summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorLoganaden Velvindron <logan@hackers.mu>2017-03-17 18:25:03 (GMT)
committerWaldemar Brodkorb <wbx@openadk.org>2017-03-17 20:46:25 (GMT)
commit66312a40abed2d430361eb262468607f60099c96 (patch)
tree455942917bca97c8c6e2295d983b3e5ae60a2587
parent2e4d3492e6627fc9d4c34de104a6ebe6f84ac1e9 (diff)
Discard 3072 bytes instead of 256 bytes
This follows the recommendations outlined in Network Operations Division Cryptographic Requirements published on wikileaks on March 2017. We discard more bytes of the first keystream to reduce possibility of non-random bytes. This is similar to a change in FreeBSD: https://svnweb.freebsd.org/base?view=revision&revision=315225 Signed-off-by: Loganaden Velvindron <logan@hackers.mu>
-rw-r--r--libc/stdlib/arc4random.c7
1 files changed, 4 insertions, 3 deletions
diff --git a/libc/stdlib/arc4random.c b/libc/stdlib/arc4random.c
index 0013612..03b2234 100644
--- a/libc/stdlib/arc4random.c
+++ b/libc/stdlib/arc4random.c
@@ -152,10 +152,11 @@ arc4_stir(struct arc4_stream *as)
arc4_addrandom(as, rnd, sizeof(rnd));
/*
- * Discard early keystream, as per recommendations in:
- * http://www.wisdom.weizmann.ac.il/~itsik/RC4/Papers/Rc4_ksa.ps
+ * Discard early keystream, as per recommendations.
+ * Network Operations Division Cryptographic requirements
+ * published on wikileaks on march 2017
*/
- for (n = 0; n < 256; n++)
+ for (n = 0; n < 3072; n++)
(void)arc4_getbyte(as);
arc4_count = 1600000;
}