On Sun, May 03, 2020 at 09:28:37PM +, Taylor R Campbell wrote:
> > Date: Sun, 3 May 2020 19:13:23 +
> > From: nia
> >
> > Since most of the objections so far have been aimed at the design
> > and implementation of getrandom, does anyone have anything bad to say
> > about getentropy?
>
>
> Date: Sun, 3 May 2020 19:13:23 +
> From: nia
>
> Since most of the objections so far have been aimed at the design
> and implementation of getrandom, does anyone have anything bad to say
> about getentropy?
That's what I had in mind at the start of the thread after verifying
_that_ most ot
Since most of the objections so far have been aimed at the design
and implementation of getrandom, does anyone have anything bad to say
about getentropy?
If not, I'll commit it.
> Date: Sun, 3 May 2020 10:28:08 +0200
> From: Kurt Roeckx
>
> [OpenBSD] seem to use RDRAND when it's available in the bootloader, or
> something else when it's not. It's still my understanding that
> the bootloader is responisble for providing the entropy. You can
> argue that it might not conta
On Sun, May 03, 2020 at 10:48:41AM +0200, Kurt Roeckx wrote:
>
> You might want to read https://lwn.net/Articles/808575/
To be blunt (I think it's past time for it): I trust Taylor reading the
code more than I trust you reading stuff you found with Google.
Thor
On Fri, May 01, 2020 at 07:19:09PM +, Taylor R Campbell wrote:
> +.It Dv GRND_INSECURE
> +Do not block; instead fill
> +.Fa buf
> +with output derived from whatever is in the system entropy pool so
> +far.
> +Equivalent to reading from
> +.Pa /dev/urandom ;
> +see
> +.Xr rnd 4 .
> +.Pp
> +If in
On Sun, May 03, 2020 at 12:05:22AM -0400, Thor Lancelot Simon wrote:
> On Sat, May 02, 2020 at 06:07:54PM +0200, Kurt Roeckx wrote:
> >
> > It's my understanding that it never blocks because the bootloader
> > provides entropy. Be time time the first user can call genentropy,
> > it has already be