On Sun, Mar 5, 2023 at 1:33 PM Randall via curl-library
<curl-library@lists.haxx.se> wrote:
>
> Hi Curl,
>
> I have a curl built with OpenSSL. The built of OpenSSL uses hardware
> randomization on the platform using _rdrand64(). When I use libcurl,
> typically through git, I end up with an open to PRNGD, which is not
> desirable. I'm wondering whether there is a configuration setting that I am
> missing from curl to force this, or whether I should contribute code to
> access the x86 hardware randomizer directly. There is no /dev/urandom or
> /dev/random on this platform, aside from it being POSIX compliant. Curl is
> configured as follows:
>
> CFLAGS="-c99" CPPFLAGS="-D_XOPEN_SOURCE_EXTENDED=1 -WIEEE_float
> -I/usr/local/openssl/include" LDFLAGS="-L/usr/local/lib" ./configure
> --with-ssl=/usr/local --with-ca-path=/usr/local/ssl/certs --disable-pthreads
> --disable-threaded-resolver --enable-ipv6
>
> Thanks in advance,
> Randall
>
> --
> Brief whoami: NonStop&UNIX developer since approximately
> UNIX(421664400)
> NonStop(211288444200000000)
> -- In real life, I talk too much.

I strongly suggest you against this approach, There are buggy CPUs
with buggy rdrand, there are a number of pitfalls.
Most current operating systems have either getentropy, getrandom,
arc4random or a documentred platform-specific RNG. USE THAT INSTEAD.

If there is really only rdrand (I really doubt that) on this exotic
system, google "fast key erasure rng AES-NI"

something like https://github.com/jedisct1/aes-stream should do it.
-- 
Unsubscribe: https://lists.haxx.se/mailman/listinfo/curl-library
Etiquette:   https://curl.se/mail/etiquette.html

Reply via email to