
58The PRNG must be seeded prior to calling BN_generate_prime().
59The prime number generation has a negligible error probability. 58The prime number generation has a negligible error probability.
60 59
61BN_is_prime() and BN_is_prime_fasttest() test if the number B<a> is 60BN_is_prime() and BN_is_prime_fasttest() test if the number B<a> is
diff --git a/src/lib/libssl/src/doc/crypto/BN_rand.pod b/src/lib/libssl/src/doc/crypto/BN_rand.pod
index 81f93c2eb3..70f435b203 100644
--- a/src/lib/libssl/src/doc/crypto/BN_rand.pod
+++ b/src/lib/libssl/src/doc/crypto/BN_rand.pod
@@ -36,8 +36,6 @@ number B<rnd> in the range 0 <lt>= B<rnd> E<lt> B<range>.
36BN_pseudo_rand_range() does the same, but is based on BN_pseudo_rand(), 36BN_pseudo_rand_range() does the same, but is based on BN_pseudo_rand(),
37and hence numbers generated by it are not necessarily unpredictable. 37and hence numbers generated by it are not necessarily unpredictable.
38 38
39The PRNG must be seeded prior to calling BN_rand() or BN_rand_range().
40
41=head1 RETURN VALUES 39=head1 RETURN VALUES
42 40
43The functions return 1 on success, 0 on error. 41The functions return 1 on success, 0 on error.
diff --git a/src/lib/libssl/src/doc/crypto/DES_set_key.pod b/src/lib/libssl/src/doc/crypto/DES_set_key.pod
index b49545877a..75638a149a 100644
--- a/src/lib/libssl/src/doc/crypto/DES_set_key.pod
+++ b/src/lib/libssl/src/doc/crypto/DES_set_key.pod
@@ -114,9 +114,7 @@ consists of 8 bytes with odd parity. The least significant bit in
114each byte is the parity bit. The key schedule is an expanded form of 114each byte is the parity bit. The key schedule is an expanded form of
115the key; it is used to speed the encryption process. 115the key; it is used to speed the encryption process.
116 116
117DES_random_key() generates a random key. The PRNG must be seeded 117DES_random_key() generates a random key.
118prior to using this function (see L<rand(3)|rand(3)>). If the PRNG
119could not generate a secure key, 0 is returned.
120 118
121Before a DES key can be used, it must be converted into the 119Before a DES key can be used, it must be converted into the
122architecture dependent I<DES_key_schedule> via the 120architecture dependent I<DES_key_schedule> via the
diff --git a/src/lib/libssl/src/doc/crypto/DH_generate_parameters.pod b/src/lib/libssl/src/doc/crypto/DH_generate_parameters.pod
index d19e0217ee..3832c25315 100644
--- a/src/lib/libssl/src/doc/crypto/DH_generate_parameters.pod
+++ b/src/lib/libssl/src/doc/crypto/DH_generate_parameters.pod
@@ -17,8 +17,7 @@ DH_generate_parameters, DH_check - generate and check Diffie-Hellman parameters
17 17
18DH_generate_parameters() generates Diffie-Hellman parameters that can 18DH_generate_parameters() generates Diffie-Hellman parameters that can
19be shared among a group of users, and returns them in a newly 19be shared among a group of users, and returns them in a newly
20allocated B<DH> structure. The pseudo-random number generator must be 20allocated B<DH> structure.
21seeded prior to calling DH_generate_parameters().
22 21
23B<prime_len> is the length in bits of the safe prime to be generated. 22B<prime_len> is the length in bits of the safe prime to be generated.
24B<generator> is a small number E<gt> 1, typically 2 or 5. 23B<generator> is a small number E<gt> 1, typically 2 or 5.
diff --git a/src/lib/libssl/src/doc/crypto/DSA_generate_key.pod b/src/lib/libssl/src/doc/crypto/DSA_generate_key.pod
index af83ccfaa1..069a05767c 100644
--- a/src/lib/libssl/src/doc/crypto/DSA_generate_key.pod
+++ b/src/lib/libssl/src/doc/crypto/DSA_generate_key.pod
@@ -15,8 +15,6 @@ DSA_generate_key - generate DSA key pair
15DSA_generate_key() expects B<a> to contain DSA parameters. It generates 15DSA_generate_key() expects B<a> to contain DSA parameters. It generates
16a new key pair and stores it in B<a-E<gt>pub_key> and B<a-E<gt>priv_key>. 16a new key pair and stores it in B<a-E<gt>pub_key> and B<a-E<gt>priv_key>.
