[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #17694 [Tor]: Hash PRNG output before use, so that it's not revealed to the network



#17694: Hash PRNG output before use, so that it's not revealed to the network
-------------------------+------------------------------------
 Reporter:  teor         |          Owner:
     Type:  enhancement  |         Status:  needs_revision
 Priority:  Medium       |      Milestone:  Tor: 0.2.7.x-final
Component:  Tor          |        Version:  Tor: unspecified
 Severity:  Normal       |     Resolution:
 Keywords:               |  Actual Points:
Parent ID:               |         Points:
  Sponsor:               |
-------------------------+------------------------------------

Comment (by nickm):

 Better now?

 >It looks like using SHA512_DIGEST_LENGTH indirectly isn't working. Why
 wasn't it used directly?

 It made the code really ugly.

 > And why is SHA512_DIGEST_LENGTH used while the rest of the Tor code base
 uses DIGEST512_LEN?

 I'm using a particular hash, not a generic 512-bit hash.  Also, the
 crypto.c code is allowed to know about openssl stuff at the low-level.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/17694#comment:23>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs