diff options
author | Edward Ned Harvey <edward.harvey@conceptblossom.com> | 2014-08-05 11:03:28 -0400 |
---|---|---|
committer | Edward Ned Harvey <edward.harvey@conceptblossom.com> | 2014-08-05 11:03:28 -0400 |
commit | e64eee6f58c70ad9c1dd02658461014599369319 (patch) | |
tree | c62f1a4b4af5dabeb862a8eaed464e8923861bbb | |
parent | use 32 bytes instead of 24 for seed material from ThreadedSeedGenerator (diff) | |
download | BouncyCastle.NET-ed25519-e64eee6f58c70ad9c1dd02658461014599369319.tar.xz |
after seeding, pointlessly threw away the first few bytes. Removed.
-rw-r--r-- | crypto/src/security/SecureRandom.cs | 1 |
1 files changed, 0 insertions, 1 deletions
diff --git a/crypto/src/security/SecureRandom.cs b/crypto/src/security/SecureRandom.cs index 9fd7e9e65..6bc019481 100644 --- a/crypto/src/security/SecureRandom.cs +++ b/crypto/src/security/SecureRandom.cs @@ -32,7 +32,6 @@ namespace Org.BouncyCastle.Security // 32 will be enough when ThreadedSeedGenerator is fixed. Until then, ThreadedSeedGenerator returns low // entropy, and this is not sufficient to be secure. http://www.bouncycastle.org/csharpdevmailarchive/msg00814.html sr.SetSeed(new ThreadedSeedGenerator().GenerateSeed(32, true)); - sr.GenerateSeed(1 + sr.Next(32)); } return master[0]; |