17 17
18The PRNG must be seeded prior to calling DSA_generate_key().
19
20=head1 RETURN VALUE 18=head1 RETURN VALUE
21 19
22DSA_generate_key() returns 1 on success, 0 otherwise. 20DSA_generate_key() returns 1 on success, 0 otherwise.
diff --git a/src/lib/libssl/src/doc/crypto/DSA_sign.pod b/src/lib/libssl/src/doc/crypto/DSA_sign.pod
index 97389e8ec8..4e78a71390 100644
--- a/src/lib/libssl/src/doc/crypto/DSA_sign.pod
+++ b/src/lib/libssl/src/doc/crypto/DSA_sign.pod
@@ -38,9 +38,6 @@ B<dsa> is the signer's public key.
38 38
39The B<type> parameter is ignored. 39The B<type> parameter is ignored.
40 40
41The PRNG must be seeded before DSA_sign() (or DSA_sign_setup())
42is called.
43
44=head1 RETURN VALUES 41=head1 RETURN VALUES
45 42
46DSA_sign() and DSA_sign_setup() return 1 on success, 0 on error. 43DSA_sign() and DSA_sign_setup() return 1 on success, 0 on error.
diff --git a/src/lib/libssl/src/doc/crypto/EVP_DigestSignInit.pod b/src/lib/libssl/src/doc/crypto/EVP_DigestSignInit.pod
index 7aec6daecc..e70b88a4a9 100644
--- a/src/lib/libssl/src/doc/crypto/EVP_DigestSignInit.pod
+++ b/src/lib/libssl/src/doc/crypto/EVP_DigestSignInit.pod
@@ -56,9 +56,6 @@ and public key algorithms. This meant that "clone" digests such as EVP_dss1()
56needed to be used to sign using SHA1 and DSA. This is no longer necessary and 56needed to be used to sign using SHA1 and DSA. This is no longer necessary and
57the use of clone digest is now discouraged. 57the use of clone digest is now discouraged.
58 58
59For some key types and parameters the random number generator must be seeded
60or the operation will fail.
61
62The call to EVP_DigestSignFinal() internally finalizes a copy of the digest 59The call to EVP_DigestSignFinal() internally finalizes a copy of the digest
63context. This means that calls to EVP_DigestSignUpdate() and 60context. This means that calls to EVP_DigestSignUpdate() and
64EVP_DigestSignFinal() can be called later to digest and sign additional data. 61EVP_DigestSignFinal() can be called later to digest and sign additional data.
diff --git a/src/lib/libssl/src/doc/crypto/EVP_DigestVerifyInit.pod b/src/lib/libssl/src/doc/crypto/EVP_DigestVerifyInit.pod
index 60666bfddc..9eebb15d22 100644
--- a/src/lib/libssl/src/doc/crypto/EVP_DigestVerifyInit.pod
+++ b/src/lib/libssl/src/doc/crypto/EVP_DigestVerifyInit.pod
@@ -56,9 +56,6 @@ and public key algorithms. This meant that "clone" digests such as EVP_dss1()
56needed to be used to sign using SHA1 and DSA. This is no longer necessary and 56needed to be used to sign using SHA1 and DSA. This is no longer necessary and
57the use of clone digest is now discouraged. 57the use of clone digest is now discouraged.
58 58
59For some key types and parameters the random number generator must be seeded
60or the operation will fail.
