summaryrefslogtreecommitdiff
path: root/lib/libcrypto/rsa
diff options
context:
space:
mode:
authorTheo de Raadt <deraadt@cvs.openbsd.org>2014-04-17 12:14:27 +0000
committerTheo de Raadt <deraadt@cvs.openbsd.org>2014-04-17 12:14:27 +0000
commit35b7e3440c8f959d10a82f703dfa9678d312a72f (patch)
tree0525f50017c0789a096f4db3e45f369e7bf7c50b /lib/libcrypto/rsa
parentc4885cf0257bfb47d0ff50dd182105e56e516593 (diff)
Do not feed RSA private key information to the random subsystem as
entropy. It might be fed to a pluggable random subsystem.... What were they thinking?! ok guenther
Diffstat (limited to 'lib/libcrypto/rsa')
-rw-r--r--lib/libcrypto/rsa/rsa_crpt.c8
1 files changed, 0 insertions, 8 deletions
diff --git a/lib/libcrypto/rsa/rsa_crpt.c b/lib/libcrypto/rsa/rsa_crpt.c
index 7750366613b..2e100ca457f 100644
--- a/lib/libcrypto/rsa/rsa_crpt.c
+++ b/lib/libcrypto/rsa/rsa_crpt.c
@@ -189,14 +189,6 @@ BN_BLINDING *RSA_setup_blinding(RSA *rsa, BN_CTX *in_ctx)
else
e = rsa->e;
-
- if ((RAND_status() == 0) && rsa->d != NULL && rsa->d->d != NULL)
- {
- /* if PRNG is not properly seeded, resort to secret
- * exponent as unpredictable seed */
- RAND_add(rsa->d->d, rsa->d->dmax * sizeof rsa->d->d[0], 0.0);
- }
-
if (!(rsa->flags & RSA_FLAG_NO_CONSTTIME))
{
/* Set BN_FLG_CONSTTIME flag */