aboutsummaryrefslogtreecommitdiffstats
path: root/lib/ssl/src/ssl_cipher.hrl
diff options
context:
space:
mode:
authorIngela Anderton Andin <[email protected]>2016-04-15 11:02:02 +0200
committerIngela Anderton Andin <[email protected]>2016-04-25 11:41:39 +0200
commitf1db2eb29768eca2d7affdfd95753b477df05beb (patch)
tree51bb31bef83050e2cab75cb16acd8c059a4bd854 /lib/ssl/src/ssl_cipher.hrl
parent1ad18832cb21fac5a5b513005f1e6a5ffd7d0329 (diff)
downloadotp-f1db2eb29768eca2d7affdfd95753b477df05beb.tar.gz
otp-f1db2eb29768eca2d7affdfd95753b477df05beb.tar.bz2
otp-f1db2eb29768eca2d7affdfd95753b477df05beb.zip
ssl: Remove use of crypto:rand_bytes/1
ssl already used crypto:strong_rand_bytes/1 for most operations as its use cases are mostly cryptographical. Now crypto:strong_rand_bytes/1 will be used everywhere. However crypto:rand_bytes/1 was used as fallback if crypto:strong_rand_bytes/1 throws low_entropy, this will no longer be the case. This is a potential incompatibility. The fallback was introduced a long time ago for interoperability reasons. Now days this should not be a problem, and if it is, the security compromise is not acceptable anyway.
Diffstat (limited to 'lib/ssl/src/ssl_cipher.hrl')
0 files changed, 0 insertions, 0 deletions