diff options
author | Wilmer van der Gaast <wilmer@gaast.net> | 2006-06-28 16:47:05 +0200 |
---|---|---|
committer | Wilmer van der Gaast <wilmer@gaast.net> | 2006-06-28 16:47:05 +0200 |
commit | 171946457cccb7280f0918201093e79bbc9eac72 (patch) | |
tree | 59b41cf763f80bc8800ae183b649e414f7ac2b72 /lib/rc4.c | |
parent | b3c467bc312114eb7cdd45e6bc36a3d87bee6064 (diff) |
Added random_bytes() function for better/more reliable randomization and
moved set_eval_ops() to a slightly more suitable place.
Diffstat (limited to 'lib/rc4.c')
-rw-r--r-- | lib/rc4.c | 9 |
1 files changed, 7 insertions, 2 deletions
@@ -38,8 +38,10 @@ #include <glib.h> +#include <gmodule.h> #include <stdlib.h> #include <string.h> +#include "misc.h" #include "rc4.h" /* Add some seed to the password, to make sure we *never* use the same key. @@ -133,8 +135,11 @@ int rc4_encode( unsigned char *clear, int clear_len, unsigned char **crypt, char *crypt = g_malloc( clear_len + RC4_IV_LEN ); key = g_malloc( key_len ); strcpy( (char*) key, password ); - for( i = 0; i < RC4_IV_LEN; i ++ ) - key[key_len-RC4_IV_LEN+i] = crypt[0][i] = rand() & 0xff; + + /* Add the salt. Save it for later (when decrypting) and, of course, + add it to the encryption key. */ + random_bytes( crypt[0], RC4_IV_LEN ); + memcpy( key + key_len - RC4_IV_LEN, crypt[0], RC4_IV_LEN ); /* Generate the initial S[] from the IVed key. */ st = rc4_keymaker( key, key_len, RC4_CYCLES ); |