Return-Path: Delivered-To: apmail-apr-dev-archive@www.apache.org Received: (qmail 5565 invoked from network); 2 May 2008 00:08:50 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.2) by minotaur.apache.org with SMTP; 2 May 2008 00:08:50 -0000 Received: (qmail 25516 invoked by uid 500); 2 May 2008 00:08:51 -0000 Delivered-To: apmail-apr-dev-archive@apr.apache.org Received: (qmail 25478 invoked by uid 500); 2 May 2008 00:08:51 -0000 Mailing-List: contact dev-help@apr.apache.org; run by ezmlm Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Id: Delivered-To: mailing list dev@apr.apache.org Received: (qmail 25467 invoked by uid 99); 2 May 2008 00:08:51 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Thu, 01 May 2008 17:08:51 -0700 X-ASF-Spam-Status: No, hits=-0.0 required=10.0 tests=SPF_HELO_PASS,SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (nike.apache.org: domain of bojan@rexursive.com designates 203.171.74.242 as permitted sender) Received: from [203.171.74.242] (HELO beauty.rexursive.com) (203.171.74.242) by apache.org (qpsmtpd/0.29) with ESMTP; Fri, 02 May 2008 00:07:57 +0000 Received: from [10.1.120.24] (shrek.rexursive.com [10.1.120.24]) by beauty.rexursive.com (Postfix) with ESMTP id C56A440392; Fri, 2 May 2008 10:08:16 +1000 (EST) Subject: Re: PR #44881 From: Bojan Smojver To: Lucian Adrian Grijincu Cc: "William A. Rowe, Jr." , APR Development List In-Reply-To: References: <1209364459.2559.4.camel@shrek.rexursive.com> <4815E94C.1000101@rowe-clan.net> <481650B6.10608@rowe-clan.net> <1209680223.2543.26.camel@shrek.rexursive.com> <481A4CC4.9040307@rowe-clan.net> Content-Type: text/plain Date: Fri, 02 May 2008 10:08:16 +1000 Message-Id: <1209686896.32093.4.camel@shrek.rexursive.com> Mime-Version: 1.0 X-Mailer: Evolution 2.12.3 (2.12.3-4.fc8) Content-Transfer-Encoding: 7bit X-Virus-Checked: Checked by ClamAV on apache.org On Fri, 2008-05-02 at 02:56 +0300, Lucian Adrian Grijincu wrote: > 1. Some function in APR's uuid generator falls back to rand(3) if > apr_generate_random_bytes returns an error. ... > 2. E2fsprogs on which other major open source UUID generators are > supposed to be based on (at least according to > http://en.wikipedia.org/wiki/UUID) tries to open /dev/urandom first > and /dev/random second. I don't know if posting the code snniplet here > is apropiate (licensing reasons). I was also under the impression that /dev/urandom is good enough for most stuff and is generally used for things like this these days (especially because /dev/random blocks). But, I'm not a crypto guy, so I'll defer all that to someone that has better knowledge of the issues involved. -- Bojan