[Pkg-openssl-devel] Bug#363516: ssl_rand_bytes() should not be fixed: check documentation

Thiago de Castro Martins thiago at usp.br
Fri May 16 02:10:21 UTC 2008


I am not really comfortable to add more to this matter, but i think the 
behavior of function ssl_rand_bytes() to retrieve entropy from the 
'output' buffer is as documented.

Quoting OpenSSL documentation 
(http://www.openssl.org/docs/crypto/RAND_bytes.html#DESCRIPTION):

"The contents of buf is mixed into the entropy pool before retrieving 
the new pseudo-random bytes unless disabled at compile time"

As one can see, the 'buf' parameter, which in turn is passed to 
ssl_rand_bytes() is both an input and an output parameter.

As such, programs that use RAND_bytes() with uninitialized buffers are 
the ones to blame (while one could argue such procedure is not really 
incorrect), not the library itself.

The currently patched ssl_rand_bytes() behavior is incoherent with the 
expected from the available documentation, and the patch should be reverted.

	Thank you.

		Thiago Martins.









More information about the Pkg-openssl-devel mailing list