Re: Seeding before RSA key generation

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



>    What's supposedly bad about the 1.0.x/1.1.0 OpenSSL RNG other
    than not being an NSA/NIST design?
  
Poor locking; been known to crash.

Does not reseed.

Global across the process, rather than isolated for private-key generation or per-connection.

Mixes in getpid and time to get "better" random bytes.

Has a "pseudo-rand" feature.

Never was cryptographically evaluated.


-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users



[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux