Nicolas Roumiantzeff <[EMAIL PROTECTED]>:

>> There should be some workaround for systems without /dev/urandom !

> I posted a pointer to a to a secure random mechanism which is portable and
> does not rely on the user input and because of the continuous number of
> complaints on the subject, I am quite surprised that no one asked for this
> or a similar mechanism to be integrated into OpenSSL.
> 
> This random number package, called librand, is based on event interval
> variations:
> ftp://ftp.research.att.com/dist/mab/librand.shar

It's not that portable (for getting CFS to work, I had to replace the
roulette() function by an implementation that simply reads from
/dev/urandom -- for reasons I did not investige further, SIGALRM never
occurred, resulting in an endless loop).  Also note that the software
self-describes as "a dubious, unproven hack for generating "true"
random numbers in software."

(In fact, even that shar file is not portable -- it uses CRLF as line
ends, meaning that it tries to call /bin/sh^M etc.)

In any case, the library should never automatically call stuff
like this (although it might be provided in standard functions
that applications may use if it's deemed appropriate).
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to