[tahoe-lafs-trac-stream] [tahoe-lafs] #1924: NetBSD < 6.0 /dev/random appears to break RSA keygen in test suites
tahoe-lafs
trac at tahoe-lafs.org
Mon Mar 11 12:19:28 UTC 2013
#1924: NetBSD < 6.0 /dev/random appears to break RSA keygen in test suites
-------------------------------+------------------------------------
Reporter: midnightmagic | Owner:
Type: defect | Status: new
Priority: major | Milestone: undecided
Component: code | Version: 1.9.2
Resolution: | Keywords: netbsd random cryptopp
Launchpad Bug: |
-------------------------------+------------------------------------
Comment (by gdt):
I would be really surprised if read() returned and later memory got
modified (because of that previous system call).
With threads, though, the usual issues about reuse of static buffers
apply. Presumably that's not it or it woudl have shown up elsewhere.
I wonder about a test entropy source that sometimes takes a long time, and
sometimes returns fewer bytes than requested, as a way to make the tests
more harsh. This could perhaps be done by stubbing the read with a
routine that does the actual read, and then maybe sleeps, and maybe
adjusts the bytes read.
--
Ticket URL: <https://tahoe-lafs.org/trac/tahoe-lafs/ticket/1924#comment:9>
tahoe-lafs <https://tahoe-lafs.org>
secure decentralized storage
More information about the tahoe-lafs-trac-stream
mailing list