|
From: | Markus Mützel |
Subject: | [Octave-bug-tracker] [bug #58800] BIST for rng sometimes fails |
Date: | Fri, 24 Jul 2020 05:37:57 -0400 (EDT) |
User-agent: | Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.89 Safari/537.36 Edg/84.0.522.40 |
Follow-up Comment #19, bug #58800 (project octave): The attached patch tries to add 1024 bit of entropy from random_device. Together with the fact that the clock is also used as a seed, that is probably "secure enough" for the foreseeable future. Rik is right: If not enough entropy is available that might throw an exception according to the standard. But that is implementation specific. It's not clear to me from the documentation I found if that can happen on Linux or Windows. In that case, the available entropy (in blocks of 32 bit) would be added to the initial state vector. Because I forgot earlier: I don't think it is possible to use a pseudo RNG to generate more entropy. (file #49543) _______________________________________________________ Additional Item Attachment: File name: bug58800_random_device_v4.patch Size:3 KB <https://file.savannah.gnu.org/file/bug58800_random_device_v4.patch?file_id=49543> _______________________________________________________ Reply to this item at: <https://savannah.gnu.org/bugs/?58800> _______________________________________________ Message sent via Savannah https://savannah.gnu.org/
[Prev in Thread] | Current Thread | [Next in Thread] |