On Tue, Jan 24, 2012 at 4:09 AM, Jakob Bohm <jb-open...@wisemo.com> wrote:
> Informational note to others, as this information used to
> be hard to obtain:
>
> On Linux (for comparison):
>
> /dev/urandom produces as many random bytes as you want (with
> multiple calls if necessary), but if you read more than the
> random input available to the kernel, this will be a medium-
> grade cryptographic PRNG stretching the available bits.
>
> /dev/urandom produces as many random bytes as you want (with
> multiple calls if necessary), but if you read more than the
> random input available to the kernel,your call will block
> waiting for the kernel to gather more random input.
>
> [SNIP]
Also see Analysis of the Linux Random Number Generator
[eprint.iacr.org/2006/086.pdf].
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to