diff options
author | Isaac Dunham <ibid.ag@gmail.com> | 2019-02-23 16:38:35 -0600 |
---|---|---|
committer | Rob Landley <rob@landley.net> | 2019-02-23 16:38:35 -0600 |
commit | 609c3e3cd3d83c02490ac26753bb78a63e0e48b5 (patch) | |
tree | d3e258fcc8e909c3a5e7623a45f5a1224e1d91c1 /tests/chmod.test | |
parent | 42af2e52e771dd7bf8be6fd1119520d492bb4b3f (diff) | |
download | toybox-609c3e3cd3d83c02490ac26753bb78a63e0e48b5.tar.gz |
Here's an 'mcookie' implementation for toybox.
mcookie simply prints out 16 bytes of entropy in hexadecimal; it is typically
used as the source for the "MIT magic cookies" that X11 uses for "secure"
connections.
The only implementation I know of is in util-linux; the problems with its
documented behavior motivated me to write an alternate implementation.
Specifically, getting 128 bytes from the kernel and finding the MD5 sum is
not a sane PRNG, especially when only 16 bytes are needed.
Diffstat (limited to 'tests/chmod.test')
0 files changed, 0 insertions, 0 deletions