Skip to content

Commit

Permalink
Be more parsimonious with /dev/random when using the NSS PRNG.
Browse files Browse the repository at this point in the history
git-svn-id: svn://anonsvn.mit.edu/krb5/branches/nss@24414 dc483132-0cff-0310-8789-dd5450dbe970
  • Loading branch information
ghudson committed Oct 2, 2010
1 parent 16220c2 commit 2287366
Showing 1 changed file with 6 additions and 3 deletions.
9 changes: 6 additions & 3 deletions src/lib/crypto/krb/prng.c
Expand Up @@ -47,9 +47,12 @@ k5_mutex_t yarrow_lock = K5_MUTEX_PARTIAL_INITIALIZER;
#include "../nss/nss_gen.h"
#include <pk11pub.h>

/* Gather 8K of OS entropy per call, enough to fill the additional data buffer
* for the built-in PRNG and trigger a reseed. */
#define OS_ENTROPY_LEN 8192
/*
* NSS gathers its own OS entropy, so it doesn't really matter how much we read
* in krb5_c_random_os_entropy. Use the same value as Yarrow (without using a
* Yarrow constant), so that we don't read too much from /dev/random.
*/
#define OS_ENTROPY_LEN 20

int krb5int_prng_init(void)
{
Expand Down

0 comments on commit 2287366

Please sign in to comment.