• J
    iscsi: ensure RNG is seeded before use · 6787ab81
    Jason A. Donenfeld 提交于
    It's not safe to use weak random data here, especially for the challenge
    response randomness. Since we're always in process context, it's safe to
    simply wait until we have enough randomness to carry out the
    authentication correctly.
    
    While we're at it, we clean up a small memleak during an error
    condition.
    Signed-off-by: NJason A. Donenfeld <Jason@zx2c4.com>
    Cc: "Nicholas A. Bellinger" <nab@linux-iscsi.org>
    Cc: Lee Duncan <lduncan@suse.com>
    Cc: Chris Leech <cleech@redhat.com>
    Signed-off-by: NTheodore Ts'o <tytso@mit.edu>
    6787ab81
iscsi_target_auth.c 11.8 KB