Skip Menu |

This queue is for tickets about the Crypt-LE CPAN distribution.

Report information
The Basics
Id: 115593
Status: rejected
Priority: 0/
Queue: Crypt-LE

People
Owner: LEADER [...] cpan.org
Requestors: CDRAKE [...] cpan.org
Cc:
AdminCc:

Bug Information
Severity: (no value)
Broken in: (no value)
Fixed in: (no value)



Subject: doc suggestion
It is not spelled out clearly how keys are generated. I guess you're using openssl ? There is probably a bug with the key generation: I placed output to STDERR inside the crypto library in the "seed" code (this is the part where random numbers are disabled and replaced by a known and predictable input seed), and your module triggers this output when I generate my keys. You probably want to use real random numbers, not predictable test ones?
Crypt::OpenSSL::RSA is used to generate a key. It uses the Crypt::OpenSSL::Random::random_bytes(20) for the seed. Could you please elaborate a bit on what you have actually patched (.xs of Crypt::OpenSSL::RSA?) in a way that it could be easily reproduced to look into?
Since there were no further details provided confirming the validity of the ticket, it is put on hold. Additionally, upcoming versions will have updates to the process of generating keys, where Crypt::OpenSSL::RSA will not be used.
Further details were not provided. Additionally the keys are now generated using Net:SSLeay library, rather than Crypt::OpenSSL::RSA, which should make the original ticket invalid. Closing the ticket.