diff options
author | miod <> | 2014-07-09 17:36:58 +0000 |
---|---|---|
committer | miod <> | 2014-07-09 17:36:58 +0000 |
commit | 8f147593f649791212451b70b61f2560f8cd408b (patch) | |
tree | 5ca70911551fb5fc0dd2488879e16bf54a97ac1c /src | |
parent | a78955ae4a5a81f10fff6443c03c56c6240709ac (diff) | |
download | openbsd-8f147593f649791212451b70b61f2560f8cd408b.tar.gz openbsd-8f147593f649791212451b70b61f2560f8cd408b.tar.bz2 openbsd-8f147593f649791212451b70b61f2560f8cd408b.zip |
Remove mention that the PRNG needs to be seeded before invoking some
functions.
Diffstat (limited to 'src')
28 files changed, 8 insertions, 73 deletions
diff --git a/src/lib/libcrypto/doc/DES_set_key.pod b/src/lib/libcrypto/doc/DES_set_key.pod index b49545877a..75638a149a 100644 --- a/src/lib/libcrypto/doc/DES_set_key.pod +++ b/src/lib/libcrypto/doc/DES_set_key.pod | |||
@@ -114,9 +114,7 @@ consists of 8 bytes with odd parity. The least significant bit in | |||
114 | each byte is the parity bit. The key schedule is an expanded form of | 114 | each byte is the parity bit. The key schedule is an expanded form of |
115 | the key; it is used to speed the encryption process. | 115 | the key; it is used to speed the encryption process. |
116 | 116 | ||
117 | DES_random_key() generates a random key. The PRNG must be seeded | 117 | DES_random_key() generates a random key. |
118 | prior to using this function (see L<rand(3)|rand(3)>). If the PRNG | ||
119 | could not generate a secure key, 0 is returned. | ||
120 | 118 | ||
121 | Before a DES key can be used, it must be converted into the | 119 | Before a DES key can be used, it must be converted into the |
122 | architecture dependent I<DES_key_schedule> via the | 120 | architecture dependent I<DES_key_schedule> via the |
diff --git a/src/lib/libcrypto/doc/DH_generate_parameters.pod b/src/lib/libcrypto/doc/DH_generate_parameters.pod index d19e0217ee..3832c25315 100644 --- a/src/lib/libcrypto/doc/DH_generate_parameters.pod +++ b/src/lib/libcrypto/doc/DH_generate_parameters.pod | |||
@@ -17,8 +17,7 @@ DH_generate_parameters, DH_check - generate and check Diffie-Hellman parameters | |||
17 | 17 | ||
18 | DH_generate_parameters() generates Diffie-Hellman parameters that can | 18 | DH_generate_parameters() generates Diffie-Hellman parameters that can |
19 | be shared among a group of users, and returns them in a newly | 19 | be shared among a group of users, and returns them in a newly |
20 | allocated B<DH> structure. The pseudo-random number generator must be | 20 | allocated B<DH> structure. |
21 | seeded prior to calling DH_generate_parameters(). | ||
22 | 21 | ||
23 | B<prime_len> is the length in bits of the safe prime to be generated. | 22 | B<prime_len> is the length in bits of the safe prime to be generated. |
24 | B<generator> is a small number E<gt> 1, typically 2 or 5. | 23 | B<generator> is a small number E<gt> 1, typically 2 or 5. |
diff --git a/src/lib/libcrypto/doc/DSA_generate_key.pod b/src/lib/libcrypto/doc/DSA_generate_key.pod index af83ccfaa1..069a05767c 100644 --- a/src/lib/libcrypto/doc/DSA_generate_key.pod +++ b/src/lib/libcrypto/doc/DSA_generate_key.pod | |||
@@ -15,8 +15,6 @@ DSA_generate_key - generate DSA key pair | |||
15 | DSA_generate_key() expects B<a> to contain DSA parameters. It generates | 15 | DSA_generate_key() expects B<a> to contain DSA parameters. It generates |
16 | a new key pair and stores it in B<a-E<gt>pub_key> and B<a-E<gt>priv_key>. | 16 | a new key pair and stores it in B<a-E<gt>pub_key> and B<a-E<gt>priv_key>. |
17 | 17 | ||
18 | The PRNG must be seeded prior to calling DSA_generate_key(). | ||
19 | |||
20 | =head1 RETURN VALUE | 18 | =head1 RETURN VALUE |
21 | 19 | ||
