Discard 3072 bytes instead of 256 bytes
commit66312a40abed2d430361eb262468607f60099c96
authorLoganaden Velvindron <logan@hackers.mu>
Fri, 17 Mar 2017 18:25:03 +0000 (17 19:25 +0100)
committerWaldemar Brodkorb <wbx@openadk.org>
Fri, 17 Mar 2017 20:46:25 +0000 (17 21:46 +0100)
tree455942917bca97c8c6e2295d983b3e5ae60a2587
parent2e4d3492e6627fc9d4c34de104a6ebe6f84ac1e9
Discard 3072 bytes instead of 256 bytes

This follows the recommendations outlined in Network Operations Division
Cryptographic Requirements published on wikileaks on March 2017.
We discard more bytes of the first keystream to reduce possibility of
non-random bytes.
This is similar to a change in FreeBSD:
https://svnweb.freebsd.org/base?view=revision&revision=315225

Signed-off-by: Loganaden Velvindron <logan@hackers.mu>
libc/stdlib/arc4random.c