summaryrefslogtreecommitdiff
path: root/lib
diff options
context:
space:
mode:
authorMiod Vallat <miod@cvs.openbsd.org>2014-07-12 21:08:54 +0000
committerMiod Vallat <miod@cvs.openbsd.org>2014-07-12 21:08:54 +0000
commit87d0030b4390fc11c03e99d66abe312363e749bd (patch)
tree61db24b1382d2a35287f99a14f45e1219c284549 /lib
parentf1971430bcda69a1883d47c26fcdba1485efc478 (diff)
Remove this sentence:
``The probability that a randomly generated key is weak is -1/2^52, so it is not really worth checking for them.'' This kind of naively optimistic attitude is not compatible with security.
Diffstat (limited to 'lib')
-rw-r--r--lib/libssl/src/doc/crypto/DES_set_key.pod5
1 files changed, 2 insertions, 3 deletions
diff --git a/lib/libssl/src/doc/crypto/DES_set_key.pod b/lib/libssl/src/doc/crypto/DES_set_key.pod
index d6a35eacd44..d1bd43c5927 100644
--- a/lib/libssl/src/doc/crypto/DES_set_key.pod
+++ b/lib/libssl/src/doc/crypto/DES_set_key.pod
@@ -114,7 +114,7 @@ consists of 8 bytes with odd parity. The least significant bit in
each byte is the parity bit. The key schedule is an expanded form of
the key; it is used to speed the encryption process.
-DES_random_key() generates a random key.
+DES_random_key() generates a random key in odd parity.
Before a DES key can be used, it must be converted into the
architecture dependent I<DES_key_schedule> via the
@@ -134,8 +134,7 @@ depend on a global variable.
DES_set_odd_parity() sets the parity of the passed I<key> to odd.
DES_is_weak_key() returns 1 is the passed key is a weak key, 0 if it
-is ok. The probability that a randomly generated key is weak is
-1/2^52, so it is not really worth checking for them.
+is ok.
The following routines mostly operate on an input and output stream of
I<DES_cblock>s.