Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

Re: DakaRand
From: Paul Schmehl <pschmehl_lists () tx rr com>
Date: Mon, 20 Aug 2012 13:29:27 -0500

--On August 20, 2012 9:35:54 AM -0700 Dan Kaminsky <dan () doxpara com> wrote:

Neat.  What's the default, and what does it mine?  Count?  Nanosecond
time?


This 2002 USENIX paper explains the process.  A Yarrow PRNG is used and the 
output is encrypted with the AES Rijndael cipher.

<http://static.usenix.org/events/bsdcon/full_papers/murray/murray_html/>

Sources of entropy are defined in random.h
enum esource { \
    RANDOM_WRITE, RANDOM_KEYBOARD, \
    RANDOM_MOUSE, RANDOM_NET, \
    RANDOM_INTERRUPT, ENTROPYSOURCE \
};
void random_harvest(void *data, \
    u_int count, u_int bits, \
    u_int frac, enum esource source);

Here's a copy of random.h:

<http://bintree.net/freebsd/d1/d79/random_8h_source.html>


-- 
Paul Schmehl, Senior Infosec Analyst
As if it wasn't already obvious, my opinions
are my own and not those of my employer.
*******************************************
"It is as useless to argue with those who have
renounced the use of reason as to administer
medication to the dead." Thomas Jefferson
"There are some ideas so wrong that only a very
intelligent person could believe in them." George Orwell

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]