bug17694_strongest 368 B

123456
  1. o Minor features (security):
  2. - Never use the system entropy output directly for anything besides
  3. seeding the PRNG. When we want to generate important keys, instead
  4. of using system entropy directly, hash it with the PRNG stream.
  5. This may help resist certain attacks based on broken OS entropy
  6. implementations. Closes part of ticket 17694.