22 | DSA_generate_key() returns 1 on success, 0 otherwise. | 20 | DSA_generate_key() returns 1 on success, 0 otherwise. |
diff --git a/src/lib/libcrypto/doc/DSA_sign.pod b/src/lib/libcrypto/doc/DSA_sign.pod index 97389e8ec8..4e78a71390 100644 --- a/src/lib/libcrypto/doc/DSA_sign.pod +++ b/src/lib/libcrypto/doc/DSA_sign.pod | |||
@@ -38,9 +38,6 @@ B<dsa> is the signer's public key. | |||
38 | 38 | ||
39 | The B<type> parameter is ignored. | 39 | The B<type> parameter is ignored. |
40 | 40 | ||
41 | The PRNG must be seeded before DSA_sign() (or DSA_sign_setup()) | ||
42 | is called. | ||
43 | |||
44 | =head1 RETURN VALUES | 41 | =head1 RETURN VALUES |
45 | 42 | ||
46 | DSA_sign() and DSA_sign_setup() return 1 on success, 0 on error. | 43 | DSA_sign() and DSA_sign_setup() return 1 on success, 0 on error. |
diff --git a/src/lib/libcrypto/doc/EVP_DigestSignInit.pod b/src/lib/libcrypto/doc/EVP_DigestSignInit.pod index 7aec6daecc..e70b88a4a9 100644 --- a/src/lib/libcrypto/doc/EVP_DigestSignInit.pod +++ b/src/lib/libcrypto/doc/EVP_DigestSignInit.pod | |||
@@ -56,9 +56,6 @@ and public key algorithms. This meant that "clone" digests such as EVP_dss1() | |||
56 | needed to be used to sign using SHA1 and DSA. This is no longer necessary and | 56 | needed to be used to sign using SHA1 and DSA. This is no longer necessary and |
57 | the use of clone digest is now discouraged. | 57 | the use of clone digest is now discouraged. |
58 | 58 | ||
59 | For some key types and parameters the random number generator must be seeded | ||
60 | or the operation will fail. | ||
61 | |||
62 | The call to EVP_DigestSignFinal() internally finalizes a copy of the digest | 59 | The call to EVP_DigestSignFinal() internally finalizes a copy of the digest |
63 | context. This means that calls to EVP_DigestSignUpdate() and | 60 | context. This means that calls to EVP_DigestSignUpdate() and |
64 | EVP_DigestSignFinal() can be called later to digest and sign additional data. | 61 | EVP_DigestSignFinal() can be called later to digest and sign additional data. |
diff --git a/src/lib/libcrypto/doc/EVP_DigestVerifyInit.pod b/src/lib/libcrypto/doc/EVP_DigestVerifyInit.pod index 60666bfddc..9eebb15d22 100644 --- a/src/lib/libcrypto/doc/EVP_DigestVerifyInit.pod +++ b/src/lib/libcrypto/doc/EVP_DigestVerifyInit.pod | |||
@@ -56,9 +56,6 @@ and public key algorithms. This meant that "clone" digests such as EVP_dss1() | |||
56 | needed to be used to sign using SHA1 and DSA. This is no longer necessary and | 56 | needed to be used to sign using SHA1 and DSA. This is no longer necessary and |
57 | the use of clone digest is now discouraged. | 57 | the use of clone digest is now discouraged. |
58 | 58 | ||
59 | For some key types and parameters the random number generator must be seeded | ||
60 | or the operation will fail. | ||
61 | |||
62 | The call to EVP_DigestVerifyFinal() internally finalizes a copy of the digest | 59 | The call to EVP_DigestVerifyFinal() internally finalizes a copy of the digest |
63 | context. This means that calls to EVP_VerifyUpdate() and EVP_VerifyFinal() can | 60 | context. This means that calls to EVP_VerifyUpdate() and EVP_VerifyFinal() can |
64 | be called later to digest and verify additional data. | 61 | be called later to digest and verify additional data. |
diff --git a/src/lib/libcrypto/doc/EVP_SealInit.pod b/src/lib/libcrypto/doc/EVP_SealInit.pod index 172f210c64..ff73a04fd9 100644 --- a/src/lib/libcrypto/doc/EVP_SealInit.pod +++ b/src/lib/libcrypto/doc/EVP_SealInit.pod | |||
@@ -55,9 +55,6 @@ failure. | |||
55 | 55 | ||
56 | =head1 NOTES | 56 | =head1 NOTES |
57 | 57 | ||
58 | Because a random secret key is generated the random number generator | ||
59 | must be seeded before calling EVP_SealInit(). | ||
