From 60a50c17457081b214d0e67ae4d197348e65b44b Mon Sep 17 00:00:00 2001 From: Damien Miller Date: Tue, 18 Sep 2007 22:02:19 +0000 Subject: arc4random_bytes() is the preferred interface for generating nonces; "looks ok" markus@ --- sys/dev/pci/ubsec.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'sys/dev/pci/ubsec.c') diff --git a/sys/dev/pci/ubsec.c b/sys/dev/pci/ubsec.c index 404a1cdff7e..f2103655045 100644 --- a/sys/dev/pci/ubsec.c +++ b/sys/dev/pci/ubsec.c @@ -1,4 +1,4 @@ -/* $OpenBSD: ubsec.c,v 1.138 2006/12/29 13:04:37 pedro Exp $ */ +/* $OpenBSD: ubsec.c,v 1.139 2007/09/18 22:02:18 djm Exp $ */ /* * Copyright (c) 2000 Jason L. Wright (jason@thought.net) @@ -620,7 +620,7 @@ ubsec_newsession(u_int32_t *sidp, struct cryptoini *cri) ses->ses_used = 1; if (encini) { /* get an IV, network byte order */ - get_random_bytes(ses->ses_iv, sizeof(ses->ses_iv)); + arc4random_bytes(ses->ses_iv, sizeof(ses->ses_iv)); /* Go ahead and compute key in ubsec's byte order */ if (encini->cri_alg == CRYPTO_DES_CBC) { -- cgit v1.2.3