Date: Sun, 22 Nov 1998 20:04:20 -0500 From: "Allen Smith" <easmith@beatrice.rutgers.edu> To: Peter Jeremy <peter.jeremy@auss2.alcatel.com.au> Cc: hackers@FreeBSD.ORG Subject: Re: freebsd-hackers-digest V4 #314 Message-ID: <9811222004.ZM2852@beatrice.rutgers.edu> In-Reply-To: Peter Jeremy <peter.jeremy@auss2.alcatel.com.au> "Re: freebsd-hackers-digest V4 #314" (Nov 22, 7:59pm) References: <98Nov23.115714est.40343@border.alcanet.com.au>
next in thread | previous in thread | raw e-mail | index | archive | help
On Nov 22, 7:59pm, Peter Jeremy (possibly) wrote: > Allen Smith <easmith@beatrice.rutgers.edu> wrote: > >Well... no, actually, mine didn't. It uses pgp's random source, which > >is composed of key timings whenever you're entering text into it. > > My apologies, you are correct. I didn't look closely enough and was > reading `md5' instead of `pgp' at a critical point. No problem; I've made similar goofs myself. What it uses MD5 for is in processing the file that pgp produces. > > (It's possible that pgp 5 may use /dev/random if it's > >available; I haven't gotten around to downloading it yet and checking.) > > It appears it does - it definitely has the hooks. (Which would make it > a complete circle - some of the ideas behind /dev/random come from pgp). Ah, good. Now if I could only persuade the idiots at SGI to include /dev/random et al... there are reasons that we're going with FreeBSD for a firewall machine. -Allen -- Allen Smith easmith@beatrice.rutgers.edu To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?9811222004.ZM2852>