[Pkg-openssl-devel] Bug#363516: ssl_rand_bytes() should not be fixed: check documentation
Thiago de Castro Martins
thiago at usp.br
Fri May 16 02:10:21 UTC 2008
I am not really comfortable to add more to this matter, but i think the
behavior of function ssl_rand_bytes() to retrieve entropy from the
'output' buffer is as documented.
Quoting OpenSSL documentation
(http://www.openssl.org/docs/crypto/RAND_bytes.html#DESCRIPTION):
"The contents of buf is mixed into the entropy pool before retrieving
the new pseudo-random bytes unless disabled at compile time"
As one can see, the 'buf' parameter, which in turn is passed to
ssl_rand_bytes() is both an input and an output parameter.
As such, programs that use RAND_bytes() with uninitialized buffers are
the ones to blame (while one could argue such procedure is not really
incorrect), not the library itself.
The currently patched ssl_rand_bytes() behavior is incoherent with the
expected from the available documentation, and the patch should be reverted.
Thank you.
Thiago Martins.
More information about the Pkg-openssl-devel
mailing list