60 | |||
61 | The public key must be RSA because it is the only OpenSSL public key | 58 | The public key must be RSA because it is the only OpenSSL public key |
62 | algorithm that supports key transport. | 59 | algorithm that supports key transport. |
63 | 60 | ||
diff --git a/src/lib/libcrypto/doc/EVP_SignInit.pod b/src/lib/libcrypto/doc/EVP_SignInit.pod index 682724b157..6ea6df655e 100644 --- a/src/lib/libcrypto/doc/EVP_SignInit.pod +++ b/src/lib/libcrypto/doc/EVP_SignInit.pod | |||
@@ -60,10 +60,6 @@ digest algorithm must be used with the correct public key type. A list of | |||
60 | algorithms and associated public key algorithms appears in | 60 | algorithms and associated public key algorithms appears in |
61 | L<EVP_DigestInit(3)|EVP_DigestInit(3)>. | 61 | L<EVP_DigestInit(3)|EVP_DigestInit(3)>. |
62 | 62 | ||
63 | When signing with DSA private keys the random number generator must be seeded | ||
64 | or the operation will fail. The random number generator does not need to be | ||
65 | seeded for RSA signatures. | ||
66 | |||
67 | The call to EVP_SignFinal() internally finalizes a copy of the digest context. | 63 | The call to EVP_SignFinal() internally finalizes a copy of the digest context. |
68 | This means that calls to EVP_SignUpdate() and EVP_SignFinal() can be called | 64 | This means that calls to EVP_SignUpdate() and EVP_SignFinal() can be called |
69 | later to digest and sign additional data. | 65 | later to digest and sign additional data. |
diff --git a/src/lib/libcrypto/doc/RSA_blinding_on.pod b/src/lib/libcrypto/doc/RSA_blinding_on.pod index e6af8d4355..33990207f7 100644 --- a/src/lib/libcrypto/doc/RSA_blinding_on.pod +++ b/src/lib/libcrypto/doc/RSA_blinding_on.pod | |||
@@ -21,8 +21,7 @@ must be used to protect the RSA operation from that attack. | |||
21 | 21 | ||
22 | RSA_blinding_on() turns blinding on for key B<rsa> and generates a | 22 | RSA_blinding_on() turns blinding on for key B<rsa> and generates a |
23 | random blinding factor. B<ctx> is B<NULL> or a pre-allocated and | 23 | random blinding factor. B<ctx> is B<NULL> or a pre-allocated and |
24 | initialized B<BN_CTX>. The random number generator must be seeded | 24 | initialized B<BN_CTX>. |
25 | prior to calling RSA_blinding_on(). | ||
26 | 25 | ||
27 | RSA_blinding_off() turns blinding off and frees the memory used for | 26 | RSA_blinding_off() turns blinding off and frees the memory used for |
28 | the blinding factor. | 27 | the blinding factor. |
diff --git a/src/lib/libcrypto/doc/RSA_generate_key.pod b/src/lib/libcrypto/doc/RSA_generate_key.pod index 52dbb14a53..867390884b 100644 --- a/src/lib/libcrypto/doc/RSA_generate_key.pod +++ b/src/lib/libcrypto/doc/RSA_generate_key.pod | |||
@@ -14,8 +14,7 @@ RSA_generate_key - generate RSA key pair | |||
14 | =head1 DESCRIPTION | 14 | =head1 DESCRIPTION |
15 | 15 | ||
16 | RSA_generate_key() generates a key pair and returns it in a newly | 16 | RSA_generate_key() generates a key pair and returns it in a newly |
17 | allocated B<RSA> structure. The pseudo-random number generator must | 17 | allocated B<RSA> structure. |
18 | be seeded prior to calling RSA_generate_key(). | ||
19 | 18 | ||
20 | The modulus size will be B<num> bits, and the public exponent will be | 19 | The modulus size will be B<num> bits, and the public exponent will be |
21 | B<e>. Key sizes with B<num> E<lt> 1024 should be considered insecure. | 20 | B<e>. Key sizes with B<num> E<lt> 1024 should be considered insecure. |
diff --git a/src/lib/libcrypto/doc/RSA_padding_add_PKCS1_type_1.pod b/src/lib/libcrypto/doc/RSA_padding_add_PKCS1_type_1.pod index b8f678fe72..1c90b2b44d 100644 --- a/src/lib/libcrypto/doc/RSA_padding_add_PKCS1_type_1.pod +++ b/src/lib/libcrypto/doc/RSA_padding_add_PKCS1_type_1.pod | |||
