/dev/random does not block, emits poor entropy
starlight.2013z3@binnacle.cx
starlight.2013z3@binnacle.cx
Wed Sep 18 19:09:00 GMT 2013
I see that CryptGenRandom() does not appear
to have parameters to detect or control
the quality of entropy.
So possibly the correct solution to this
issue would be to eliminate
/dev/random
and just leave
/dev/urandom
in place. 'openssl' apparently uses /dev/urandom.
If someone needs to fake /dev/random they
can create a symbolic link for it,
knowing the risks they might be taking.
--
Problem reports: http://cygwin.com/problems.html
FAQ: http://cygwin.com/faq/
Documentation: http://cygwin.com/docs.html
Unsubscribe info: http://cygwin.com/ml/#unsubscribe-simple
More information about the Cygwin
mailing list