Browse Source

Replace the old OpenSSL PRNG by direct use of arc4random_buf(), keeping the

existing RAND interfaces unchanged.
All interfaces allowing external feed or seed of the RNG (either from a file
or a local entropy gathering daemon) are kept for ABI compatibility, but are
no longer do anything.
While the OpenSSL PRNG was required 15+ years ago when many systems lacked
proper entropy collection, things have evolved and one can reasonably assume
it is better to use the kernel (system global) entropy pool rather than trying
to build one's own and having to compensate for thread scheduling...
<RANT>
Whoever thought that RAND_screen(), feeding the PRNG with the contents of the
local workstation's display, under Win32, was a smart idea, ought to be banned
from security programming.
</RANT>
ok beck@ deraadt@ tedu@
OPENBSD_5_6
miod 10 years ago
parent
commit
69282ceac5
1 changed files with 2 additions and 2 deletions
  1. +2
    -2
      src/lib/libcrypto/crypto/Makefile

+ 2
- 2
src/lib/libcrypto/crypto/Makefile View File

@ -1,4 +1,4 @@
# $OpenBSD: Makefile,v 1.5 2014/04/14 04:27:50 miod Exp $
# $OpenBSD: Makefile,v 1.6 2014/04/15 16:52:50 miod Exp $
LIB= crypto
@ -220,7 +220,7 @@ SRCS+= pk7_mime.c bio_pk7.c
SRCS+= pqueue.c
# rand/
SRCS+= md_rand.c randfile.c rand_lib.c rand_err.c rand_egd.c
SRCS+= rc4_rand.c randfile.c rand_lib.c rand_err.c rand_egd.c
SRCS+= rand_unix.c
# rc2/


Loading…
Cancel
Save