Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

IIRC OpenBSD's arc4random (even in the kernel) gets its initial seed by pretty much identical mechanism as linux-specific getauxval(AT_RANDOM).


No, userland arc4random() calls getentropy()

https://cvsweb.openbsd.org/src/lib/libc/crypt/arc4random.c?r...

I have not investigated OpenBSD’s boot-time kernel RNG keying.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: