The hierarchy of RNGs will overcome some of the performance concerns. Only the root needs to call getrandom().
I do agree that having a DRBG at the root level is a good idea though. Pauli -- Oracle Dr Paul Dale | Cryptographer | Network Security & Encryption Phone +61 7 3031 7217 Oracle Australia From: Salz, Rich via openssl-dev [mailto:openssl-dev@openssl.org] Sent: Wednesday, 28 June 2017 4:56 AM To: Kaduk, Ben <bka...@akamai.com>; openssl-dev@openssl.org; Matt Caswell <m...@openssl.org> Subject: Re: [openssl-dev] Work on a new RNG for OpenSSL For windows RAND_bytes should just call CryptGenRandom (or its equiv). For modern Linux, probably call getrandom(2). For OpenBSD call arc4random(). Getrandom() is a syscall, and I have concerns about the syscall performance. I would rather feed getrandom (or /dev/random if that’s not available) into a FIPS DRBG generator.
-- openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev