diff options
Diffstat (limited to 'src')
28 files changed, 8 insertions, 73 deletions
diff --git a/src/lib/libcrypto/doc/DES_set_key.pod b/src/lib/libcrypto/doc/DES_set_key.pod index b49545877a..75638a149a 100644 --- a/src/lib/libcrypto/doc/DES_set_key.pod +++ b/src/lib/libcrypto/doc/DES_set_key.pod | |||
| @@ -114,9 +114,7 @@ consists of 8 bytes with odd parity. The least significant bit in | |||
| 114 | each byte is the parity bit. The key schedule is an expanded form of | 114 | each byte is the parity bit. The key schedule is an expanded form of |
| 115 | the key; it is used to speed the encryption process. | 115 | the key; it is used to speed the encryption process. |
| 116 | 116 | ||
| 117 | DES_random_key() generates a random key. The PRNG must be seeded | 117 | DES_random_key() generates a random key. |
| 118 | prior to using this function (see L<rand(3)|rand(3)>). If the PRNG | ||
| 119 | could not generate a secure key, 0 is returned. | ||
| 120 | 118 | ||
| 121 | Before a DES key can be used, it must be converted into the | 119 | Before a DES key can be used, it must be converted into the |
| 122 | architecture dependent I<DES_key_schedule> via the | 120 | architecture dependent I<DES_key_schedule> via the |
diff --git a/src/lib/libcrypto/doc/DH_generate_parameters.pod b/src/lib/libcrypto/doc/DH_generate_parameters.pod index d19e0217ee..3832c25315 100644 --- a/src/lib/libcrypto/doc/DH_generate_parameters.pod +++ b/src/lib/libcrypto/doc/DH_generate_parameters.pod | |||
| @@ -17,8 +17,7 @@ DH_generate_parameters, DH_check - generate and check Diffie-Hellman parameters | |||
| 17 | 17 | ||
| 18 | DH_generate_parameters() generates Diffie-Hellman parameters that can | 18 | DH_generate_parameters() generates Diffie-Hellman parameters that can |
| 19 | be shared among a group of users, and returns them in a newly | 19 | be shared among a group of users, and returns them in a newly |
| 20 | allocated B<DH> structure. The pseudo-random number generator must be | 20 | allocated B<DH> structure. |
| 21 | seeded prior to calling DH_generate_parameters(). | ||
| 22 | 21 | ||
| 23 | B<prime_len> is the length in bits of the safe prime to be generated. | 22 | B<prime_len> is the length in bits of the safe prime to be generated. |
| 24 | B<generator> is a small number E<gt> 1, typically 2 or 5. | 23 | B<generator> is a small number E<gt> 1, typically 2 or 5. |
diff --git a/src/lib/libcrypto/doc/DSA_generate_key.pod b/src/lib/libcrypto/doc/DSA_generate_key.pod index af83ccfaa1..069a05767c 100644 --- a/src/lib/libcrypto/doc/DSA_generate_key.pod +++ b/src/lib/libcrypto/doc/DSA_generate_key.pod | |||
| @@ -15,8 +15,6 @@ DSA_generate_key - generate DSA key pair | |||
| 15 | DSA_generate_key() expects B<a> to contain DSA parameters. It generates | 15 | DSA_generate_key() expects B<a> to contain DSA parameters. It generates |
| 16 | a new key pair and stores it in B<a-E<gt>pub_key> and B<a-E<gt>priv_key>. | 16 | a new key pair and stores it in B<a-E<gt>pub_key> and B<a-E<gt>priv_key>. |
| 17 | 17 | ||
| 18 | The PRNG must be seeded prior to calling DSA_generate_key(). | ||
| 19 | |||
| 20 | =head1 RETURN VALUE | 18 | =head1 RETURN VALUE |
| 21 | 19 | ||
| 22 | DSA_generate_key() returns 1 on success, 0 otherwise. | 20 | DSA_generate_key() returns 1 on success, 0 otherwise. |
diff --git a/src/lib/libcrypto/doc/DSA_sign.pod b/src/lib/libcrypto/doc/DSA_sign.pod index 97389e8ec8..4e78a71390 100644 --- a/src/lib/libcrypto/doc/DSA_sign.pod +++ b/src/lib/libcrypto/doc/DSA_sign.pod | |||
| @@ -38,9 +38,6 @@ B<dsa> is the signer's public key. | |||
| 38 | 38 | ||
| 39 | The B<type> parameter is ignored. | 39 | The B<type> parameter is ignored. |
| 40 | 40 | ||
