On Sun, Feb 8, 2015 at 5:15 PM, Daniel Lowrey <rdlow...@php.net> wrote:

> Currently PHP's openssl_random_pseudo_bytes() uses the latter function and
> allows users to pass a by-reference $crypto_strong out parameter to
> determine if the result is cryptographically strong. This is fine if you
> know all of the above and have read the manual for this function. However,
> it may be desirable to add a new openssl_rand_bytes() function that uses
> RAND_bytes() under the hood to make it less likely for someone to
> accidentally use insufficiently random output.


Hi Daniel,

Just to clarify: OpenSSL automatically seeds its random pool from
crypto-safe system-specific sources (/dev/[u]random on Linux): it is just
*impossible* on modern systems to end up in the case of not having enough
entropy.

Damien

Reply via email to