Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 22 Nov 1998 20:04:20 -0500
From:      "Allen Smith" <easmith@beatrice.rutgers.edu>
To:        Peter Jeremy <peter.jeremy@auss2.alcatel.com.au>
Cc:        hackers@FreeBSD.ORG
Subject:   Re: freebsd-hackers-digest V4 #314
Message-ID:  <9811222004.ZM2852@beatrice.rutgers.edu>
In-Reply-To: Peter Jeremy <peter.jeremy@auss2.alcatel.com.au>        "Re: freebsd-hackers-digest V4 #314" (Nov 22,  7:59pm)
References:  <98Nov23.115714est.40343@border.alcanet.com.au>

next in thread | previous in thread | raw e-mail | index | archive | help
On Nov 22,  7:59pm, Peter Jeremy (possibly) wrote:
> Allen Smith <easmith@beatrice.rutgers.edu> wrote:
> >Well... no, actually, mine didn't. It uses pgp's random source, which
> >is composed of key timings whenever you're entering text into it.
> 
> My apologies, you are correct.  I didn't look closely enough and was
> reading `md5' instead of `pgp' at a critical point.

No problem; I've made similar goofs myself. What it uses MD5 for is in 
processing the file that pgp produces.

> > (It's possible that pgp 5 may use /dev/random if it's 
> >available; I haven't gotten around to downloading it yet and checking.)
> 
> It appears it does - it definitely has the hooks.  (Which would make it
> a complete circle - some of the ideas behind /dev/random come from pgp).

Ah, good. Now if I could only persuade the idiots at SGI to include
/dev/random et al... there are reasons that we're going with FreeBSD
for a firewall machine.

	-Allen

-- 
Allen Smith				easmith@beatrice.rutgers.edu
	

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?9811222004.ZM2852>