| 41 | The PRNG must be seeded before DSA_sign() (or DSA_sign_setup()) | ||
| 42 | is called. | ||
| 43 | |||
| 44 | =head1 RETURN VALUES | 41 | =head1 RETURN VALUES |
| 45 | 42 | ||
| 46 | DSA_sign() and DSA_sign_setup() return 1 on success, 0 on error. | 43 | DSA_sign() and DSA_sign_setup() return 1 on success, 0 on error. |
diff --git a/src/lib/libcrypto/doc/EVP_DigestSignInit.pod b/src/lib/libcrypto/doc/EVP_DigestSignInit.pod index 7aec6daecc..e70b88a4a9 100644 --- a/src/lib/libcrypto/doc/EVP_DigestSignInit.pod +++ b/src/lib/libcrypto/doc/EVP_DigestSignInit.pod | |||
| @@ -56,9 +56,6 @@ and public key algorithms. This meant that "clone" digests such as EVP_dss1() | |||
| 56 | needed to be used to sign using SHA1 and DSA. This is no longer necessary and | 56 | needed to be used to sign using SHA1 and DSA. This is no longer necessary and |
| 57 | the use of clone digest is now discouraged. | 57 | the use of clone digest is now discouraged. |
| 58 | 58 | ||
| 59 | For some key types and parameters the random number generator must be seeded | ||
| 60 | or the operation will fail. | ||
| 61 | |||
| 62 | The call to EVP_DigestSignFinal() internally finalizes a copy of the digest | 59 | The call to EVP_DigestSignFinal() internally finalizes a copy of the digest |
| 63 | context. This means that calls to EVP_DigestSignUpdate() and | 60 | context. This means that calls to EVP_DigestSignUpdate() and |
| 64 | EVP_DigestSignFinal() can be called later to digest and sign additional data. | 61 | EVP_DigestSignFinal() can be called later to digest and sign additional data. |
diff --git a/src/lib/libcrypto/doc/EVP_DigestVerifyInit.pod b/src/lib/libcrypto/doc/EVP_DigestVerifyInit.pod index 60666bfddc..9eebb15d22 100644 --- a/src/lib/libcrypto/doc/EVP_DigestVerifyInit.pod +++ b/src/lib/libcrypto/doc/EVP_DigestVerifyInit.pod | |||
| @@ -56,9 +56,6 @@ and public key algorithms. This meant that "clone" digests such as EVP_dss1() | |||
| 56 | needed to be used to sign using SHA1 and DSA. This is no longer necessary and | 56 | needed to be used to sign using SHA1 and DSA. This is no longer necessary and |
| 57 | the use of clone digest is now discouraged. | 57 | the use of clone digest is now discouraged. |
| 58 | 58 | ||
| 59 | For some key types and parameters the random number generator must be seeded | ||
| 60 | or the operation will fail. | ||
| 61 | |||
| 62 | The call to EVP_DigestVerifyFinal() internally finalizes a copy of the digest | 59 | The call to EVP_DigestVerifyFinal() internally finalizes a copy of the digest |
| 63 | context. This means that calls to EVP_VerifyUpdate() and EVP_VerifyFinal() can | 60 | context. This means that calls to EVP_VerifyUpdate() and EVP_VerifyFinal() can |
| 64 | be called later to digest and verify additional data. | 61 | be called later to digest and verify additional data. |
diff --git a/src/lib/libcrypto/doc/EVP_SealInit.pod b/src/lib/libcrypto/doc/EVP_SealInit.pod index 172f210c64..ff73a04fd9 100644 --- a/src/lib/libcrypto/doc/EVP_SealInit.pod +++ b/src/lib/libcrypto/doc/EVP_SealInit.pod | |||
| @@ -55,9 +55,6 @@ failure. | |||
| 55 | 55 | ||
| 56 | =head1 NOTES | 56 | =head1 NOTES |
| 57 | 57 | ||
| 58 | Because a random secret key is generated the random number generator | ||
| 59 | must be seeded before calling EVP_SealInit(). | ||
| 60 | |||
| 61 | The public key must be RSA because it is the only OpenSSL public key | 58 | The public key must be RSA because it is the only OpenSSL public key |
| 62 | algorithm that supports key transport. | 59 | algorithm that supports key transport. |
| 63 | 60 | ||
diff --git a/src/lib/libcrypto/doc/EVP_SignInit.pod b/src/lib/libcrypto/doc/EVP_SignInit.pod index 682724b157..6ea6df655e 100644 --- a/src/lib/libcrypto/doc/EVP_SignInit.pod +++ b/src/lib/libcrypto/doc/EVP_SignInit.pod | |||
