On 04/17/2015 12:41 PM, Reco wrote:
And 'shred' uses /dev/urandom in turn:
$ strace -e trace=file shred -s 100M - > /dev/null
…
open("/usr/lib/locale/locale-archive", O_RDONLY) = 3
open("/dev/urandom", O_RDONLY)          = 3
Although, according to strace, 'shred' cheats and only reads 2k bytes
from /dev/urandom, and not 100m as 'dd' does.

'shred' probably uses /dev/urandom to seed and periodically re-seed an internal PRNG.


[Perl's Math::Random::ISAAC::XS] doesn't seem to use kernel-based entropy at 
all. Thank
you for pointing me out at it, now I know it so I avoid it.

ISAAC is very useful when I want a repeatable stream of random numbers, such as for testing.


ISAAC can generate cryptographically secure random number streams by feeding it a "good" random seed:

2015-04-17 14:22:23 dpchrist@t2250 ~
$ time dd if=/dev/random bs=16 count=1 2>/dev/null | perl -MMath::Random::ISAAC::XS -e '$r=Math::Random::ISAAC::XS->new(@ARGV);while(print $r->irand){}' | dd iflag=fullblock of=/dev/null bs=1M count=100 2>/dev/null

real    0m18.350s
user    0m18.305s
sys     0m0.256s


David


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/55317a50.7090...@holgerdanske.com

Reply via email to