@@ -85,9 +85,6 @@ simply copy the data | |||
85 | 85 | ||
86 | =back | 86 | =back |
87 | 87 | ||
88 | The random number generator must be seeded prior to calling | ||
89 | RSA_padding_add_xxx(). | ||
90 | |||
91 | RSA_padding_check_xxx() verifies that the B<fl> bytes at B<f> contain | 88 | RSA_padding_check_xxx() verifies that the B<fl> bytes at B<f> contain |
92 | a valid encoding for a B<rsa_len> byte RSA key in the respective | 89 | a valid encoding for a B<rsa_len> byte RSA key in the respective |
93 | encoding method and stores the recovered data of at most B<tlen> bytes | 90 | encoding method and stores the recovered data of at most B<tlen> bytes |
diff --git a/src/lib/libcrypto/doc/RSA_public_encrypt.pod b/src/lib/libcrypto/doc/RSA_public_encrypt.pod index ab0fe3b2cd..4bbee53f09 100644 --- a/src/lib/libcrypto/doc/RSA_public_encrypt.pod +++ b/src/lib/libcrypto/doc/RSA_public_encrypt.pod | |||
@@ -49,8 +49,6 @@ Encrypting user data directly with RSA is insecure. | |||
49 | B<flen> must be less than RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5 | 49 | B<flen> must be less than RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5 |
50 | based padding modes, less than RSA_size(B<rsa>) - 41 for | 50 | based padding modes, less than RSA_size(B<rsa>) - 41 for |
51 | RSA_PKCS1_OAEP_PADDING and exactly RSA_size(B<rsa>) for RSA_NO_PADDING. | 51 | RSA_PKCS1_OAEP_PADDING and exactly RSA_size(B<rsa>) for RSA_NO_PADDING. |
52 | The random number generator must be seeded prior to calling | ||
53 | RSA_public_encrypt(). | ||
54 | 52 | ||
55 | RSA_private_decrypt() decrypts the B<flen> bytes at B<from> using the | 53 | RSA_private_decrypt() decrypts the B<flen> bytes at B<from> using the |
56 | private key B<rsa> and stores the plaintext in B<to>. B<to> must point | 54 | private key B<rsa> and stores the plaintext in B<to>. B<to> must point |
diff --git a/src/lib/libcrypto/doc/RSA_sign_ASN1_OCTET_STRING.pod b/src/lib/libcrypto/doc/RSA_sign_ASN1_OCTET_STRING.pod index 315a9af9e8..664b46174b 100644 --- a/src/lib/libcrypto/doc/RSA_sign_ASN1_OCTET_STRING.pod +++ b/src/lib/libcrypto/doc/RSA_sign_ASN1_OCTET_STRING.pod | |||
@@ -26,9 +26,6 @@ memory. | |||
26 | 26 | ||
27 | B<dummy> is ignored. | 27 | B<dummy> is ignored. |
28 | 28 | ||
29 | The random number generator must be seeded prior to calling | ||
30 | RSA_sign_ASN1_OCTET_STRING(). | ||
31 | |||
32 | RSA_verify_ASN1_OCTET_STRING() verifies that the signature B<sigbuf> | 29 | RSA_verify_ASN1_OCTET_STRING() verifies that the signature B<sigbuf> |
33 | of size B<siglen> is the DER representation of a given octet string | 30 | of size B<siglen> is the DER representation of a given octet string |
34 | B<m> of size B<m_len>. B<dummy> is ignored. B<rsa> is the signer's | 31 | B<m> of size B<m_len>. B<dummy> is ignored. B<rsa> is the signer's |
diff --git a/src/lib/libssl/src/doc/crypto/BN_generate_prime.pod b/src/lib/libssl/src/doc/crypto/BN_generate_prime.pod index 04fc80df9c..2c5e6fae0f 100644 --- a/src/lib/libssl/src/doc/crypto/BN_generate_prime.pod +++ b/src/lib/libssl/src/doc/crypto/BN_generate_prime.pod | |||
@@ -55,7 +55,6 @@ generator. | |||
55 | If B<safe> is true, it will be a safe prime (i.e. a prime p so | 55 | If B<safe> is true, it will be a safe prime (i.e. a prime p so |
56 | that (p-1)/2 is also prime). | 56 | that (p-1)/2 is also prime). |
57 | 57 | ||
58 | The PRNG must be seeded prior to calling BN_generate_prime(). | ||
59 | The prime number generation has a negligible error probability. | 58 | The prime number generation has a negligible error probability. |
60 | 59 | ||
