Someone added code to CryptGenRandom so that it generates very bad random data (with <10 bits randomness in them). Don't do that. It's a known security risk. Read from /dev/urandom instead. If that does not succeed, just abort(). Linux and newer Solaris have /dev/urandom. I would guess the BSDs have it too. Morten
- Re: dlls/advapi32/crypt.c Morten Welinder
- Re: dlls/advapi32/crypt.c Travis Michielsen
- RE: dlls/advapi32/crypt.c Patrik Stridvall
- Re: dlls/advapi32/crypt.c Gavriel State
- Re: dlls/advapi32/crypt.c Dan Kegel
- RE: dlls/advapi32/crypt.c Patrik Stridvall
- RE: dlls/advapi32/crypt.c Vladimir Vukicevic
- Re: dlls/advapi32/crypt.c Travis Michielsen
- Re: dlls/advapi32/crypt.c Ove Kaaven
- RE: dlls/advapi32/crypt.c Patrik Stridvall
- RE: dlls/advapi32/crypt.c Patrik Stridvall