Timings for random
    Hal Murray 
    hmurray at megapathdsl.net
       
    Sun Jan 29 07:19:32 UTC 2017
    
    
  
gem at rellim.com said:
> rand() and RAND_pseudo_rand() are not random, just psuedo random, thus not
> for NTP.
Do you think fuzzing needs cryptographically strong randomness?
I timed RAND_pseudo_bytes() rather than RAND_bytes() because I didn't want to 
get mixed up with not enough randomness and it seemed good enough for what we 
needed.
> What about the OpenSSL RAND_bytes()? 
It's slightly faster than RAND_pseudo_bytes()  :)  ??
The man page says both will return 1 if the bytes generated are 
cryptographically strong.  I wasn't able to use up the system entropy.  Seems 
suspicious.
-- 
These are my opinions.  I hate spam.
    
    
More information about the devel
mailing list