61 | BN_is_prime() and BN_is_prime_fasttest() test if the number B<a> is | 60 | BN_is_prime() and BN_is_prime_fasttest() test if the number B<a> is |
diff --git a/src/lib/libssl/src/doc/crypto/BN_rand.pod b/src/lib/libssl/src/doc/crypto/BN_rand.pod index 81f93c2eb3..70f435b203 100644 --- a/src/lib/libssl/src/doc/crypto/BN_rand.pod +++ b/src/lib/libssl/src/doc/crypto/BN_rand.pod | |||
@@ -36,8 +36,6 @@ number B<rnd> in the range 0 <lt>= B<rnd> E<lt> B<range>. | |||
36 | BN_pseudo_rand_range() does the same, but is based on BN_pseudo_rand(), | 36 | BN_pseudo_rand_range() does the same, but is based on BN_pseudo_rand(), |
37 | and hence numbers generated by it are not necessarily unpredictable. | 37 | and hence numbers generated by it are not necessarily unpredictable. |
38 | 38 | ||
39 | The PRNG must be seeded prior to calling BN_rand() or BN_rand_range(). | ||
40 | |||
41 | =head1 RETURN VALUES | 39 | =head1 RETURN VALUES |
42 | 40 | ||
43 | The functions return 1 on success, 0 on error. | 41 | The functions return 1 on success, 0 on error. |
diff --git a/src/lib/libssl/src/doc/crypto/DES_set_key.pod b/src/lib/libssl/src/doc/crypto/DES_set_key.pod index b49545877a..75638a149a 100644 --- a/src/lib/libssl/src/doc/crypto/DES_set_key.pod +++ b/src/lib/libssl/src/doc/crypto/DES_set_key.pod | |||
@@ -114,9 +114,7 @@ consists of 8 bytes with odd parity. The least significant bit in | |||
114 | each byte is the parity bit. The key schedule is an expanded form of | 114 | each byte is the parity bit. The key schedule is an expanded form of |
115 | the key; it is used to speed the encryption process. | 115 | the key; it is used to speed the encryption process. |
116 | 116 | ||
117 | DES_random_key() generates a random key. The PRNG must be seeded | 117 | DES_random_key() generates a random key. |
118 | prior to using this function (see L<rand(3)|rand(3)>). If the PRNG | ||
119 | could not generate a secure key, 0 is returned. | ||
120 | 118 | ||
121 | Before a DES key can be used, it must be converted into the | 119 | Before a DES key can be used, it must be converted into the |
122 | architecture dependent I<DES_key_schedule> via the | 120 | architecture dependent I<DES_key_schedule> via the |
diff --git a/src/lib/libssl/src/doc/crypto/DH_generate_parameters.pod b/src/lib/libssl/src/doc/crypto/DH_generate_parameters.pod index d19e0217ee..3832c25315 100644 --- a/src/lib/libssl/src/doc/crypto/DH_generate_parameters.pod +++ b/src/lib/libssl/src/doc/crypto/DH_generate_parameters.pod | |||
@@ -17,8 +17,7 @@ DH_generate_parameters, DH_check - generate and check Diffie-Hellman parameters | |||
17 | 17 | ||
18 | DH_generate_parameters() generates Diffie-Hellman parameters that can | 18 | DH_generate_parameters() generates Diffie-Hellman parameters that can |
19 | be shared among a group of users, and returns them in a newly | 19 | be shared among a group of users, and returns them in a newly |
20 | allocated B<DH> structure. The pseudo-random number generator must be | 20 | allocated B<DH> structure. |
21 | seeded prior to calling DH_generate_parameters(). | ||
22 | 21 | ||
23 | B<prime_len> is the length in bits of the safe prime to be generated. | 22 | B<prime_len> is the length in bits of the safe prime to be generated. |
24 | B<generator> is a small number E<gt> 1, typically 2 or 5. | 23 | B<generator> is a small number E<gt> 1, typically 2 or 5. |
diff --git a/src/lib/libssl/src/doc/crypto/DSA_generate_key.pod b/src/lib/libssl/src/doc/crypto/DSA_generate_key.pod index af83ccfaa1..069a05767c 100644 --- a/src/lib/libssl/src/doc/crypto/DSA_generate_key.pod +++ b/src/lib/libssl/src/doc/crypto/DSA_generate_key.pod | |||
@@ -15,8 +15,6 @@ DSA_generate_key - generate DSA key pair | |||