| @@ -60,10 +60,6 @@ digest algorithm must be used with the correct public key type. A list of | |||
| 60 | algorithms and associated public key algorithms appears in | 60 | algorithms and associated public key algorithms appears in |
| 61 | L<EVP_DigestInit(3)|EVP_DigestInit(3)>. | 61 | L<EVP_DigestInit(3)|EVP_DigestInit(3)>. |
| 62 | 62 | ||
| 63 | When signing with DSA private keys the random number generator must be seeded | ||
| 64 | or the operation will fail. The random number generator does not need to be | ||
| 65 | seeded for RSA signatures. | ||
| 66 | |||
| 67 | The call to EVP_SignFinal() internally finalizes a copy of the digest context. | 63 | The call to EVP_SignFinal() internally finalizes a copy of the digest context. |
| 68 | This means that calls to EVP_SignUpdate() and EVP_SignFinal() can be called | 64 | This means that calls to EVP_SignUpdate() and EVP_SignFinal() can be called |
| 69 | later to digest and sign additional data. | 65 | later to digest and sign additional data. |
diff --git a/src/lib/libcrypto/doc/RSA_blinding_on.pod b/src/lib/libcrypto/doc/RSA_blinding_on.pod index e6af8d4355..33990207f7 100644 --- a/src/lib/libcrypto/doc/RSA_blinding_on.pod +++ b/src/lib/libcrypto/doc/RSA_blinding_on.pod | |||
| @@ -21,8 +21,7 @@ must be used to protect the RSA operation from that attack. | |||
| 21 | 21 | ||
| 22 | RSA_blinding_on() turns blinding on for key B<rsa> and generates a | 22 | RSA_blinding_on() turns blinding on for key B<rsa> and generates a |
| 23 | random blinding factor. B<ctx> is B<NULL> or a pre-allocated and | 23 | random blinding factor. B<ctx> is B<NULL> or a pre-allocated and |
| 24 | initialized B<BN_CTX>. The random number generator must be seeded | 24 | initialized B<BN_CTX>. |
| 25 | prior to calling RSA_blinding_on(). | ||
| 26 | 25 | ||
| 27 | RSA_blinding_off() turns blinding off and frees the memory used for | 26 | RSA_blinding_off() turns blinding off and frees the memory used for |
| 28 | the blinding factor. | 27 | the blinding factor. |
diff --git a/src/lib/libcrypto/doc/RSA_generate_key.pod b/src/lib/libcrypto/doc/RSA_generate_key.pod index 52dbb14a53..867390884b 100644 --- a/src/lib/libcrypto/doc/RSA_generate_key.pod +++ b/src/lib/libcrypto/doc/RSA_generate_key.pod | |||
| @@ -14,8 +14,7 @@ RSA_generate_key - generate RSA key pair | |||
| 14 | =head1 DESCRIPTION | 14 | =head1 DESCRIPTION |
| 15 | 15 | ||
| 16 | RSA_generate_key() generates a key pair and returns it in a newly | 16 | RSA_generate_key() generates a key pair and returns it in a newly |
| 17 | allocated B<RSA> structure. The pseudo-random number generator must | 17 | allocated B<RSA> structure. |
| 18 | be seeded prior to calling RSA_generate_key(). | ||
| 19 | 18 | ||
| 20 | The modulus size will be B<num> bits, and the public exponent will be | 19 | The modulus size will be B<num> bits, and the public exponent will be |
| 21 | B<e>. Key sizes with B<num> E<lt> 1024 should be considered insecure. | 20 | B<e>. Key sizes with B<num> E<lt> 1024 should be considered insecure. |
diff --git a/src/lib/libcrypto/doc/RSA_padding_add_PKCS1_type_1.pod b/src/lib/libcrypto/doc/RSA_padding_add_PKCS1_type_1.pod index b8f678fe72..1c90b2b44d 100644 --- a/src/lib/libcrypto/doc/RSA_padding_add_PKCS1_type_1.pod +++ b/src/lib/libcrypto/doc/RSA_padding_add_PKCS1_type_1.pod | |||
| @@ -85,9 +85,6 @@ simply copy the data | |||
| 85 | 85 | ||
| 86 | =back | 86 | =back |
| 87 | 87 | ||
| 88 | The random number generator must be seeded prior to calling | ||
| 89 | RSA_padding_add_xxx(). | ||
| 90 | |||
