On 2007-11-01 Marc Haber <[EMAIL PROTECTED]> wrote: > On Thu, Nov 01, 2007 at 10:46:38AM +0100, Andreas Metzler wrote: [...] > > Iirc gcrypt simply reads from /dev/urandom in this cae. This depletes > > entropy the same way reading from /dev/random does.
> so, urandom first depletes the "real" entropy and then continues on a > PRNG after using all real stuff? I think so, yes: [EMAIL PROTECTED]:~$ cat /proc/sys/kernel/random/entropy_avail ; \ time dd if=/dev/urandom bs=1M of=/dev/null count=5 ; \ cat /proc/sys/kernel/random/entropy_avail 3256 5+0 Datensätze ein 5+0 Datensätze aus 5242880 Bytes (5,2 MB) kopiert, 0,916788 Sekunden, 5,7 MB/s real 0m0.918s user 0m0.000s sys 0m0.920s 188 There might be some small amount reserved for /dev/random, I cannot completely deplete /proc/sys/kernel/random/entropy_avail by cat /dev/urandom > /dev/null it does not get below something like 130. cu andreas -- `What a good friend you are to him, Dr. Maturin. His other friends are so grateful to you.' `I sew his ears on from time to time, sure' -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]