15 | DSA_generate_key() expects B<a> to contain DSA parameters. It generates | 15 | DSA_generate_key() expects B<a> to contain DSA parameters. It generates |
16 | a new key pair and stores it in B<a-E<gt>pub_key> and B<a-E<gt>priv_key>. | 16 | a new key pair and stores it in B<a-E<gt>pub_key> and B<a-E<gt>priv_key>. |
17 | 17 | ||
18 | The PRNG must be seeded prior to calling DSA_generate_key(). | ||
19 | |||
20 | =head1 RETURN VALUE | 18 | =head1 RETURN VALUE |
21 | 19 | ||
22 | DSA_generate_key() returns 1 on success, 0 otherwise. | 20 | DSA_generate_key() returns 1 on success, 0 otherwise. |
diff --git a/src/lib/libssl/src/doc/crypto/DSA_sign.pod b/src/lib/libssl/src/doc/crypto/DSA_sign.pod index 97389e8ec8..4e78a71390 100644 --- a/src/lib/libssl/src/doc/crypto/DSA_sign.pod +++ b/src/lib/libssl/src/doc/crypto/DSA_sign.pod | |||
@@ -38,9 +38,6 @@ B<dsa> is the signer's public key. | |||
38 | 38 | ||
39 | The B<type> parameter is ignored. | 39 | The B<type> parameter is ignored. |
40 | 40 | ||
41 | The PRNG must be seeded before DSA_sign() (or DSA_sign_setup()) | ||
42 | is called. | ||
43 | |||
44 | =head1 RETURN VALUES | 41 | =head1 RETURN VALUES |
45 | 42 | ||
46 | DSA_sign() and DSA_sign_setup() return 1 on success, 0 on error. | 43 | DSA_sign() and DSA_sign_setup() return 1 on success, 0 on error. |
diff --git a/src/lib/libssl/src/doc/crypto/EVP_DigestSignInit.pod b/src/lib/libssl/src/doc/crypto/EVP_DigestSignInit.pod index 7aec6daecc..e70b88a4a9 100644 --- a/src/lib/libssl/src/doc/crypto/EVP_DigestSignInit.pod +++ b/src/lib/libssl/src/doc/crypto/EVP_DigestSignInit.pod | |||
@@ -56,9 +56,6 @@ and public key algorithms. This meant that "clone" digests such as EVP_dss1() | |||
56 | needed to be used to sign using SHA1 and DSA. This is no longer necessary and | 56 | needed to be used to sign using SHA1 and DSA. This is no longer necessary and |
57 | the use of clone digest is now discouraged. | 57 | the use of clone digest is now discouraged. |
58 | 58 | ||
59 | For some key types and parameters the random number generator must be seeded | ||
60 | or the operation will fail. | ||
61 | |||
62 | The call to EVP_DigestSignFinal() internally finalizes a copy of the digest | 59 | The call to EVP_DigestSignFinal() internally finalizes a copy of the digest |
63 | context. This means that calls to EVP_DigestSignUpdate() and | 60 | context. This means that calls to EVP_DigestSignUpdate() and |
64 | EVP_DigestSignFinal() can be called later to digest and sign additional data. | 61 | EVP_DigestSignFinal() can be called later to digest and sign additional data. |
diff --git a/src/lib/libssl/src/doc/crypto/EVP_DigestVerifyInit.pod b/src/lib/libssl/src/doc/crypto/EVP_DigestVerifyInit.pod index 60666bfddc..9eebb15d22 100644 --- a/src/lib/libssl/src/doc/crypto/EVP_DigestVerifyInit.pod +++ b/src/lib/libssl/src/doc/crypto/EVP_DigestVerifyInit.pod | |||
@@ -56,9 +56,6 @@ and public key algorithms. This meant that "clone" digests such as EVP_dss1() | |||
56 | needed to be used to sign using SHA1 and DSA. This is no longer necessary and | 56 | needed to be used to sign using SHA1 and DSA. This is no longer necessary and |
57 | the use of clone digest is now discouraged. | 57 | the use of clone digest is now discouraged. |
58 | 58 | ||
59 | For some key types and parameters the random number generator must be seeded | ||
60 | or the operation will fail. | ||
61 | |||
62 | The call to EVP_DigestVerifyFinal() internally finalizes a copy of the digest | 59 | The call to EVP_DigestVerifyFinal() internally finalizes a copy of the digest |
63 | context. This means that calls to EVP_VerifyUpdate() and EVP_VerifyFinal() can | 60 | context. This means that calls to EVP_VerifyUpdate() and EVP_VerifyFinal() can |
