>>Hmm, I doubt very much that running RAND_poll() multiple times on top
of itself gives that much more entropy.

Concerning this, RAND_poll() behaves as follows on Windows systems:
        - call to NetStatisticsGet for LanManWorkstation and
LanManServer services;
        - call to CryptGenRandom to poll the CryptoAPI PRNG and the
Pentium PRG;
        - call to GlobalMemoryStatus;
        - call to GetCurrentProcessId;
        - call to GetForegroundWindow;
        - call to GetCursorInfo;
        - call to GetQueueStatus;
        - call to thread, process, module and heap polling function.
Don't you think that entropy given is sufficient each time RAND_poll()
is called ?

>>The most common form is by loading a file of randomness, but I
udnerstand that's not a option for you.

What actually bothers me with a file containing randomness is that its
contents must be changed quite often, otherwise it's predictable. But
maybe the following solution is not a sin (I hope so!) :

///////////////////////////////////////
if (!RAND_status())
        {
        /* If RAND_poll() is not sufficient, then load randomness file
*/
        RAND_load_file(g_szFileName,-1);
        }
/* Rewrite the randomness file so that its contents changes often */
RAND_write_file(g_szFileName);
///////////////////////////////////////

What about this ?

Marc Gaudichet


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to