>At 01:50 PM 8/2/99 -0400, Paul Koning wrote:
>>What we need is a minimum of ONE decent quality additional
>>entropy source, one that works for diskless IPSEC boxes.
That's unfortunately outside the scope of IPSec :-)
If you don't have random number hardware,
you can't get hardware random number
"Theodore Y. Ts'o" wrote:
> I'd certainly agree that having a standard user-space library would be a
> Good Thing. The real question in my mind is should the code live in
> user space or in kernel space.
Definitely kernel space. Precisely because a good source of entropy is:
* not computab
The intended feature was to demonstrate the performance of elliptic curve
private key operations on an embedded platform. Functionality was a
secondary concern. The implementation doesn't have a PKI, so it doesn't
allow you to transfer messages, get certificates, etc., so the use you
describe isn'
We've taken down the page until I can make sure that we're enforcing the
appropriate export controls. Hopefully, it will return real soon now.
Tim Dierks
VP of Engineering, Certicom
[EMAIL PROTECTED]
510.780.5409 [Hayward] -- 905.501.3791 [Mississauga]
> -Original Message-
> From: [EMAIL