Skip to content
This repository has been archived by the owner on Jun 3, 2020. It is now read-only.

yubihsm setup: Collect 256-bits entropy from both RNGs #300

Merged
merged 1 commit into from
Jul 24, 2019

Conversation

tarcieri
Copy link
Contributor

Previously it collected 128-bits entropy from each RNG for a total of 256-bits.

This commit expands it to collect 256-bits entropy from each RNG for a total of 512-bits of input key material.

This ensures that the desired amount of 256-bits is collected even in the event that one of the two RNGs fails silently.

Previously it collected 128-bits entropy from each RNG for a total of
256-bits.

This commit expands it to collect 256-bits entropy from each RNG for a
total of 512-bits of input key material.

This ensures that the desired amount of 256-bits is collected even in
the event that one of the two RNGs fails silently.
@tarcieri tarcieri merged commit b749ea5 into master Jul 24, 2019
@tarcieri tarcieri deleted the yubihsm/increase-entropy-for-setup branch July 24, 2019 00:55
@tarcieri tarcieri added the security Security-critical issues label Jul 25, 2019
This was referenced Jul 25, 2019
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
security Security-critical issues
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants