- (djm) [ssh-keygen.c ssh-keysign.c sshconnect1.c sshd.c] Remove

unnecessary arc4random_stir() calls. The only ones left are to ensure
   that the PRNG gets a different state after fork() for platforms that
   have broken the API.
This commit is contained in:
Damien Miller 2013-10-26 10:05:46 +11:00
Родитель bd43e88723
Коммит 26506ad293
5 изменённых файлов: 6 добавлений и 13 удалений

Просмотреть файл

@ -1,3 +1,9 @@
20131025
- (djm) [ssh-keygen.c ssh-keysign.c sshconnect1.c sshd.c] Remove
unnecessary arc4random_stir() calls. The only ones left are to ensure
that the PRNG gets a different state after fork() for platforms that
have broken the API.
20131024
- (djm) [auth-krb5.c] bz#2032 - use local username in krb5_kuserok check
rather than full client name which may be of form user@REALM;

Просмотреть файл

@ -910,7 +910,6 @@ do_gen_all_hostkeys(struct passwd *pw)
}
printf("%s ", key_types[i].key_type_display);
fflush(stdout);
arc4random_stir();
type = key_type_from_name(key_types[i].key_type);
strlcpy(identity_file, key_types[i].path, sizeof(identity_file));
bits = 0;
@ -932,7 +931,6 @@ do_gen_all_hostkeys(struct passwd *pw)
continue;
}
key_free(private);
arc4random_stir();
strlcat(identity_file, ".pub", sizeof(identity_file));
fd = open(identity_file, O_WRONLY | O_CREAT | O_TRUNC, 0644);
if (fd == -1) {
@ -2543,8 +2541,6 @@ main(int argc, char **argv)
return (0);
}
arc4random_stir();
if (key_type_name == NULL)
key_type_name = "rsa";
@ -2638,7 +2634,6 @@ passphrase_again:
/* Clear the private key and the random number generator. */
key_free(private);
arc4random_stir();
if (!quiet)
printf("Your identification has been saved in %s.\n", identity_file);

Просмотреть файл

@ -179,7 +179,6 @@ main(int argc, char **argv)
permanently_set_uid(pw);
seed_rng();
arc4random_stir();
#ifdef DEBUG_SSH_KEYSIGN
log_init("ssh-keysign", SYSLOG_LEVEL_DEBUG3, SYSLOG_FACILITY_AUTH, 0);

Просмотреть файл

@ -542,9 +542,6 @@ ssh_kex(char *host, struct sockaddr *hostaddr)
derive_ssh1_session_id(host_key->rsa->n, server_key->rsa->n, cookie, session_id);
/* Generate a session key. */
arc4random_stir();
/*
* Generate an encryption key for the session. The key is a 256 bit
* random number, interpreted as a 32-byte key, with the least

4
sshd.c
Просмотреть файл

@ -398,7 +398,6 @@ generate_ephemeral_server_key(void)
verbose("RSA key generation complete.");
arc4random_buf(sensitive_data.ssh1_cookie, SSH_SESSION_KEY_LENGTH);
arc4random_stir();
}
/*ARGSUSED*/
@ -1867,9 +1866,6 @@ main(int ac, char **av)
/* Reinitialize the log (because of the fork above). */
log_init(__progname, options.log_level, options.log_facility, log_stderr);
/* Initialize the random number generator. */
arc4random_stir();
/* Chdir to the root directory so that the current disk can be
unmounted if desired. */
if (chdir("/") == -1)