Remove obsolete mt_srand() calls

pull/269/head
Thomas Bruederli 10 years ago
parent 743832fc51
commit e2fb340289

@ -289,7 +289,6 @@ class rcube_ldap_password
break;
case 'ssha':
mt_srand((double) microtime() * 1000000);
$salt = substr(pack('h*', md5(mt_rand())), 0, 8);
if (function_exists('mhash') && function_exists('mhash_keygen_s2k')) {
@ -316,7 +315,6 @@ class rcube_ldap_password
case 'smd5':
mt_srand((double) microtime() * 1000000);
$salt = substr(pack('h*', md5(mt_rand())), 0, 8);
if (function_exists('mhash') && function_exists('mhash_keygen_s2k')) {
@ -373,7 +371,6 @@ class rcube_ldap_password
{
$possible = '0123456789' . 'abcdefghijklmnopqrstuvwxyz' . 'ABCDEFGHIJKLMNOPQRSTUVWXYZ' . './';
$str = '';
// mt_srand((double)microtime() * 1000000);
while (strlen($str) < $length) {
$str .= substr($possible, (rand() % strlen($possible)), 1);

@ -242,7 +242,6 @@ class rcube_user
// generate a random hash and store it in user prefs
if (empty($prefs['client_hash'])) {
mt_srand((double)microtime() * 1000000);
$prefs['client_hash'] = md5($this->data['username'] . mt_rand() . $this->data['mail_host']);
$this->save_prefs(array('client_hash' => $prefs['client_hash']));
}

Loading…
Cancel
Save