18 Jan
2015
18 Jan
'15
4:16 p.m.
Andrey Semashev wrote:
Although CryptGenRandom description doesn't say whether its entropy is renewed.
It doesn't actually matter, when the generator is AES counter mode, which is specified to be the case from Vista SP1 onwards. Before that, it was in principle possible to attack it as it was RC4 based, but that still required access to the local machine. I see, by the way, that boost::random_device is already implemented to use CryptGenRandom. It requires building though, and Boost.System for the error reporting.