diff options
author | Dimitri John Ledkov <dimitri.ledkov@surgut.co.uk> | 2024-11-01 15:16:18 +0100 |
---|---|---|
committer | Tomas Mraz <tomas@openssl.org> | 2025-01-14 12:12:02 +0100 |
commit | 3b7bd871c19056c8116b67dff68e0860785935eb (patch) | |
tree | 31b25ce82715d4c486faf2e127343832bfae6163 | |
parent | Fix obvious misspelling of ASN1_VALUE (diff) | |
download | openssl-3b7bd871c19056c8116b67dff68e0860785935eb.tar.xz openssl-3b7bd871c19056c8116b67dff68e0860785935eb.zip |
drbg: provide requested amount of entropy, rather than self-strength
Parent DRBG can be seed source (os or jitter) and thus able to provide
unlimited entropy.
get_entropy is documented to provide at least the request amount of
entropy. If requested amount of entropy is same as, or less than
drbg->strength, everything is compliant. However, if requested entropy
is more than drbg->strength (unlikely, but possible), the returned
amount of entropy will be insufficient and additional repeated calls
to get_entropy will be required.
Reading history of refactors, it seems to me that this function call
previouslly had assumptions and usecases that couldn't ever request or
require more than strength amount of entropy.
If entropy is set, request that amount, otherwise request
drbg->strength amount.
Reviewed-by: Hugo Landau <hlandau@devever.net>
Reviewed-by: Paul Dale <ppzgs1@gmail.com>
(Merged from https://github.com/openssl/openssl/pull/25850)
-rw-r--r-- | providers/implementations/rands/drbg.c | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/providers/implementations/rands/drbg.c b/providers/implementations/rands/drbg.c index 81f52cc267..b359f6ecf5 100644 --- a/providers/implementations/rands/drbg.c +++ b/providers/implementations/rands/drbg.c @@ -235,7 +235,8 @@ static size_t get_entropy(PROV_DRBG *drbg, unsigned char **pout, int entropy, * a warning in some static code analyzers, but it's * intentional and correct here. */ - bytes = drbg->parent_get_seed(drbg->parent, pout, drbg->strength, + bytes = drbg->parent_get_seed(drbg->parent, pout, + entropy > 0 ? entropy : (int) drbg->strength, min_len, max_len, prediction_resistance, (unsigned char *)&drbg, sizeof(drbg)); ossl_drbg_unlock_parent(drbg); |