I am not really comfortable to add more to this matter, but i think the behavior of function ssl_rand_bytes() to retrieve entropy from the 'output' buffer is as documented.

Quoting OpenSSL documentation (http://www.openssl.org/docs/crypto/RAND_bytes.html#DESCRIPTION):

"The contents of buf is mixed into the entropy pool before retrieving the new pseudo-random bytes unless disabled at compile time"

As one can see, the 'buf' parameter, which in turn is passed to ssl_rand_bytes() is both an input and an output parameter.

As such, programs that use RAND_bytes() with uninitialized buffers are the ones to blame (while one could argue such procedure is not really incorrect), not the library itself.

The currently patched ssl_rand_bytes() behavior is incoherent with the expected from the available documentation, and the patch should be reverted.

        Thank you.

                Thiago Martins.







--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to