RAND_DRBG

Matt Caswell matt at openssl.org
Mon Jul 27 08:51:09 UTC 2020


I'm ok with option 1 (but it will require a vote). I think the
percentage of our user base that are using the existing API is
sufficiently close to zero that we're not breaking our compatibility
promises.

Matt


On 27/07/2020 02:08, Dr Paul Dale wrote:
> The RAND_DRBG (crypto/rand/drbg_lib) APIs are quite some mess and sit
> badly with the move to provider based infrastructure.
> They are definitely being deprecated in master but without more, the
> extra layer of indirection and additional complexity generating random
> numbers will remain.
> 
> The option I see are:
> 
> 1. Remove, rather than deprecate, RAND_DRBG in 3.0.  This is a breaking
> change.
> 2. Bypass RAND_DRBG and live with a breaking change (refer:
> https://github.com/openssl/openssl/pull/12509#pullrequestreview-455396828)
> 3. Leave things as they currently are in master.
> 
> The first two are breaking changes and will require an OMC vote.
> 
> 
> Some pertinent points:
> 
> 1. RAND_bytes will continue to work as is — this API is perfect for
> almost everyone.
> 2. The RAND_METHOD functionality remains — this allows wholesale
> replacement of OpenSSL’s RNGs if desired.
> 3. The name EVP_RAND is the working name and might change — this is not
> relevant to this discussion.
> 4. The RAND_DRBG APIs are unlikely to be widely used — they were
> introduced in 1.1.1.  The two users I know of (Akamai and NCP) are both
> fine with them being removed.
> 
> 
> Thoughts anyone?
> 
> 
> Pauli
> -- 
> Dr Paul Dale | Distinguished Architect | Cryptographic Foundations 
> Phone +61 7 3031 7217
> Oracle Australia
> 


More information about the openssl-project mailing list