Recouple arc4random(9) to the entropy device. This works whether the

entropy device is loaded or not.

If the entropy device is NOT loaded, the the quality of perturbations
supplied by this will suffer.
This commit is contained in:
Mark Murray 2000-12-02 16:23:54 +00:00
parent e8a49db233
commit 4cb1e53914
Notes: svn2git 2020-12-20 02:59:44 +00:00
svn path=/head/; revision=69520

View File

@ -40,8 +40,10 @@ arc4_randomstir (void)
u_int8_t key[256];
int r, n;
/* r = read_random(key, sizeof(key)); */
r = 0; /* XXX MarkM - revisit this when /dev/random is done */
/* XXX read_random() returns unsafe numbers if the entropy
* devce is not loaded - MarkM
*/
r = read_random(key, sizeof(key));
/* if r == 0 || -1, just use what was on the stack */
if (r > 0)
{