I had not realized that we just increased the “entropy” requirements by 50%, from 256 to 384. The original DRBG submission that I did only required 128 bits. I think that is wrong, and I think the PR that did it (#5503) should be reverted.
I am concerned that we are trying to meet requirements that we really don’t have. The original code was a huge improvement. Requiring 384 bits of random seed is silly. I think it is ridiculous. One way or another we HAVE to fix that before the release. Thoughts?
_______________________________________________ openssl-project mailing list [email protected] https://mta.openssl.org/mailman/listinfo/openssl-project
