diff options
author | 2013-11-02 15:27:47 +0100 | |
---|---|---|
committer | 2013-11-02 15:27:47 +0100 | |
commit | 92e8430c8ecea166610917b39108203e9c0d3db1 (patch) | |
tree | 96d0b214bc00f2abfe8de9dcc7abf865b772d13b /contrib | |
parent | sync with OpenSSH openbsd-compat/setproctitle.c (diff) | |
download | OpenSMTPD-92e8430c8ecea166610917b39108203e9c0d3db1.tar.xz OpenSMTPD-92e8430c8ecea166610917b39108203e9c0d3db1.zip |
bye bye arc4random(). Chacha is used everywhere:
- no need to check for arc4random_*() in configure
- use crypto safe PRNG csprng_*() wrapper around chacha_*()
- use csprng_*() everywhere in regress/ and smtpd/ (including backends and filters)
- contrib/libexec/encrypt/encrypt.c and openbsd-compat/mktemp.c still use chacha_*()
Diffstat (limited to 'contrib')
-rw-r--r-- | contrib/libexec/encrypt/encrypt.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/contrib/libexec/encrypt/encrypt.c b/contrib/libexec/encrypt/encrypt.c index 7d9891df..c8ed680e 100644 --- a/contrib/libexec/encrypt/encrypt.c +++ b/contrib/libexec/encrypt/encrypt.c @@ -79,7 +79,7 @@ print_passwd(const char *string) const char *p; for (n = 0; n < SALT_LEN; ++n) - to64(&salt[n], arc4random_uniform(0xff), 1); + to64(&salt[n], chacha_uniform(0xff), 1); salt[SALT_LEN] = '\0'; for (n = 0; ids[n]; n++) { |