diff random.c @ 689:c3de235d9506

/dev/random blocks on busy servers too.
author Matt Johnston <matt@ucc.asn.au>
date Thu, 19 Jul 2012 21:34:27 +0800
parents 650c41a4909a
children c85bb68e1db6
line wrap: on
line diff
--- a/random.c	Sat Jun 30 22:12:28 2012 +0800
+++ b/random.c	Thu Jul 19 21:34:27 2012 +0800
@@ -155,24 +155,6 @@
 #endif
 }
 
-/* add entropy from the stronger, blocking source /dev/random. Only used
- * for generating persistent private keys (RSA and DSS) */
-void seedstrongrandom()
-{
-	/* We assume that PRNGD is a strong source, so don't need to do anything here */
-#ifndef DROPBEAR_PRNGD_SOCKET
-	hash_state hs;
-
-	sha1_process(&hs, (void*)hashpool, sizeof(hashpool));
-	if (process_file(&hs, "/dev/random", INIT_SEED_SIZE, 0) 
-			!= DROPBEAR_SUCCESS) {
-		dropbear_exit("Failure reading random device %s", "/dev/random");
-	}
-
-	sha1_done(&hs, hashpool);
-#endif
-}
-
 /* Initialise the prng from /dev/urandom or prngd. This function can
  * be called multiple times */
 void seedrandom() {