[tahoe-lafs-trac-stream] [tahoe-lafs] #1924: NetBSD < 6.0 /dev/random appears to break RSA keygen in test suites

tahoe-lafs trac at tahoe-lafs.org
Mon Mar 11 12:19:28 UTC 2013


#1924: NetBSD < 6.0 /dev/random appears to break RSA keygen in test suites
-------------------------------+------------------------------------
     Reporter:  midnightmagic  |      Owner:
         Type:  defect         |     Status:  new
     Priority:  major          |  Milestone:  undecided
    Component:  code           |    Version:  1.9.2
   Resolution:                 |   Keywords:  netbsd random cryptopp
Launchpad Bug:                 |
-------------------------------+------------------------------------

Comment (by gdt):

 I would be really surprised if read() returned and later memory got
 modified (because of that previous system call).

 With threads, though, the usual issues about reuse of static buffers
 apply.  Presumably that's not it or it woudl have shown up elsewhere.


 I wonder about a test entropy source that sometimes takes a long time, and
 sometimes returns fewer bytes than requested, as a way to make the tests
 more harsh.   This could perhaps be done by stubbing the read with a
 routine that does the actual read, and then maybe sleeps, and maybe
 adjusts the bytes read.

-- 
Ticket URL: <https://tahoe-lafs.org/trac/tahoe-lafs/ticket/1924#comment:9>
tahoe-lafs <https://tahoe-lafs.org>
secure decentralized storage


More information about the tahoe-lafs-trac-stream mailing list