From 10993cc6efc1c5081574b7c700c16ec1aa8c68af Mon Sep 17 00:00:00 2001 From: zzz <zzz@mail.i2p> Date: Wed, 24 Sep 2014 13:54:33 +0000 Subject: [PATCH] EdDSA: Use our PRNG by default for keygen --- core/java/src/net/i2p/crypto/eddsa/KeyPairGenerator.java | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/core/java/src/net/i2p/crypto/eddsa/KeyPairGenerator.java b/core/java/src/net/i2p/crypto/eddsa/KeyPairGenerator.java index a3db1035ab..1de1f5b244 100644 --- a/core/java/src/net/i2p/crypto/eddsa/KeyPairGenerator.java +++ b/core/java/src/net/i2p/crypto/eddsa/KeyPairGenerator.java @@ -14,6 +14,7 @@ import net.i2p.crypto.eddsa.spec.EdDSANamedCurveTable; import net.i2p.crypto.eddsa.spec.EdDSAParameterSpec; import net.i2p.crypto.eddsa.spec.EdDSAPrivateKeySpec; import net.i2p.crypto.eddsa.spec.EdDSAPublicKeySpec; +import net.i2p.util.RandomSource; /** * Default strength is 256 @@ -60,7 +61,7 @@ public class KeyPairGenerator extends KeyPairGeneratorSpi { public KeyPair generateKeyPair() { if (!initialized) - initialize(DEFAULT_STRENGTH, new SecureRandom()); + initialize(DEFAULT_STRENGTH, RandomSource.getInstance()); byte[] seed = new byte[edParams.getCurve().getField().getb()/8]; random.nextBytes(seed); -- GitLab