| 91 | RSA_padding_check_xxx() verifies that the B<fl> bytes at B<f> contain | 88 | RSA_padding_check_xxx() verifies that the B<fl> bytes at B<f> contain |
| 92 | a valid encoding for a B<rsa_len> byte RSA key in the respective | 89 | a valid encoding for a B<rsa_len> byte RSA key in the respective |
| 93 | encoding method and stores the recovered data of at most B<tlen> bytes | 90 | encoding method and stores the recovered data of at most B<tlen> bytes |
diff --git a/src/lib/libcrypto/doc/RSA_public_encrypt.pod b/src/lib/libcrypto/doc/RSA_public_encrypt.pod index ab0fe3b2cd..4bbee53f09 100644 --- a/src/lib/libcrypto/doc/RSA_public_encrypt.pod +++ b/src/lib/libcrypto/doc/RSA_public_encrypt.pod | |||
| @@ -49,8 +49,6 @@ Encrypting user data directly with RSA is insecure. | |||
| 49 | B<flen> must be less than RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5 | 49 | B<flen> must be less than RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5 |
| 50 | based padding modes, less than RSA_size(B<rsa>) - 41 for | 50 | based padding modes, less than RSA_size(B<rsa>) - 41 for |
| 51 | RSA_PKCS1_OAEP_PADDING and exactly RSA_size(B<rsa>) for RSA_NO_PADDING. | 51 | RSA_PKCS1_OAEP_PADDING and exactly RSA_size(B<rsa>) for RSA_NO_PADDING. |
| 52 | The random number generator must be seeded prior to calling | ||
| 53 | RSA_public_encrypt(). | ||
| 54 | 52 | ||
| 55 | RSA_private_decrypt() decrypts the B<flen> bytes at B<from> using the | 53 | RSA_private_decrypt() decrypts the B<flen> bytes at B<from> using the |
| 56 | private key B<rsa> and stores the plaintext in B<to>. B<to> must point | 54 | private key B<rsa> and stores the plaintext in B<to>. B<to> must point |
diff --git a/src/lib/libcrypto/doc/RSA_sign_ASN1_OCTET_STRING.pod b/src/lib/libcrypto/doc/RSA_sign_ASN1_OCTET_STRING.pod index 315a9af9e8..664b46174b 100644 --- a/src/lib/libcrypto/doc/RSA_sign_ASN1_OCTET_STRING.pod +++ b/src/lib/libcrypto/doc/RSA_sign_ASN1_OCTET_STRING.pod | |||
| @@ -26,9 +26,6 @@ memory. | |||
| 26 | 26 | ||
| 27 | B<dummy> is ignored. | 27 | B<dummy> is ignored. |
| 28 | 28 | ||
| 29 | The random number generator must be seeded prior to calling | ||
| 30 | RSA_sign_ASN1_OCTET_STRING(). | ||
| 31 | |||
| 32 | RSA_verify_ASN1_OCTET_STRING() verifies that the signature B<sigbuf> | 29 | RSA_verify_ASN1_OCTET_STRING() verifies that the signature B<sigbuf> |
| 33 | of size B<siglen> is the DER representation of a given octet string | 30 | of size B<siglen> is the DER representation of a given octet string |
| 34 | B<m> of size B<m_len>. B<dummy> is ignored. B<rsa> is the signer's | 31 | B<m> of size B<m_len>. B<dummy> is ignored. B<rsa> is the signer's |
diff --git a/src/lib/libssl/src/doc/crypto/BN_generate_prime.pod b/src/lib/libssl/src/doc/crypto/BN_generate_prime.pod index 04fc80df9c..2c5e6fae0f 100644 --- a/src/lib/libssl/src/doc/crypto/BN_generate_prime.pod +++ b/src/lib/libssl/src/doc/crypto/BN_generate_prime.pod | |||
| @@ -55,7 +55,6 @@ generator. | |||
| 55 | If B<safe> is true, it will be a safe prime (i.e. a prime p so | 55 | If B<safe> is true, it will be a safe prime (i.e. a prime p so |
| 56 | that (p-1)/2 is also prime). | 56 | that (p-1)/2 is also prime). |
| 57 | 57 | ||
| 58 | The PRNG must be seeded prior to calling BN_generate_prime(). | ||
| 59 | The prime number generation has a negligible error probability. | 58 | The prime number generation has a negligible error probability. |
| 60 | 59 | ||
| 61 | BN_is_prime() and BN_is_prime_fasttest() test if the number B<a> is | 60 | BN_is_prime() and BN_is_prime_fasttest() test if the number B<a> is |
diff --git a/src/lib/libssl/src/doc/crypto/BN_rand.pod b/src/lib/libssl/src/doc/crypto/BN_rand.pod index 81f93c2eb3..70f435b203 100644 --- a/src/lib/libssl/src/doc/crypto/BN_rand.pod +++ b/src/lib/libssl/src/doc/crypto/BN_rand.pod | |||
