X-Git-Url: https://www.tinc-vpn.org/git/browse?p=tinc;a=blobdiff_plain;f=src%2Fprotocol_auth.c;h=385e54366dbd1bb4bad446446df0687503baf576;hp=5ae99e821cc4f024d651569d009c5d46fba858ae;hb=8794274a30d535d49636fec825a0afbf30d8010d;hpb=c6b1643c2bcc727db4aed69bc58eb1f31903fdcf diff --git a/src/protocol_auth.c b/src/protocol_auth.c index 5ae99e82..385e5436 100644 --- a/src/protocol_auth.c +++ b/src/protocol_auth.c @@ -1,7 +1,7 @@ /* protocol_auth.c -- handle the meta-protocol, authentication Copyright (C) 1999-2005 Ivo Timmermans, - 2000-2012 Guus Sliepen + 2000-2013 Guus Sliepen This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by @@ -215,7 +215,7 @@ bool send_metakey(connection_t *c) { /* Copy random data to the buffer */ - RAND_pseudo_bytes((unsigned char *)c->outkey, len); + RAND_bytes((unsigned char *)c->outkey, len); /* The message we send must be smaller than the modulus of the RSA key. By definition, for a key of k bits, the following formula holds: @@ -391,7 +391,7 @@ bool send_challenge(connection_t *c) { /* Copy random data to the buffer */ - RAND_pseudo_bytes((unsigned char *)c->hischallenge, len); + RAND_bytes((unsigned char *)c->hischallenge, len); /* Convert to hex */