Thanks Damien and Daniel for the info.

I am not concerned about running out of entropy. I am concerned about
userspace RNGs such as OpenSSL
http://sockpuppet.org/blog/2014/02/25/safely-generate-random-numbers/



On 2/8/15, 12:04 PM, "Damien Tournoud" <d...@damz.org> wrote:

>On Sun, Feb 8, 2015 at 5:15 PM, Daniel Lowrey <rdlow...@php.net> wrote:
>
>> Currently PHP's openssl_random_pseudo_bytes() uses the latter function
>>and
>> allows users to pass a by-reference $crypto_strong out parameter to
>> determine if the result is cryptographically strong. This is fine if you
>> know all of the above and have read the manual for this function.
>>However,
>> it may be desirable to add a new openssl_rand_bytes() function that uses
>> RAND_bytes() under the hood to make it less likely for someone to
>> accidentally use insufficiently random output.
>
>
>Hi Daniel,
>
>Just to clarify: OpenSSL automatically seeds its random pool from
>crypto-safe system-specific sources (/dev/[u]random on Linux): it is just
>*impossible* on modern systems to end up in the case of not having enough
>entropy.
>
>Damien



-- 
PHP Internals - PHP Runtime Development Mailing List
To unsubscribe, visit: http://www.php.net/unsub.php

Reply via email to