From 96e1505ec8737bb501b946af2d3cc7648e4a4a38 Mon Sep 17 00:00:00 2001 From: jl777 Date: Sat, 18 Aug 2018 05:00:51 -1100 Subject: [PATCH] Allow weaker rand() for in memory values --- src/cryptoconditions/src/secp256k1.c | 9 ++------- 1 file changed, 2 insertions(+), 7 deletions(-) diff --git a/src/cryptoconditions/src/secp256k1.c b/src/cryptoconditions/src/secp256k1.c index b3e198945..a95895fa4 100644 --- a/src/cryptoconditions/src/secp256k1.c +++ b/src/cryptoconditions/src/secp256k1.c @@ -45,16 +45,11 @@ void lockSign() { int read = (int) fread(&ent, 1, 32, fp); fclose(fp); #endif - if (read != 32) { -#ifdef _WIN32 + if (read != 32) + { int32_t i; for (i=0; i<32; i++) ((uint8_t *)ent)[i] = rand(); - fprintf(stderr,"@libscott plz make this a high entropy for windows\n"); -#else - fprintf(stderr, "Could not read 32 bytes entropy from system\n"); - exit(1); -#endif } if (!secp256k1_context_randomize(ec_ctx_sign, ent)) { fprintf(stderr, "Could not randomize secp256k1 context\n");