I see that CryptGenRandom() does not appear to have parameters to detect or control the quality of entropy.
So possibly the correct solution to this issue would be to eliminate /dev/random and just leave /dev/urandom in place. 'openssl' apparently uses /dev/urandom. If someone needs to fake /dev/random they can create a symbolic link for it, knowing the risks they might be taking. -- Problem reports: http://cygwin.com/problems.html FAQ: http://cygwin.com/faq/ Documentation: http://cygwin.com/docs.html Unsubscribe info: http://cygwin.com/ml/#unsubscribe-simple