diff options
author | Sam Roberts <vieuxtech@gmail.com> | 2012-10-31 10:38:09 -0700 |
---|---|---|
committer | Sam Roberts <vieuxtech@gmail.com> | 2012-10-31 10:38:09 -0700 |
commit | 34376b0ca1cb2f65e43c4579fba38ceeebb1ae95 (patch) | |
tree | d4e6400b80453c8e5d74d67f31807dca48e83852 | |
parent | c24f52acbfa05a785fdd1c0a68b043b9af8ed124 (diff) | |
download | libnet-34376b0ca1cb2f65e43c4579fba38ceeebb1ae95.tar.gz |
Note about libnet_get_prand being secure only on windows.
-rw-r--r-- | libnet/src/libnet_prand.c | 6 |
1 files changed, 5 insertions, 1 deletions
diff --git a/libnet/src/libnet_prand.c b/libnet/src/libnet_prand.c index 4fb7329..b5da4c6 100644 --- a/libnet/src/libnet_prand.c +++ b/libnet/src/libnet_prand.c @@ -62,7 +62,11 @@ libnet_seed_prand(libnet_t *l) return (1); } - +/* FIXME this code makes no sense. On unix we use random(), which + * is intended to have no security, and under win32 we use cryptographically + * strong entropy source? If necessary, why aren't we using /dev/random + * on unix? What's going on here? + */ uint32_t libnet_get_prand(int mod) { |