diff options
author | lloyd <[email protected]> | 2010-03-19 18:49:38 +0000 |
---|---|---|
committer | lloyd <[email protected]> | 2010-03-19 18:49:38 +0000 |
commit | 8b0d3575e794073f6e6658544d8167e399762ce0 (patch) | |
tree | 82ecf55f0d4efb083ef7cb66d6ea1afc4795b929 /src/pubkey/rsa | |
parent | 7ac5dc634e2448392b298376936d3f57abc9c40b (diff) |
In add_entropy(), additionally poll for 64 bits of system entropy
to mix in with the user input.
Check that the prf and extractor are compatible.
For the initial PRF key, use all zeros of the appropriate size,
and for the initial XTS key, use PRF("Botan HMAC_RNG XTS"). This
ensures that only the one fixed key size is ever used with either
the prf or extractor objects, allowing you to use, say
HMAC(SHA-256)+CMAC(AES-256), or even CMAC(AES-128)+CMAC(AES-128)
as the PRFs in the RNG.
Diffstat (limited to 'src/pubkey/rsa')
0 files changed, 0 insertions, 0 deletions