From owner-freebsd-hackers Sun Nov 22 16:58:30 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id QAA04556 for freebsd-hackers-outgoing; Sun, 22 Nov 1998 16:58:30 -0800 (PST) (envelope-from owner-freebsd-hackers@FreeBSD.ORG) Received: from alcanet.com.au (border.alcanet.com.au [203.62.196.10]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id QAA04548 for ; Sun, 22 Nov 1998 16:58:27 -0800 (PST) (envelope-from peter.jeremy@auss2.alcatel.com.au) Received: by border.alcanet.com.au id <40343>; Mon, 23 Nov 1998 11:57:14 +1100 Date: Mon, 23 Nov 1998 11:57:40 +1100 From: Peter Jeremy Subject: Re: freebsd-hackers-digest V4 #314 To: easmith@beatrice.rutgers.edu Cc: hackers@FreeBSD.ORG Message-Id: <98Nov23.115714est.40343@border.alcanet.com.au> Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG Allen Smith wrote: >Well... no, actually, mine didn't. It uses pgp's random source, which >is composed of key timings whenever you're entering text into it. My apologies, you are correct. I didn't look closely enough and was reading `md5' instead of `pgp' at a critical point. > (It's possible that pgp 5 may use /dev/random if it's >available; I haven't gotten around to downloading it yet and checking.) It appears it does - it definitely has the hooks. (Which would make it a complete circle - some of the ideas behind /dev/random come from pgp). Peter To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message