| @@ -36,8 +36,6 @@ number B<rnd> in the range 0 <lt>= B<rnd> E<lt> B<range>. | |||
| 36 | BN_pseudo_rand_range() does the same, but is based on BN_pseudo_rand(), | 36 | BN_pseudo_rand_range() does the same, but is based on BN_pseudo_rand(), |
| 37 | and hence numbers generated by it are not necessarily unpredictable. | 37 | and hence numbers generated by it are not necessarily unpredictable. |
| 38 | 38 | ||
| 39 | The PRNG must be seeded prior to calling BN_rand() or BN_rand_range(). | ||
| 40 | |||
| 41 | =head1 RETURN VALUES | 39 | =head1 RETURN VALUES |
| 42 | 40 | ||
| 43 | The functions return 1 on success, 0 on error. | 41 | The functions return 1 on success, 0 on error. |
diff --git a/src/lib/libssl/src/doc/crypto/DES_set_key.pod b/src/lib/libssl/src/doc/crypto/DES_set_key.pod index b49545877a..75638a149a 100644 --- a/src/lib/libssl/src/doc/crypto/DES_set_key.pod +++ b/src/lib/libssl/src/doc/crypto/DES_set_key.pod | |||
| @@ -114,9 +114,7 @@ consists of 8 bytes with odd parity. The least significant bit in | |||
| 114 | each byte is the parity bit. The key schedule is an expanded form of | 114 | each byte is the parity bit. The key schedule is an expanded form of |
| 115 | the key; it is used to speed the encryption process. | 115 | the key; it is used to speed the encryption process. |
| 116 | 116 | ||
| 117 | DES_random_key() generates a random key. The PRNG must be seeded | 117 | DES_random_key() generates a random key. |
| 118 | prior to using this function (see L<rand(3)|rand(3)>). If the PRNG | ||
| 119 | could not generate a secure key, 0 is returned. | ||
| 120 | 118 | ||
| 121 | Before a DES key can be used, it must be converted into the | 119 | Before a DES key can be used, it must be converted into the |
| 122 | architecture dependent I<DES_key_schedule> via the | 120 | architecture dependent I<DES_key_schedule> via the |
diff --git a/src/lib/libssl/src/doc/crypto/DH_generate_parameters.pod b/src/lib/libssl/src/doc/crypto/DH_generate_parameters.pod index d19e0217ee..3832c25315 100644 --- a/src/lib/libssl/src/doc/crypto/DH_generate_parameters.pod +++ b/src/lib/libssl/src/doc/crypto/DH_generate_parameters.pod | |||
| @@ -17,8 +17,7 @@ DH_generate_parameters, DH_check - generate and check Diffie-Hellman parameters | |||
| 17 | 17 | ||
| 18 | DH_generate_parameters() generates Diffie-Hellman parameters that can | 18 | DH_generate_parameters() generates Diffie-Hellman parameters that can |
| 19 | be shared among a group of users, and returns them in a newly | 19 | be shared among a group of users, and returns them in a newly |
| 20 | allocated B<DH> structure. The pseudo-random number generator must be | 20 | allocated B<DH> structure. |
| 21 | seeded prior to calling DH_generate_parameters(). | ||
| 22 | 21 | ||
| 23 | B<prime_len> is the length in bits of the safe prime to be generated. | 22 | B<prime_len> is the length in bits of the safe prime to be generated. |
| 24 | B<generator> is a small number E<gt> 1, typically 2 or 5. | 23 | B<generator> is a small number E<gt> 1, typically 2 or 5. |
diff --git a/src/lib/libssl/src/doc/crypto/DSA_generate_key.pod b/src/lib/libssl/src/doc/crypto/DSA_generate_key.pod index af83ccfaa1..069a05767c 100644 --- a/src/lib/libssl/src/doc/crypto/DSA_generate_key.pod +++ b/src/lib/libssl/src/doc/crypto/DSA_generate_key.pod | |||
| @@ -15,8 +15,6 @@ DSA_generate_key - generate DSA key pair | |||
| 15 | DSA_generate_key() expects B<a> to contain DSA parameters. It generates | 15 | DSA_generate_key() expects B<a> to contain DSA parameters. It generates |
