Hello there!

I'm just a stranger here, so, please, bear with my, probably, wrong
remark. I was going to look at how the DES weak keys are handled during
the key generation in SSLeay and was surpised when I saw it.

The weak_keys (file set_key.c) array contains odd-parity adjusted keys. On
the other side the function des_random_key (of the file rand_key.c) first
checks if the key is weak and, only then, sets parity. This means that,
e.g., the key 0,1,1,1,1,1,1,1 will pass the weakness check and will be
transformed into 1,1,1,1,1,1,1,1 on output.

I understand that all this weak-key verification is something pretty
worthless (taking into account the hit probability) but, as long as this
verification is implemented, it should be properly implemented. Can
somebody, please, confirm it or correct me?
-- 
                      Leva

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to