64 | be called later to digest and verify additional data. | 61 | be called later to digest and verify additional data. |
diff --git a/src/lib/libssl/src/doc/crypto/EVP_SealInit.pod b/src/lib/libssl/src/doc/crypto/EVP_SealInit.pod index 172f210c64..ff73a04fd9 100644 --- a/src/lib/libssl/src/doc/crypto/EVP_SealInit.pod +++ b/src/lib/libssl/src/doc/crypto/EVP_SealInit.pod | |||
@@ -55,9 +55,6 @@ failure. | |||
55 | 55 | ||
56 | =head1 NOTES | 56 | =head1 NOTES |
57 | 57 | ||
58 | Because a random secret key is generated the random number generator | ||
59 | must be seeded before calling EVP_SealInit(). | ||
60 | |||
61 | The public key must be RSA because it is the only OpenSSL public key | 58 | The public key must be RSA because it is the only OpenSSL public key |
62 | algorithm that supports key transport. | 59 | algorithm that supports key transport. |
63 | 60 | ||
diff --git a/src/lib/libssl/src/doc/crypto/EVP_SignInit.pod b/src/lib/libssl/src/doc/crypto/EVP_SignInit.pod index 682724b157..6ea6df655e 100644 --- a/src/lib/libssl/src/doc/crypto/EVP_SignInit.pod +++ b/src/lib/libssl/src/doc/crypto/EVP_SignInit.pod | |||
@@ -60,10 +60,6 @@ digest algorithm must be used with the correct public key type. A list of | |||
60 | algorithms and associated public key algorithms appears in | 60 | algorithms and associated public key algorithms appears in |
61 | L<EVP_DigestInit(3)|EVP_DigestInit(3)>. | 61 | L<EVP_DigestInit(3)|EVP_DigestInit(3)>. |
62 | 62 | ||
63 | When signing with DSA private keys the random number generator must be seeded | ||
64 | or the operation will fail. The random number generator does not need to be | ||
65 | seeded for RSA signatures. | ||
66 | |||
67 | The call to EVP_SignFinal() internally finalizes a copy of the digest context. | 63 | The call to EVP_SignFinal() internally finalizes a copy of the digest context. |
68 | This means that calls to EVP_SignUpdate() and EVP_SignFinal() can be called | 64 | This means that calls to EVP_SignUpdate() and EVP_SignFinal() can be called |
69 | later to digest and sign additional data. | 65 | later to digest and sign additional data. |
diff --git a/src/lib/libssl/src/doc/crypto/RSA_blinding_on.pod b/src/lib/libssl/src/doc/crypto/RSA_blinding_on.pod index e6af8d4355..33990207f7 100644 --- a/src/lib/libssl/src/doc/crypto/RSA_blinding_on.pod +++ b/src/lib/libssl/src/doc/crypto/RSA_blinding_on.pod | |||
@@ -21,8 +21,7 @@ must be used to protect the RSA operation from that attack. | |||
21 | 21 | ||
22 | RSA_blinding_on() turns blinding on for key B<rsa> and generates a | 22 | RSA_blinding_on() turns blinding on for key B<rsa> and generates a |
23 | random blinding factor. B<ctx> is B<NULL> or a pre-allocated and | 23 | random blinding factor. B<ctx> is B<NULL> or a pre-allocated and |
24 | initialized B<BN_CTX>. The random number generator must be seeded | 24 | initialized B<BN_CTX>. |
25 | prior to calling RSA_blinding_on(). | ||
26 | 25 | ||
27 | RSA_blinding_off() turns blinding off and frees the memory used for | 26 | RSA_blinding_off() turns blinding off and frees the memory used for |
28 | the blinding factor. | 27 | the blinding factor. |
diff --git a/src/lib/libssl/src/doc/crypto/RSA_generate_key.pod b/src/lib/libssl/src/doc/crypto/RSA_generate_key.pod index 52dbb14a53..867390884b 100644 --- a/src/lib/libssl/src/doc/crypto/RSA_generate_key.pod +++ b/src/lib/libssl/src/doc/crypto/RSA_generate_key.pod | |||
@@ -14,8 +14,7 @@ RSA_generate_key - generate RSA key pair | |||
14 | =head1 DESCRIPTION | 14 | =head1 DESCRIPTION |
15 | 15 | ||
16 | RSA_generate_key() generates a key pair and returns it in a newly | 16 | RSA_generate_key() generates a key pair and returns it in a newly |
