diff options
author | Theo de Raadt <deraadt@cvs.openbsd.org> | 2019-11-01 20:54:53 +0000 |
---|---|---|
committer | Theo de Raadt <deraadt@cvs.openbsd.org> | 2019-11-01 20:54:53 +0000 |
commit | cef5ebe64baa3f846ee7b4636948f1f8dff0e0ec (patch) | |
tree | a77186876bf8b6caaf6a91c441bcfa333e67ccc5 /sys/arch/octeon | |
parent | ba9304435455245109a5f26da380520221752796 (diff) |
Reduce BOOTRANDOM_MAX to 256. naddy pointed out there's no point having
it larger than RC4STATE. A long discussion ensued. In conclusion all
entropy inputs are either satisfactory enough, or just as shitty at 512.
Diffstat (limited to 'sys/arch/octeon')
-rw-r--r-- | sys/arch/octeon/stand/rdboot/rdboot.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/sys/arch/octeon/stand/rdboot/rdboot.c b/sys/arch/octeon/stand/rdboot/rdboot.c index 023dba11af1..cc4ed59ff4b 100644 --- a/sys/arch/octeon/stand/rdboot/rdboot.c +++ b/sys/arch/octeon/stand/rdboot/rdboot.c @@ -1,4 +1,4 @@ -/* $OpenBSD: rdboot.c,v 1.2 2019/10/29 02:55:52 deraadt Exp $ */ +/* $OpenBSD: rdboot.c,v 1.3 2019/11/01 20:54:52 deraadt Exp $ */ /* * Copyright (c) 2019 Visa Hankala @@ -41,7 +41,7 @@ #define DEVRANDOM "/dev/random" #define BOOTRANDOM "/etc/random.seed" -#define BOOTRANDOM_MAX 512 +#define BOOTRANDOM_MAX 256 /* no point being greater than RC4STATE */ #define KERNEL "/bsd" void loadrandom(void); |