summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorSam Roberts <vieuxtech@gmail.com>2012-10-31 10:38:09 -0700
committerSam Roberts <vieuxtech@gmail.com>2012-10-31 10:38:09 -0700
commit34376b0ca1cb2f65e43c4579fba38ceeebb1ae95 (patch)
treed4e6400b80453c8e5d74d67f31807dca48e83852
parentc24f52acbfa05a785fdd1c0a68b043b9af8ed124 (diff)
downloadlibnet-34376b0ca1cb2f65e43c4579fba38ceeebb1ae95.tar.gz
Note about libnet_get_prand being secure only on windows.
-rw-r--r--libnet/src/libnet_prand.c6
1 files changed, 5 insertions, 1 deletions
diff --git a/libnet/src/libnet_prand.c b/libnet/src/libnet_prand.c
index 4fb7329..b5da4c6 100644
--- a/libnet/src/libnet_prand.c
+++ b/libnet/src/libnet_prand.c
@@ -62,7 +62,11 @@ libnet_seed_prand(libnet_t *l)
return (1);
}
-
+/* FIXME this code makes no sense. On unix we use random(), which
+ * is intended to have no security, and under win32 we use cryptographically
+ * strong entropy source? If necessary, why aren't we using /dev/random
+ * on unix? What's going on here?
+ */
uint32_t
libnet_get_prand(int mod)
{