| 16 | a new key pair and stores it in B<a-E<gt>pub_key> and B<a-E<gt>priv_key>. | 16 | a new key pair and stores it in B<a-E<gt>pub_key> and B<a-E<gt>priv_key>. |
| 17 | 17 | ||
| 18 | The PRNG must be seeded prior to calling DSA_generate_key(). | ||
| 19 | |||
| 20 | =head1 RETURN VALUE | 18 | =head1 RETURN VALUE |
| 21 | 19 | ||
| 22 | DSA_generate_key() returns 1 on success, 0 otherwise. | 20 | DSA_generate_key() returns 1 on success, 0 otherwise. |
diff --git a/src/lib/libssl/src/doc/crypto/DSA_sign.pod b/src/lib/libssl/src/doc/crypto/DSA_sign.pod index 97389e8ec8..4e78a71390 100644 --- a/src/lib/libssl/src/doc/crypto/DSA_sign.pod +++ b/src/lib/libssl/src/doc/crypto/DSA_sign.pod | |||
| @@ -38,9 +38,6 @@ B<dsa> is the signer's public key. | |||
| 38 | 38 | ||
| 39 | The B<type> parameter is ignored. | 39 | The B<type> parameter is ignored. |
| 40 | 40 | ||
| 41 | The PRNG must be seeded before DSA_sign() (or DSA_sign_setup()) | ||
| 42 | is called. | ||
| 43 | |||
| 44 | =head1 RETURN VALUES | 41 | =head1 RETURN VALUES |
| 45 | 42 | ||
| 46 | DSA_sign() and DSA_sign_setup() return 1 on success, 0 on error. | 43 | DSA_sign() and DSA_sign_setup() return 1 on success, 0 on error. |
diff --git a/src/lib/libssl/src/doc/crypto/EVP_DigestSignInit.pod b/src/lib/libssl/src/doc/crypto/EVP_DigestSignInit.pod index 7aec6daecc..e70b88a4a9 100644 --- a/src/lib/libssl/src/doc/crypto/EVP_DigestSignInit.pod +++ b/src/lib/libssl/src/doc/crypto/EVP_DigestSignInit.pod | |||
| @@ -56,9 +56,6 @@ and public key algorithms. This meant that "clone" digests such as EVP_dss1() | |||
| 56 | needed to be used to sign using SHA1 and DSA. This is no longer necessary and | 56 | needed to be used to sign using SHA1 and DSA. This is no longer necessary and |
| 57 | the use of clone digest is now discouraged. | 57 | the use of clone digest is now discouraged. |
| 58 | 58 | ||
| 59 | For some key types and parameters the random number generator must be seeded | ||
| 60 | or the operation will fail. | ||
| 61 | |||
| 62 | The call to EVP_DigestSignFinal() internally finalizes a copy of the digest | 59 | The call to EVP_DigestSignFinal() internally finalizes a copy of the digest |
| 63 | context. This means that calls to EVP_DigestSignUpdate() and | 60 | context. This means that calls to EVP_DigestSignUpdate() and |
| 64 | EVP_DigestSignFinal() can be called later to digest and sign additional data. | 61 | EVP_DigestSignFinal() can be called later to digest and sign additional data. |
diff --git a/src/lib/libssl/src/doc/crypto/EVP_DigestVerifyInit.pod b/src/lib/libssl/src/doc/crypto/EVP_DigestVerifyInit.pod index 60666bfddc..9eebb15d22 100644 --- a/src/lib/libssl/src/doc/crypto/EVP_DigestVerifyInit.pod +++ b/src/lib/libssl/src/doc/crypto/EVP_DigestVerifyInit.pod | |||
| @@ -56,9 +56,6 @@ and public key algorithms. This meant that "clone" digests such as EVP_dss1() | |||
| 56 | needed to be used to sign using SHA1 and DSA. This is no longer necessary and | 56 | needed to be used to sign using SHA1 and DSA. This is no longer necessary and |
| 57 | the use of clone digest is now discouraged. | 57 | the use of clone digest is now discouraged. |
| 58 | 58 | ||
| 59 | For some key types and parameters the random number generator must be seeded | ||
| 60 | or the operation will fail. | ||
| 61 | |||
| 62 | The call to EVP_DigestVerifyFinal() internally finalizes a copy of the digest | 59 | The call to EVP_DigestVerifyFinal() internally finalizes a copy of the digest |
| 63 | context. This means that calls to EVP_VerifyUpdate() and EVP_VerifyFinal() can | 60 | context. This means that calls to EVP_VerifyUpdate() and EVP_VerifyFinal() can |
| 64 | be called later to digest and verify additional data. | 61 | be called later to digest and verify additional data. |
