I would like to get some feedback about the password generator that I just implemented in NXT Solaris.
Secrets consists of 64 characters from the following set of characters: ['a'..'z','A'..'Z','0'..'9',' ','''','!','"','#','$','%','&','(',')','*','+',',','-','.','/',':',';','<','=','>','?','@','[','\',']','^','_','`','{','|','}','~']. 97 different characters.
Entropy should be: 97^64 = 1,423609878848517298732088475247e+127 => 422 bit (Is this calculation correct?)
To create the secret, I use the
RAND_bytes function from openSSL. The seeding is done automatically in the openSSL library through OS-based seed initialization.
I was thinking about doing the seeding myself by asking the user to move the cursor or hit on the keyboard, but from what I read about the openSSl implementation, I fear that I might get worse results than with letting openSSL do the seeding.