On 8/29/17, 12:45, "openssl-dev on behalf of Salz, Rich via openssl-dev" <[email protected] on behalf of [email protected]> wrote:
➢ An other problem with the current implemenation is that the
➢ randomness parameter that's now given to RAND_add() is just
➢ ignored, it assumes it's the same as the length.
For what it’s worth, this was done deliberately, make RAND_add and
RAND_seed equivalent.
I am skeptical of the ability to get that estimate correct.
Someone on GH there is a conversation thread about turning that into a
percentage, which seems like the best thing to do for any new API.
What’s the point of having this potentially harmful parameter? If it weren’t
ignored – how would OpenSSL use it?
If, based on its value, OpenSSL may decide that it now got “enough” entropy and
doesn’t need to pull more from other sources before serving randomness to
requestors – then it is harmful. “Over-confidence” in this value by the caller
can negatively impact the quality of the produced random numbers.
If this value is not used to guide OpenSSL when to stop pulling entropy sources
and start serving randomness – then it causes no harm, but what’s its purpose?
IMHO this interface is a way for the user to improve the quality of the
randomness it would get from the given RNG, *not* to replace (or diminish) its
other sources. My proposal is to abolish this parameter, especially since now
it is simply ignored (and IMHO – for a good reason).
smime.p7s
Description: S/MIME cryptographic signature
-- openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
