diff options
author | Miod Vallat <miod@cvs.openbsd.org> | 2014-04-15 16:52:51 +0000 |
---|---|---|
committer | Miod Vallat <miod@cvs.openbsd.org> | 2014-04-15 16:52:51 +0000 |
commit | d7358760a2306465ef27390b36faee0e66b486c0 (patch) | |
tree | ad7c436e1b66ec513b2df5331d055e0288587f60 /etc/inetd.conf | |
parent | e130d821f1df0d9755677a6282badfc2b78ffa04 (diff) |
Replace the old OpenSSL PRNG by direct use of arc4random_buf(), keeping the
existing RAND interfaces unchanged.
All interfaces allowing external feed or seed of the RNG (either from a file
or a local entropy gathering daemon) are kept for ABI compatibility, but are
no longer do anything.
While the OpenSSL PRNG was required 15+ years ago when many systems lacked
proper entropy collection, things have evolved and one can reasonably assume
it is better to use the kernel (system global) entropy pool rather than trying
to build one's own and having to compensate for thread scheduling...
<RANT>
Whoever thought that RAND_screen(), feeding the PRNG with the contents of the
local workstation's display, under Win32, was a smart idea, ought to be banned
from security programming.
</RANT>
ok beck@ deraadt@ tedu@
Diffstat (limited to 'etc/inetd.conf')
0 files changed, 0 insertions, 0 deletions