]> andersk Git - openssh.git/blobdiff - openbsd-compat/bsd-arc4random.c
- (dtucker) [openbsd-compat/glob.c] Update from OpenBSD 1.22 -> 1.25.
[openssh.git] / openbsd-compat / bsd-arc4random.c
index 5cbb233afe5151b5c4df6b5d82f1e7da25692f47..7c0f34d64e8658a96cc1d5a449d5b59c87984795 100644 (file)
@@ -34,7 +34,8 @@ RCSID("$Id$");
 static int rc4_ready = 0;
 static RC4_KEY rc4;
 
-unsigned int arc4random(void)
+unsigned int
+arc4random(void)
 {
        unsigned int r = 0;
        static int first_time = 1;
@@ -53,16 +54,25 @@ unsigned int arc4random(void)
        return(r);
 }
 
-void arc4random_stir(void)
+void
+arc4random_stir(void)
 {
        unsigned char rand_buf[SEED_SIZE];
+       int i;
 
        memset(&rc4, 0, sizeof(rc4));
        if (RAND_bytes(rand_buf, sizeof(rand_buf)) <= 0)
                fatal("Couldn't obtain random bytes (error %ld)",
                    ERR_get_error());
        RC4_set_key(&rc4, sizeof(rand_buf), rand_buf);
-       RC4(&rc4, sizeof(rand_buf), rand_buf, rand_buf);
+
+       /*
+        * Discard early keystream, as per recommendations in:
+        * http://www.wisdom.weizmann.ac.il/~itsik/RC4/Papers/Rc4_ksa.ps
+        */
+       for(i = 0; i <= 256; i += sizeof(rand_buf))
+               RC4(&rc4, sizeof(rand_buf), rand_buf, rand_buf);
+
        memset(rand_buf, 0, sizeof(rand_buf));
 
        rc4_ready = REKEY_BYTES;
This page took 0.03743 seconds and 4 git commands to generate.