+2001-11-26 Sam Hartman <hartmans@mit.edu>
+
+ * gen_seqnum.c (krb5_generate_seq_number): add entropy source id
+
+ * sendauth.c (krb5_sendauth): Add entropy source ID
+
+ * mk_req_ext.c (krb5_mk_req_extended): Add entropy source ID to random seed call
+
+ * init_ctx.c (init_common): Specify entropy source for random seed
+
2001-11-16 Sam Hartman <hartmans@mit.edu>
* init_ctx.c (krb5_set_default_tgs_enctypes): rename from
seed.length = key->length;
seed.data = key->contents;
- if ((retval = krb5_c_random_seed(context, &seed)))
+ if ((retval = krb5_c_random_add_entropy(context, KRB5_C_RANDSOURCE_TRUSTEDPARTY, &seed)))
return(retval);
seed.length = sizeof(*seqno);
seed_data.pid = getpid ();
seed.length = sizeof(seed_data);
seed.data = (char *) &seed_data;
- if ((retval = krb5_c_random_seed(ctx, &seed)))
+ if ((retval = krb5_c_random_add_entropy(ctx, KRB5_C_RANDSOURCE_TIMING, &seed)))
goto cleanup;
ctx->default_realm = 0;
krb5_crypto_us_timeofday (&rnd_data.sec, &rnd_data.usec);
d.length = sizeof (rnd_data);
d.data = (char *) &rnd_data;
- (void) krb5_c_random_seed (context, &d);
+ (void) krb5_c_random_add_entropy (context, KRB5_C_RANDSOURCE_TIMING, &d);
if ((retval = krb5_generate_subkey(context, &(in_creds)->keyblock,
&(*auth_context)->local_subkey)))
if (getpeername (*(int*)fd, (GETPEERNAME_ARG2_TYPE *) rnd_data,
&len2) == 0) {
d.length = len2;
- (void) krb5_c_random_seed (context, &d);
+ (void) krb5_c_random_add_entropy (context, KRB5_C_RANDSOURCE_EXTERNAL_PROTOCOL, &d);
}
len2 = sizeof (rnd_data);
if (getsockname (*(int*)fd, (GETSOCKNAME_ARG2_TYPE *) rnd_data,
&len2) == 0) {
d.length = len2;
- (void) krb5_c_random_seed (context, &d);
+ (void) krb5_c_random_add_entropy (context, KRB5_C_RANDSOURCE_EXTERNAL_PROTOCOL, &d);
}
}