Reading from /dev/urandom does affect /dev/random. This is sort of
desirable: it lets users of /d/r fail safely in a certain kind of
hypothetical attack. Falling safely is not exactly desirable, but
better than the other kind of failure.
Arnt
On Fri, May 29, 2020 at 05:57:19PM -0400, Remco Rijnders wrote:
On Fri, May 29, 2020 at 01:38:48PM -0700, Kevin wrote in
<20200529203848.gd2...@afu.lan>:
This also removes the check for RAND_egd, which we still want.
Thank you for your patience Kevin, I know I am trying it!
That's okay. It t
1
From: =?UTF-8?q?Remco=20R=C4=B3nders?=
Date: Fri, 29 May 2020 15:46:29 -0400
Subject: [PATCH] Remove support for OpenSSL <0.9.5
The current code provides a workaround for the absence of RAND_status in
OpenSSL versions before 0.9.5. The comments in the code indicate these
versions have to be
On Fri, May 29, 2020 at 03:49:19PM -0400, Remco Rijnders wrote:
--- a/configure.ac
+++ b/configure.ac
@@ -813,7 +813,6 @@ AC_ARG_WITH(ssl,
AS_HELP_STRING([--with-ssl@<:@=PFX@:>@],[Enable TLS support usi
AC_MSG_ERROR([Unable to find SSL library]), [$crypto_libs])
LIBS="$
The current code provides a workaround for the absence of RAND_status in
OpenSSL versions before 0.9.5. The comments in the code indicate these
versions have to be supported, but as these versions are now more than
20 years old, this no longer applies. Removing this support simplifies the
code and