mirror of
https://github.com/cuberite/libevent.git
synced 2025-09-12 13:58:58 -04:00
Merge remote-tracking branch 'origin/patches-2.0'
This commit is contained in:
commit
0b05aa6591
@ -287,6 +287,7 @@ arc4_seed_proc_sys_kernel_random_uuid(void)
|
||||
}
|
||||
memset(entropy, 0, sizeof(entropy));
|
||||
memset(buf, 0, sizeof(buf));
|
||||
arc4_seeded_ok = 1;
|
||||
return 0;
|
||||
}
|
||||
#endif
|
||||
@ -388,6 +389,7 @@ arc4_stir(void)
|
||||
*/
|
||||
for (i = 0; i < 12*256; i++)
|
||||
(void)arc4_getbyte();
|
||||
|
||||
arc4_count = BYTES_BEFORE_RESEED;
|
||||
|
||||
return 0;
|
||||
|
@ -677,9 +677,12 @@ const char *evutil_gai_strerror(int err);
|
||||
|
||||
/** Generate n bytes of secure pseudorandom data, and store them in buf.
|
||||
*
|
||||
* By default, Libevent uses an ARC4-based random number generator, seeded
|
||||
* using the platform's entropy source (/dev/urandom on Unix-like systems;
|
||||
* CryptGenRandom on Windows).
|
||||
* Current versions of Libevent use an ARC4-based random number generator,
|
||||
* seeded using the platform's entropy source (/dev/urandom on Unix-like
|
||||
* systems; CryptGenRandom on Windows). This is not actually as secure as it
|
||||
* should be: ARC4 is a pretty lousy cipher, and the current implementation
|
||||
* provides only rudimentary prediction- and backtracking-resistance. Don't
|
||||
* use this for serious cryptographic applications.
|
||||
*/
|
||||
void evutil_secure_rng_get_bytes(void *buf, size_t n);
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user