aboutsummaryrefslogtreecommitdiff
path: root/crypto/rand/md_rand.c
diff options
context:
space:
mode:
authorBodo Möller <bodo@openssl.org>2000-02-25 07:40:53 +0000
committerBodo Möller <bodo@openssl.org>2000-02-25 07:40:53 +0000
commitc6709c6b0fa1f96d9a7caa0d6a0afe4e0474fe9f (patch)
tree4b5e722493684805f652cf92509b5fce58823960 /crypto/rand/md_rand.c
parentfbb41ae0ad1369d6fe8d6c72d2297270ad24f0e5 (diff)
downloadopenssl-c6709c6b0fa1f96d9a7caa0d6a0afe4e0474fe9f.zip
openssl-c6709c6b0fa1f96d9a7caa0d6a0afe4e0474fe9f.tar.gz
openssl-c6709c6b0fa1f96d9a7caa0d6a0afe4e0474fe9f.tar.bz2
handle entropy estimate correctly
Diffstat (limited to 'crypto/rand/md_rand.c')
-rw-r--r--crypto/rand/md_rand.c21
1 files changed, 17 insertions, 4 deletions
diff --git a/crypto/rand/md_rand.c b/crypto/rand/md_rand.c
index ce90175..6b158f0 100644
--- a/crypto/rand/md_rand.c
+++ b/crypto/rand/md_rand.c
@@ -282,13 +282,13 @@ static void ssleay_rand_add(const void *buf, int num, double add)
{
md[k] ^= local_md[k];
}
+ if (entropy < ENTROPY_NEEDED) /* stop counting when we have enough */
+ entropy += add;
CRYPTO_w_unlock(CRYPTO_LOCK_RAND);
#ifndef THREADS
assert(md_c[1] == md_count[1]);
#endif
- if (entropy < ENTROPY_NEEDED) /* stop counting when we have enough */
- entropy += add;
}
static void ssleay_rand_seed(const void *buf, int num)
@@ -318,8 +318,8 @@ static void ssleay_rand_initialize(void)
RAND_add(&l,sizeof(l),0);
#ifdef DEVRANDOM
- /* Use a random entropy pool device. Linux and FreeBSD have
- * this. Use /dev/urandom if you can as /dev/random will block
+ /* Use a random entropy pool device. Linux, FreeBSD and OpenBSD
+ * have this. Use /dev/urandom if you can as /dev/random may block
* if it runs out of random entries. */
if ((fh = fopen(DEVRANDOM, "r")) != NULL)
@@ -388,6 +388,19 @@ static int ssleay_rand_bytes(unsigned char *buf, int num)
ssleay_rand_initialize();
ok = (entropy >= ENTROPY_NEEDED);
+ if (!ok)
+ {
+ /* If the PRNG state is not yet unpredictable, then seeing
+ * the PRNG output may help attackers to determine the new
+ * state; thus we have to decrease the entropy estimate.
+ * Once we've had enough initial seeding we don't bother to
+ * adjust the entropy count, though, because we're not ambitious
+ * to provide *information-theoretic* randomness.
+ */
+ entropy -= num;
+ if (entropy < 0)
+ entropy = 0;
+ }
st_idx=state_index;
st_num=state_num;