On 18-06-2012 21:26, Touko Korpela wrote:

[...]

> If it is using /dev/urandom now, that is overkill.
> There exists many algorithms/programs using random output (many packaged
> in Debian) that are many times faster and they are safe enough for this.

If i interpreted if correctly crypto_do_wipe [1] calls blockdev-wipe [2]
to write 0s.

1 -
http://anonscm.debian.org/gitweb/?p=d-i/partman-crypto.git;a=blob;f=lib/crypto-base.sh;h=6c00b9e651b72c8242021382400286680705075d;hb=HEAD#l352
2 -
http://anonscm.debian.org/gitweb/?p=d-i/partman-crypto.git;a=blob;f=blockdev-wipe/blockdev-wipe.c;h=064ab15824e6ae97ff546cddb76d4d12e549e3f7;hb=HEAD

-- 
Melhores cumprimentos/Best regards,

Miguel Figueiredo



-- 
To UNSUBSCRIBE, email to debian-boot-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/4fdfa4e8....@debianpt.org

Reply via email to