diff --git a/src/lib/libssl/src/doc/crypto/EVP_SealInit.pod b/src/lib/libssl/src/doc/crypto/EVP_SealInit.pod index 172f210c64..ff73a04fd9 100644 --- a/src/lib/libssl/src/doc/crypto/EVP_SealInit.pod +++ b/src/lib/libssl/src/doc/crypto/EVP_SealInit.pod | |||
| @@ -55,9 +55,6 @@ failure. | |||
| 55 | 55 | ||
| 56 | =head1 NOTES | 56 | =head1 NOTES |
| 57 | 57 | ||
| 58 | Because a random secret key is generated the random number generator | ||
| 59 | must be seeded before calling EVP_SealInit(). | ||
| 60 | |||
| 61 | The public key must be RSA because it is the only OpenSSL public key | 58 | The public key must be RSA because it is the only OpenSSL public key |
| 62 | algorithm that supports key transport. | 59 | algorithm that supports key transport. |
| 63 | 60 | ||
diff --git a/src/lib/libssl/src/doc/crypto/EVP_SignInit.pod b/src/lib/libssl/src/doc/crypto/EVP_SignInit.pod index 682724b157..6ea6df655e 100644 --- a/src/lib/libssl/src/doc/crypto/EVP_SignInit.pod +++ b/src/lib/libssl/src/doc/crypto/EVP_SignInit.pod | |||
| @@ -60,10 +60,6 @@ digest algorithm must be used with the correct public key type. A list of | |||
| 60 | algorithms and associated public key algorithms appears in | 60 | algorithms and associated public key algorithms appears in |
| 61 | L<EVP_DigestInit(3)|EVP_DigestInit(3)>. | 61 | L<EVP_DigestInit(3)|EVP_DigestInit(3)>. |
| 62 | 62 | ||
| 63 | When signing with DSA private keys the random number generator must be seeded | ||
| 64 | or the operation will fail. The random number generator does not need to be | ||
| 65 | seeded for RSA signatures. | ||
| 66 | |||
| 67 | The call to EVP_SignFinal() internally finalizes a copy of the digest context. | 63 | The call to EVP_SignFinal() internally finalizes a copy of the digest context. |
| 68 | This means that calls to EVP_SignUpdate() and EVP_SignFinal() can be called | 64 | This means that calls to EVP_SignUpdate() and EVP_SignFinal() can be called |
| 69 | later to digest and sign additional data. | 65 | later to digest and sign additional data. |
diff --git a/src/lib/libssl/src/doc/crypto/RSA_blinding_on.pod b/src/lib/libssl/src/doc/crypto/RSA_blinding_on.pod index e6af8d4355..33990207f7 100644 --- a/src/lib/libssl/src/doc/crypto/RSA_blinding_on.pod +++ b/src/lib/libssl/src/doc/crypto/RSA_blinding_on.pod | |||
| @@ -21,8 +21,7 @@ must be used to protect the RSA operation from that attack. | |||
| 21 | 21 | ||
| 22 | RSA_blinding_on() turns blinding on for key B<rsa> and generates a | 22 | RSA_blinding_on() turns blinding on for key B<rsa> and generates a |
| 23 | random blinding factor. B<ctx> is B<NULL> or a pre-allocated and | 23 | random blinding factor. B<ctx> is B<NULL> or a pre-allocated and |
| 24 | initialized B<BN_CTX>. The random number generator must be seeded | 24 | initialized B<BN_CTX>. |
| 25 | prior to calling RSA_blinding_on(). | ||
| 26 | 25 | ||
| 27 | RSA_blinding_off() turns blinding off and frees the memory used for | 26 | RSA_blinding_off() turns blinding off and frees the memory used for |
| 28 | the blinding factor. | 27 | the blinding factor. |
diff --git a/src/lib/libssl/src/doc/crypto/RSA_generate_key.pod b/src/lib/libssl/src/doc/crypto/RSA_generate_key.pod index 52dbb14a53..867390884b 100644 --- a/src/lib/libssl/src/doc/crypto/RSA_generate_key.pod +++ b/src/lib/libssl/src/doc/crypto/RSA_generate_key.pod | |||
| @@ -14,8 +14,7 @@ RSA_generate_key - generate RSA key pair | |||
| 14 | =head1 DESCRIPTION | 14 | =head1 DESCRIPTION |
| 15 | 15 | ||
| 16 | RSA_generate_key() generates a key pair and returns it in a newly | 16 | RSA_generate_key() generates a key pair and returns it in a newly |
