Displaying 2 results from an estimated 2 matches for "use_prngd".
2001 Jun 07
2
Patch to enable multiple possible sources of entropy
...is against 2.9p1 but applies cleanly to the current
CVS. Please accept this patch into the openssh code base. Don't forget to
run autoheader and autoconf.
- Dave Dykstra
*** entropy.c.O Fri Jun 1 15:52:20 2001
--- entropy.c Tue Jun 5 17:41:47 2001
***************
*** 80,91 ****
# define USE_PRNGD
#endif
- #if defined(USE_PRNGD) || defined(RANDOM_POOL)
-
#ifdef USE_PRNGD
/* Collect entropy from PRNGD/EGD */
int
! get_random_bytes(unsigned char *buf, int len)
{
int fd;
char msg[2];
--- 80,89 ----
# define USE_PRNGD
#endif
#ifdef USE_PRNGD
/* Collect entropy from...
2002 Jan 22
4
ssh-rand-helper
...tes of entropy from PRNGD,
stirs it into OpenSSL's RAND_add(), and outputs 48 bytes of
pseudorandom bytes based on this entropy. Does this present any
advantage over just dumping the 48 bytes of entropy received from
PRNGD directly?
The semantics I'm envisioning here:
Define USE_PRNGD, USE_CMDS, or both.
Case 1: USE_PRNGD && USE_CMDS:
read_seedfile()
fetch 96 bytes from PRNGD
if successful
output(bytes 1-48)
RAND_add(bytes 49-96) /* for seedfile */
Otherwise
stir_from_commands()
stir_from_system()
output(RAND_bytes(48))
write_seed...