hi david! do you have a patch about this hack?
2013/9/25 David Johnston <d...@deadhat.com> > On 9/24/2013 11:58 AM, Roberto Spadim wrote: > >> There's space to create a new random device at /dev if you want too =) >> /dev/nbrandom ? no block random? :) >> >> 2013/9/24 Richard Könning >> <Richard.Koenning@ts.fujitsu.**com<richard.koenn...@ts.fujitsu.com> >> >: >> >>> Am 24.09.2013 02:05, schrieb starlight.201...@binnacle.cx: >>> >>> At 12:59 9/23/2013 -0700, Michael Sierchio wrote: >>>> >>>>> >>>>> I'll repeat myself - the fact that the >>>>> /dev/random implementation you're using >>>>> blocks is a serious design flaw. >>>>> >>>> >>>> Convince Linus, the GPG developers et al.--not me. >>>> >>> >>> No one has to convince Linus, every one is free to use /dev/urandom >>> instead >>> of /dev/random. >>> >>> Ciao, >>> Richard >>> >> > To stop Fedora 17 /dev/random blocking I: > > 1) Hacked rngd to use RdRand and extract full entropy from the RdRand > output > 2) Adjusted the kernel pool parameters so it aggressively pulled from rngd > when the pool was less than 90% full > 3) Fixed the broken rngd invocation on Fedora so it didn't silently fail > when there wasn't a TPM. > > Then /dev/random didn't block and life was good. > > > ______________________________**______________________________**__________ > OpenSSL Project http://www.openssl.org > User Support Mailing List openssl-users@openssl.org > Automated List Manager majord...@openssl.org > -- Roberto Spadim SPAEmpresarial