From: Ismo Puustinen Date: Fri, 18 Sep 2015 20:07:23 +0000 (-0400) Subject: GH367: use random data if seed too short. X-Git-Tag: OpenSSL_1_0_2e~68 X-Git-Url: https://git.librecmc.org/?a=commitdiff_plain;h=6f997dc36504d67d1339ceb6bce4ecba673d8568;p=oweals%2Fopenssl.git GH367: use random data if seed too short. Signed-off-by: Rich Salz Reviewed-by: Emilia Käsper --- diff --git a/crypto/dsa/dsa_gen.c b/crypto/dsa/dsa_gen.c index 5a328aaab5..9d3b59e047 100644 --- a/crypto/dsa/dsa_gen.c +++ b/crypto/dsa/dsa_gen.c @@ -203,7 +203,7 @@ int dsa_builtin_paramgen(DSA *ret, size_t bits, size_t qbits, if (!BN_GENCB_call(cb, 0, m++)) goto err; - if (!seed_len) { + if (!seed_len || !seed_in) { if (RAND_pseudo_bytes(seed, qsize) < 0) goto err; seed_is_random = 1; diff --git a/doc/crypto/DSA_generate_parameters.pod b/doc/crypto/DSA_generate_parameters.pod index 16a67f22b0..b1a4d201b7 100644 --- a/doc/crypto/DSA_generate_parameters.pod +++ b/doc/crypto/DSA_generate_parameters.pod @@ -29,7 +29,7 @@ maximum of 1024 bits. If B is B or B E 20, the primes will be generated at random. Otherwise, the seed is used to generate them. If the given seed does not yield a prime q, a new random -seed is chosen and placed at B. +seed is chosen. DSA_generate_parameters_ex() places the iteration count in *B and a counter used for finding a generator in