diff options
author | Nick Mathewson <nickm@torproject.org> | 2013-12-18 11:49:44 -0500 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2013-12-18 11:53:07 -0500 |
commit | 7b87003957530427eadce36ed03b4645b481a335 (patch) | |
tree | f5e6f471eb9776e822309c34a530a87da9356933 /changes/bug10124 | |
parent | 561d9880f8025ddbcb2f0a586d0677908320af4f (diff) | |
download | tor-7b87003957530427eadce36ed03b4645b481a335.tar tor-7b87003957530427eadce36ed03b4645b481a335.tar.gz |
Never allow OpenSSL engines to replace the RAND_SSLeay method
This fixes bug 10402, where the rdrand engine would use the rdrand
instruction, not as an additional entropy source, but as a replacement
for the entire userspace PRNG. That's obviously stupid: even if you
don't think that RDRAND is a likely security risk, the right response
to an alleged new alleged entropy source is never to throw away all
previously used entropy sources.
Thanks to coderman and rl1987 for diagnosing and tracking this down.
Diffstat (limited to 'changes/bug10124')
0 files changed, 0 insertions, 0 deletions