> /dev/random should block if the system does not contain as much real entropy > as the reader desires. Otherwise, the PRNG implementation will be the > weakest link for people who have deliberately selected higher levels of > protection from cryptographic attack. I don't want to rehash this thread from the beginning. Please go back, read the Yarrow paper, and recognise that Yarrow is not an entropy-counter, it is a cryptographically secure PRNG. The "count random bits and block" model does not apply. M -- Mark Murray Join the anti-SPAM movement: http://www.cauce.org To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-current" in the body of the message
- Re: randomdev entropy gathering is really weak Mark Murray
- Re: randomdev entropy gathering is really weak Kris Kennaway
- Re: randomdev entropy gathering is really weak Kris Kennaway
- Re: randomdev entropy gathering is really weak Kris Kennaway
- Re: randomdev entropy gathering is really weak Mark Murray
- Re: randomdev entropy gathering is really weak Kris Kennaway
- Re: randomdev entropy gathering is really weak Mark Murray
- Re: randomdev entropy gathering is really weak Kris Kennaway
- Re: randomdev entropy gathering is really weak Mark Murray
- RE: randomdev entropy gathering is really weak David Schwartz
- RE: randomdev entropy gathering is really weak Mark Murray
- RE: randomdev entropy gathering is really weak David Schwartz
- Re: randomdev entropy gathering is really weak Jeroen C. van Gelderen
- RE: randomdev entropy gathering is really weak David Schwartz
- Re: randomdev entropy gathering is really weak Kris Kennaway
- Re: randomdev entropy gathering is really weak Mark Murray
- Re: randomdev entropy gathering is really weak Kris Kennaway
- Re: randomdev entropy gathering is really weak Mark Murray
- Re: randomdev entropy gathering is really weak Kris Kennaway
- Re: randomdev entropy gathering is really weak Mark Murray
- Re: randomdev entropy gathering is really weak Jeroen C. van Gelderen