Date: 23 Nov 1998 13:09:33 -0600 From: Joel Ray Holveck <joelh@gnu.org> To: "Allen Smith" <easmith@beatrice.rutgers.edu> Cc: Peter Jeremy <peter.jeremy@auss2.alcatel.com.au>, hackers@FreeBSD.ORG Subject: Re: freebsd-hackers-digest V4 #314 Message-ID: <86k90mmdjm.fsf@detlev.UUCP> In-Reply-To: "Allen Smith"'s message of "Sun, 22 Nov 1998 20:04:20 -0500" References: <98Nov23.115714est.40343@border.alcanet.com.au> <9811222004.ZM2852@beatrice.rutgers.edu>
next in thread | previous in thread | raw e-mail | index | archive | help
>>> (It's possible that pgp 5 may use /dev/random if it's >>>available; I haven't gotten around to downloading it yet and checking.) >> It appears it does - it definitely has the hooks. (Which would make it >> a complete circle - some of the ideas behind /dev/random come from pgp). > Ah, good. Now if I could only persuade the idiots at SGI to include > /dev/random et al... there are reasons that we're going with FreeBSD > for a firewall machine. Speaking of such things, what are some apps that use /dev/random, or at least have hooks to use a random device? Happy hacking, joelh -- Joel Ray Holveck - joelh@gnu.org Fourth law of programming: Anything that can go wrong wi sendmail: segmentation violation - core dumped To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?86k90mmdjm.fsf>