| 17 | allocated B<RSA> structure. The pseudo-random number generator must | 17 | allocated B<RSA> structure. |
| 18 | be seeded prior to calling RSA_generate_key(). | ||
| 19 | 18 | ||
| 20 | The modulus size will be B<num> bits, and the public exponent will be | 19 | The modulus size will be B<num> bits, and the public exponent will be |
| 21 | B<e>. Key sizes with B<num> E<lt> 1024 should be considered insecure. | 20 | B<e>. Key sizes with B<num> E<lt> 1024 should be considered insecure. |
diff --git a/src/lib/libssl/src/doc/crypto/RSA_padding_add_PKCS1_type_1.pod b/src/lib/libssl/src/doc/crypto/RSA_padding_add_PKCS1_type_1.pod index b8f678fe72..1c90b2b44d 100644 --- a/src/lib/libssl/src/doc/crypto/RSA_padding_add_PKCS1_type_1.pod +++ b/src/lib/libssl/src/doc/crypto/RSA_padding_add_PKCS1_type_1.pod | |||
| @@ -85,9 +85,6 @@ simply copy the data | |||
| 85 | 85 | ||
| 86 | =back | 86 | =back |
| 87 | 87 | ||
| 88 | The random number generator must be seeded prior to calling | ||
| 89 | RSA_padding_add_xxx(). | ||
| 90 | |||
| 91 | RSA_padding_check_xxx() verifies that the B<fl> bytes at B<f> contain | 88 | RSA_padding_check_xxx() verifies that the B<fl> bytes at B<f> contain |
| 92 | a valid encoding for a B<rsa_len> byte RSA key in the respective | 89 | a valid encoding for a B<rsa_len> byte RSA key in the respective |
| 93 | encoding method and stores the recovered data of at most B<tlen> bytes | 90 | encoding method and stores the recovered data of at most B<tlen> bytes |
diff --git a/src/lib/libssl/src/doc/crypto/RSA_public_encrypt.pod b/src/lib/libssl/src/doc/crypto/RSA_public_encrypt.pod index ab0fe3b2cd..4bbee53f09 100644 --- a/src/lib/libssl/src/doc/crypto/RSA_public_encrypt.pod +++ b/src/lib/libssl/src/doc/crypto/RSA_public_encrypt.pod | |||
| @@ -49,8 +49,6 @@ Encrypting user data directly with RSA is insecure. | |||
| 49 | B<flen> must be less than RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5 | 49 | B<flen> must be less than RSA_size(B<rsa>) - 11 for the PKCS #1 v1.5 |
| 50 | based padding modes, less than RSA_size(B<rsa>) - 41 for | 50 | based padding modes, less than RSA_size(B<rsa>) - 41 for |
| 51 | RSA_PKCS1_OAEP_PADDING and exactly RSA_size(B<rsa>) for RSA_NO_PADDING. | 51 | RSA_PKCS1_OAEP_PADDING and exactly RSA_size(B<rsa>) for RSA_NO_PADDING. |
| 52 | The random number generator must be seeded prior to calling | ||
| 53 | RSA_public_encrypt(). | ||
| 54 | 52 | ||
| 55 | RSA_private_decrypt() decrypts the B<flen> bytes at B<from> using the | 53 | RSA_private_decrypt() decrypts the B<flen> bytes at B<from> using the |
| 56 | private key B<rsa> and stores the plaintext in B<to>. B<to> must point | 54 | private key B<rsa> and stores the plaintext in B<to>. B<to> must point |
diff --git a/src/lib/libssl/src/doc/crypto/RSA_sign_ASN1_OCTET_STRING.pod b/src/lib/libssl/src/doc/crypto/RSA_sign_ASN1_OCTET_STRING.pod index 315a9af9e8..664b46174b 100644 --- a/src/lib/libssl/src/doc/crypto/RSA_sign_ASN1_OCTET_STRING.pod +++ b/src/lib/libssl/src/doc/crypto/RSA_sign_ASN1_OCTET_STRING.pod | |||
| @@ -26,9 +26,6 @@ memory. | |||
| 26 | 26 | ||
| 27 | B<dummy> is ignored. | 27 | B<dummy> is ignored. |
| 28 | 28 | ||
| 29 | The random number generator must be seeded prior to calling | ||
| 30 | RSA_sign_ASN1_OCTET_STRING(). | ||
| 31 | |||
| 32 | RSA_verify_ASN1_OCTET_STRING() verifies that the signature B<sigbuf> | 29 | RSA_verify_ASN1_OCTET_STRING() verifies that the signature B<sigbuf> |
| 33 | of size B<siglen> is the DER representation of a given octet string | 30 | of size B<siglen> is the DER representation of a given octet string |
| 34 | B<m> of size B<m_len>. B<dummy> is ignored. B<rsa> is the signer's | 31 | B<m> of size B<m_len>. B<dummy> is ignored. B<rsa> is the signer's |
