/dev/(u)random is a disease. getrandom() is the cure: http://lists.openwall.net/linux-kernel/2014/07/17/235 …
@evanphx setting up the fd to begin with. You either need an eager init function or thread-safe lazy init, otherwise you leak fds
-
-
@bascule Though your point is likely that getting randomness as a library func (openssl) implies some hidden, global fd. -
@evanphx or thread-specific PRNGs, if you get them seeded properly, and handle things like forking :| -
@bascule Userland PRNGs continue to haunt unix, with shared fds and shared pages. -
@evanphx keying material that isn't mlock()ed :(
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.