tech-kern archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: /dev/random is hot garbage
TRC> There is no reason in modern cryptography to read more than one byte
TRC> from /dev/random ever in a single application; once you have done
TRC> that, or confirmed some other way that the the entropy pool is seeded,
TRC> you should generate keys from /dev/urandom.
DAH> There should be some way to do that without throwing away 8 random
DAH> bits.
Isn't that called poll()/select() etc?
As far as I understand, it's not about actually reading from /dev/random,
but checking whether you could read without blocking, isn't it?
Home |
Main Index |
Thread Index |
Old Index