Displaying 2 results from an estimated 2 matches for "stir_from_system".
2002 Jan 22
4
ssh-rand-helper
...he semantics I'm envisioning here:
Define USE_PRNGD, USE_CMDS, or both.
Case 1: USE_PRNGD && USE_CMDS:
read_seedfile()
fetch 96 bytes from PRNGD
if successful
output(bytes 1-48)
RAND_add(bytes 49-96) /* for seedfile */
Otherwise
stir_from_commands()
stir_from_system()
output(RAND_bytes(48))
write_seedfile()
Case 2: !USE_PRNGD && USE_CMDS:
read_seedfile()
stir_from_commands()
stir_from_system()
output(RAND_bytes(48))
write_seedfile()
Case 3: USE_PRNGD && !USE_CMDS:
fetch 48 bytes from PRNGD...
2001 Jan 16
1
ssh drops privs when it can't find ~/.ssh/prng_seed
I'm using OpenSSH 2.3.0p1. When my users use ssh for the first
time, using rhosts authentication, entropy.c drops the privs in
prng_write_seedfile() at the setuid(original_uid) line (line 550,
approx):
void
prng_write_seedfile(void) {
int fd;
char seed[1024];
char filename[1024];
struct passwd *pw;
/* Don't bother if we have already saved a seed */
if (prng_seed_saved)
return;