RAND_Load_File using /dev/random

Previous Topic Next Topic
 
classic Classic list List threaded Threaded
4 messages Options
Reply | Threaded
Open this post in threaded view
|

RAND_Load_File using /dev/random

Felix Dorner
Hi,

my book tells me to call

RAND_load_file("/dev/random", 1024)

this appears to take much too long. is there anything wrong? how many
bytes do i need?

thanks,
felix
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [hidden email]
Automated List Manager                           [hidden email]
Reply | Threaded
Open this post in threaded view
|

Re: RAND_Load_File using /dev/random

1.41421


On 1/17/06, Felix Dorner <[hidden email]> wrote:
Hi,

my book tells me to call

RAND_load_file("/dev/random", 1024)

this appears to take much too long. is there anything wrong? how many
bytes do i need?

thanks,
felix
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [hidden email]
Automated List Manager                           [hidden email]


   There is probably not enough entropy in the random device. /dev/random will block until enough entropy is available.



Reply | Threaded
Open this post in threaded view
|

RE: RAND_Load_File using /dev/random

JoelKatz
In reply to this post by Felix Dorner

> Hi,
>
> my book tells me to call
>
> RAND_load_file("/dev/random", 1024)
>
> this appears to take much too long. is there anything wrong? how many
> bytes do i need?

        It depends upon how secure you need to be and your threat model. Likely,
128 bytes is more than enough. If security is not critical and you're just
experimenting, switching to '/dev/urandom' should be fine.

        If you have control over the systems your software is going to run on, your
best bet would be to make sure there's plenty of entropy available. There
are any number of programs designed specifically to ensure there is lots of
entropy available.

        What operating system is this?

        DS


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [hidden email]
Automated List Manager                           [hidden email]
Reply | Threaded
Open this post in threaded view
|

Re: RAND_Load_File using /dev/random

Felix Dorner

> It depends upon how secure you need to be and your threat model. Likely,
>128 bytes is more than enough. If security is not critical and you're just experimenting, switching to '/dev/urandom' should be fine.
>  
>
Yes i have done this..

> If you have control over the systems your software is going to run on, your
>best bet would be to make sure there's plenty of entropy available. There
>are any number of programs designed specifically to ensure there is lots of
>entropy available.
>
> What operating system is this?
>  
>
Its a quite fresh vanilla linux kernel.

Felix
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [hidden email]
Automated List Manager                           [hidden email]