61
62The call to EVP_DigestVerifyFinal() internally finalizes a copy of the digest 59The call to EVP_DigestVerifyFinal() internally finalizes a copy of the digest
63context. This means that calls to EVP_VerifyUpdate() and EVP_VerifyFinal() can 60context. This means that calls to EVP_VerifyUpdate() and EVP_VerifyFinal() can
64be called later to digest and verify additional data. 61be called later to digest and verify additional data.
diff --git a/src/lib/libssl/src/doc/crypto/EVP_SealInit.pod b/src/lib/libssl/src/doc/crypto/EVP_SealInit.pod
index 172f210c64..ff73a04fd9 100644
--- a/src/lib/libssl/src/doc/crypto/EVP_SealInit.pod
+++ b/src/lib/libssl/src/doc/crypto/EVP_SealInit.pod
@@ -55,9 +55,6 @@ failure.
55 55
56=head1 NOTES 56=head1 NOTES
57 57
58Because a random secret key is generated the random number generator
59must be seeded before calling EVP_SealInit().
60
61The public key must be RSA because it is the only OpenSSL public key 58The public key must be RSA because it is the only OpenSSL public key
62algorithm that supports key transport. 59algorithm that supports key transport.
63 60
diff --git a/src/lib/libssl/src/doc/crypto/EVP_SignInit.pod b/src/lib/libssl/src/doc/crypto/EVP_SignInit.pod
index 682724b157..6ea6df655e 100644
--- a/src/lib/libssl/src/doc/crypto/EVP_SignInit.pod
+++ b/src/lib/libssl/src/doc/crypto/EVP_SignInit.pod
@@ -60,10 +60,6 @@ digest algorithm must be used with the correct public key type. A list of
60algorithms and associated public key algorithms appears in 60algorithms and associated public key algorithms appears in
61L<EVP_DigestInit(3)|EVP_DigestInit(3)>. 61L<EVP_DigestInit(3)|EVP_DigestInit(3)>.
62 62
63When signing with DSA private keys the random number generator must be seeded
64or the operation will fail. The random number generator does not need to be
65seeded for RSA signatures.
66
67The call to EVP_SignFinal() internally finalizes a copy of the digest context. 63The call to EVP_SignFinal() internally finalizes a copy of the digest context.
68This means that calls to EVP_SignUpdate() and EVP_SignFinal() can be called 64This means that calls to EVP_SignUpdate() and EVP_SignFinal() can be called
69later to digest and sign additional data. 65later to digest and sign additional data.
diff --git a/src/lib/libssl/src/doc/crypto/RSA_blinding_on.pod b/src/lib/libssl/src/doc/crypto/RSA_blinding_on.pod
index e6af8d4355..33990207f7 100644
--- a/src/lib/libssl/src/doc/crypto/RSA_blinding_on.pod
+++ b/src/lib/libssl/src/doc/crypto/RSA_blinding_on.pod
@@ -21,8 +21,7 @@ must be used to protect the RSA operation from that attack.
21 21
22RSA_blinding_on() turns blinding on for key B<rsa> and generates a 22RSA_blinding_on() turns blinding on for key B<rsa> and generates a
23random blinding factor. B<ctx> is B<NULL> or a pre-allocated and 23random blinding factor. B<ctx> is B<NULL> or a pre-allocated and
24initialized B<BN_CTX>. The random number generator must be seeded 24initialized B<BN_CTX>.
25prior to calling RSA_blinding_on().
26 25
27RSA_blinding_off() turns blinding off and frees the memory used for 26RSA_blinding_off() turns blinding off and frees the memory used for
28the blinding factor. 27the blinding factor.
diff --git a/src/lib/libssl/src/doc/crypto/RSA_generate_key.pod b/src/lib/libssl/src/doc/crypto/RSA_generate_key.pod
index 52dbb14a53..867390884b 100644
--- a/src/lib/libssl/src/doc/crypto/RSA_generate_key.pod
+++ b/src/lib/libssl/src/doc/crypto/RSA_generate_key.pod
@@ -14,8 +14,7 @@ RSA_generate_key - generate RSA key pair
14=head1 DESCRIPTION 14=head1 DESCRIPTION
15 15
16RSA_generate_key() generates a key pair and returns it in a newly 16RSA_generate_key() generates a key pair and returns it in a newly
17allocated B<RSA> structure. The pseudo-random number generator must 17allocated B<RSA> structure.
