diff options
author | markm <markm@FreeBSD.org> | 2002-07-15 13:58:35 +0000 |
---|---|---|
committer | markm <markm@FreeBSD.org> | 2002-07-15 13:58:35 +0000 |
commit | 2370535caa1ffd00e4480c7894e5e9381e52520d (patch) | |
tree | fb7e9c3d811aeb44859d7b6f68ad78e9fda5e601 /sys/modules/random | |
parent | a22b6ae7fb60a1cfcb9cbdfc8e6146d714f11589 (diff) | |
download | FreeBSD-src-2370535caa1ffd00e4480c7894e5e9381e52520d.zip FreeBSD-src-2370535caa1ffd00e4480c7894e5e9381e52520d.tar.gz |
Upgrade the random device to use a "real" hash instead of building
one out of a block cipher. This has 2 advantages:
1) The code is _much_ simpler
2) We aren't committing our security to one algorithm (much as we
may think we trust AES).
While I'm here, make an explicit reseed do a slow reseed instead
of a fast; this is in line with what the original paper suggested.
Diffstat (limited to 'sys/modules/random')
-rw-r--r-- | sys/modules/random/Makefile | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/sys/modules/random/Makefile b/sys/modules/random/Makefile index d88a19b..1e72868 100644 --- a/sys/modules/random/Makefile +++ b/sys/modules/random/Makefile @@ -2,10 +2,11 @@ .PATH: ${.CURDIR}/../../dev/random .PATH: ${.CURDIR}/../../crypto/rijndael +.PATH: ${.CURDIR}/../../crypto/sha2 KMOD= random SRCS= randomdev.c yarrow.c hash.c -SRCS+= rijndael-alg-fst.c rijndael-api-fst.c +SRCS+= rijndael-alg-fst.c rijndael-api-fst.c sha2.c SRCS+= bus_if.h device_if.h vnode_if.h CFLAGS+= -I${.CURDIR}/../.. |