diff options
author | Werner Koch <[email protected]> | 2003-12-16 11:30:57 +0000 |
---|---|---|
committer | Werner Koch <[email protected]> | 2003-12-16 11:30:57 +0000 |
commit | f18d0e557ce7644af8ccf3feae789afc4915daa5 (patch) | |
tree | e87021395a253da542ba421873bc57b8a5d0605a /g10/seckey-cert.c | |
parent | * protect.c (do_encryption): Use gcry_create_nonce instad of the (diff) | |
download | gnupg-f18d0e557ce7644af8ccf3feae789afc4915daa5.tar.gz gnupg-f18d0e557ce7644af8ccf3feae789afc4915daa5.zip |
* seckey-cert.c (protect_secret_key): Use gry_create_nonce for the
IV; there is not need for real strong random here and it even
better protect the random bits used for the key.
Diffstat (limited to 'g10/seckey-cert.c')
-rw-r--r-- | g10/seckey-cert.c | 3 |
1 files changed, 1 insertions, 2 deletions
diff --git a/g10/seckey-cert.c b/g10/seckey-cert.c index 5b0238240..7356cb224 100644 --- a/g10/seckey-cert.c +++ b/g10/seckey-cert.c @@ -346,8 +346,7 @@ protect_secret_key( PKT_secret_key *sk, DEK *dek ) assert( sk->protect.ivlen <= DIM(sk->protect.iv) ); if( sk->protect.ivlen != 8 && sk->protect.ivlen != 16 ) BUG(); /* yes, we are very careful */ - gcry_randomize (sk->protect.iv, sk->protect.ivlen, - GCRY_STRONG_RANDOM); + gcry_create_nonce (sk->protect.iv, sk->protect.ivlen); gcry_cipher_setiv( cipher_hd, sk->protect.iv, sk->protect.ivlen ); if( sk->version >= 4 ) { unsigned char *bufarr[PUBKEY_MAX_NSKEY]; |