18be seeded prior to calling RSA_generate_key().
19 18
20The modulus size will be B<num> bits, and the public exponent will be 19The modulus size will be B<num> bits, and the public exponent will be
21B<e>. Key sizes with B<num> E<lt> 1024 should be considered insecure. 20B<e>. Key sizes with B<num> E<lt> 1024 should be considered insecure.
diff --git a/src/lib/libssl/src/doc/crypto/RSA_padding_add_PKCS1_type_1.pod b/src/lib/libssl/src/doc/crypto/RSA_padding_add_PKCS1_type_1.pod
index b8f678fe72..1c90b2b44d 100644
--- a/src/lib/libssl/src/doc/crypto/RSA_padding_add_PKCS1_type_1.pod
+++ b/src/lib/libssl/src/doc/crypto/RSA_padding_add_PKCS1_type_1.pod
@@ -85,9 +85,6 @@ simply copy the data
85 85
86=back 86=back
87 87
88The random number generator must be seeded prior to calling
89RSA_padding_add_xxx().
90
91RSA_padding_check_xxx() verifies that the B<fl> bytes at B<f> contain 88RSA_padding_check_xxx() verifies that the B<fl> bytes at B<f> contain
92a valid encoding for a B<rsa_len> byte RSA key in the respective 89a valid encoding for a B<rsa_len> byte RSA key in the respective
93encoding method and stores the recovered data of at most B<tlen> bytes 90encoding method and stores the recovered data of at most B<tlen> bytes
diff --git a/src/lib/libssl/src/doc/crypto/RSA_public_encrypt.pod b/src/lib/libssl/src/doc/crypto/RSA_public_encrypt.pod
index ab0fe3b2cd..4bbee53f09 100644
--- a/src/lib/libssl/src/doc/crypto/RSA_public_encrypt.pod
+++ b/src/lib/libssl/src/doc/crypto/RSA_public_encrypt.pod
@@ -49,8 +49,6 @@ Encrypting user data directly with RSA is insecure.
49B<flen> must be less than RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5 49B<flen> must be less than RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5
50based padding modes, less than RSA_size(B<rsa>) - 41 for 50based padding modes, less than RSA_size(B<rsa>) - 41 for
51RSA_PKCS1_OAEP_PADDING and exactly RSA_size(B<rsa>) for RSA_NO_PADDING. 51RSA_PKCS1_OAEP_PADDING and exactly RSA_size(B<rsa>) for RSA_NO_PADDING.
52The random number generator must be seeded prior to calling
53RSA_public_encrypt().
54 52
55RSA_private_decrypt() decrypts the B<flen> bytes at B<from> using the 53RSA_private_decrypt() decrypts the B<flen> bytes at B<from> using the
56private key B<rsa> and stores the plaintext in B<to>. B<to> must point 54private key B<rsa> and stores the plaintext in B<to>. B<to> must point
diff --git a/src/lib/libssl/src/doc/crypto/RSA_sign_ASN1_OCTET_STRING.pod b/src/lib/libssl/src/doc/crypto/RSA_sign_ASN1_OCTET_STRING.pod
index 315a9af9e8..664b46174b 100644
--- a/src/lib/libssl/src/doc/crypto/RSA_sign_ASN1_OCTET_STRING.pod
+++ b/src/lib/libssl/src/doc/crypto/RSA_sign_ASN1_OCTET_STRING.pod
@@ -26,9 +26,6 @@ memory.
26 26
27B<dummy> is ignored. 27B<dummy> is ignored.
28 28
29The random number generator must be seeded prior to calling
30RSA_sign_ASN1_OCTET_STRING().
31
32RSA_verify_ASN1_OCTET_STRING() verifies that the signature B<sigbuf> 29RSA_verify_ASN1_OCTET_STRING() verifies that the signature B<sigbuf>
33of size B<siglen> is the DER representation of a given octet string 30of size B<siglen> is the DER representation of a given octet string
34B<m> of size B<m_len>. B<dummy> is ignored. B<rsa> is the signer's 31B<m> of size B<m_len>. B<dummy> is ignored. B<rsa> is the signer's