Skip site navigation (1)Skip section navigation (2)
Date:      23 Nov 1998 13:09:33 -0600
From:      Joel Ray Holveck <joelh@gnu.org>
To:        "Allen Smith" <easmith@beatrice.rutgers.edu>
Cc:        Peter Jeremy <peter.jeremy@auss2.alcatel.com.au>, hackers@FreeBSD.ORG
Subject:   Re: freebsd-hackers-digest V4 #314
Message-ID:  <86k90mmdjm.fsf@detlev.UUCP>
In-Reply-To: "Allen Smith"'s message of "Sun, 22 Nov 1998 20:04:20 -0500"
References:  <98Nov23.115714est.40343@border.alcanet.com.au> <9811222004.ZM2852@beatrice.rutgers.edu>

next in thread | previous in thread | raw e-mail | index | archive | help
>>> (It's possible that pgp 5 may use /dev/random if it's 
>>>available; I haven't gotten around to downloading it yet and checking.)
>> It appears it does - it definitely has the hooks.  (Which would make it
>> a complete circle - some of the ideas behind /dev/random come from pgp).
> Ah, good. Now if I could only persuade the idiots at SGI to include
> /dev/random et al... there are reasons that we're going with FreeBSD
> for a firewall machine.

Speaking of such things, what are some apps that use /dev/random, or
at least have hooks to use a random device?

Happy hacking,
joelh

-- 
Joel Ray Holveck - joelh@gnu.org
   Fourth law of programming:
   Anything that can go wrong wi
sendmail: segmentation violation - core dumped

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?86k90mmdjm.fsf>