Jeff Garzik wrote: >Then you make your local random pool vulnerable to external >manipulation, to a certain extent... Adding more bits to the pool should never hurt; the cryptographic mixing ensures this. What _can_ hurt is adding predictable bits but (erroneously) bumping up the entropy counter. So, if you're not sure whether those bits are unpredictable and random or not, the right thing to do is to mix 'em into the pool, but don't bump the entropy counter. The greater your diversity of sources, the less likely it is that you encounter a catastrophic randomness failure. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] Please read the FAQ at http://www.tux.org/lkml/
- use of add_interrupt_randomness in drivers missing in ma... Oliver M . Bolzer
- Re: use of add_interrupt_randomness in drivers miss... Rick Miller
- Re: use of add_interrupt_randomness in drivers miss... Jeff Garzik
- Re: use of add_interrupt_randomness in drivers ... Sandy Harris
- Re: use of add_interrupt_randomness in driv... Horst von Brand
- Re: use of add_interrupt_randomness in driv... Henry Spencer
- Re: use of add_interrupt_randomness in drivers ... David Wagner
- Re: use of add_interrupt_randomness in driv... Horst von Brand
- Re: use of add_interrupt_randomness in ... David Wagner
- Re: use of add_interrupt_randomness in driv... tytso
- Re: use of add_interrupt_randomness in drivers miss... Alan Cox
- Re: use of add_interrupt_randomness in drivers ... Mordechai Ovits