17 | allocated B<RSA> structure. The pseudo-random number generator must | 17 | allocated B<RSA> structure. |
18 | be seeded prior to calling RSA_generate_key(). | ||
19 | 18 | ||
20 | The modulus size will be B<num> bits, and the public exponent will be | 19 | The modulus size will be B<num> bits, and the public exponent will be |
21 | B<e>. Key sizes with B<num> E<lt> 1024 should be considered insecure. | 20 | B<e>. Key sizes with B<num> E<lt> 1024 should be considered insecure. |
diff --git a/src/lib/libssl/src/doc/crypto/RSA_padding_add_PKCS1_type_1.pod b/src/lib/libssl/src/doc/crypto/RSA_padding_add_PKCS1_type_1.pod index b8f678fe72..1c90b2b44d 100644 --- a/src/lib/libssl/src/doc/crypto/RSA_padding_add_PKCS1_type_1.pod +++ b/src/lib/libssl/src/doc/crypto/RSA_padding_add_PKCS1_type_1.pod | |||
@@ -85,9 +85,6 @@ simply copy the data | |||
85 | 85 | ||
86 | =back | 86 | =back |
87 | 87 | ||
88 | The random number generator must be seeded prior to calling | ||
89 | RSA_padding_add_xxx(). | ||
90 | |||
91 | RSA_padding_check_xxx() verifies that the B<fl> bytes at B<f> contain | 88 | RSA_padding_check_xxx() verifies that the B<fl> bytes at B<f> contain |
92 | a valid encoding for a B<rsa_len> byte RSA key in the respective | 89 | a valid encoding for a B<rsa_len> byte RSA key in the respective |
93 | encoding method and stores the recovered data of at most B<tlen> bytes | 90 | encoding method and stores the recovered data of at most B<tlen> bytes |
diff --git a/src/lib/libssl/src/doc/crypto/RSA_public_encrypt.pod b/src/lib/libssl/src/doc/crypto/RSA_public_encrypt.pod index ab0fe3b2cd..4bbee53f09 100644 --- a/src/lib/libssl/src/doc/crypto/RSA_public_encrypt.pod +++ b/src/lib/libssl/src/doc/crypto/RSA_public_encrypt.pod | |||
@@ -49,8 +49,6 @@ Encrypting user data directly with RSA is insecure. | |||
49 | B<flen> must be less than RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5 | 49 | B<flen> must be less than RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5 |
50 | based padding modes, less than RSA_size(B<rsa>) - 41 for | 50 | based padding modes, less than RSA_size(B<rsa>) - 41 for |
51 | RSA_PKCS1_OAEP_PADDING and exactly RSA_size(B<rsa>) for RSA_NO_PADDING. | 51 | RSA_PKCS1_OAEP_PADDING and exactly RSA_size(B<rsa>) for RSA_NO_PADDING. |
52 | The random number generator must be seeded prior to calling | ||
53 | RSA_public_encrypt(). | ||
54 | 52 | ||
55 | RSA_private_decrypt() decrypts the B<flen> bytes at B<from> using the | 53 | RSA_private_decrypt() decrypts the B<flen> bytes at B<from> using the |
56 | private key B<rsa> and stores the plaintext in B<to>. B<to> must point | 54 | private key B<rsa> and stores the plaintext in B<to>. B<to> must point |
diff --git a/src/lib/libssl/src/doc/crypto/RSA_sign_ASN1_OCTET_STRING.pod b/src/lib/libssl/src/doc/crypto/RSA_sign_ASN1_OCTET_STRING.pod index 315a9af9e8..664b46174b 100644 --- a/src/lib/libssl/src/doc/crypto/RSA_sign_ASN1_OCTET_STRING.pod +++ b/src/lib/libssl/src/doc/crypto/RSA_sign_ASN1_OCTET_STRING.pod | |||
@@ -26,9 +26,6 @@ memory. | |||
26 | 26 | ||
27 | B<dummy> is ignored. | 27 | B<dummy> is ignored. |
28 | 28 | ||
29 | The random number generator must be seeded prior to calling | ||
30 | RSA_sign_ASN1_OCTET_STRING(). | ||
31 | |||
32 | RSA_verify_ASN1_OCTET_STRING() verifies that the signature B<sigbuf> | 29 | RSA_verify_ASN1_OCTET_STRING() verifies that the signature B<sigbuf> |
33 | of size B<siglen> is the DER representation of a given octet string | 30 | of size B<siglen> is the DER representation of a given octet string |
34 | B<m> of size B<m_len>. B<dummy> is ignored. B<rsa> is the signer's | 31 | B<m> of size B<m_len>. B<dummy> is ignored. B<rsa> is the signer's |