hi david!
do you have a patch about this hack?

2013/9/25 David Johnston <d...@deadhat.com>

> On 9/24/2013 11:58 AM, Roberto Spadim wrote:
>
>> There's space to create a new random device at /dev if you want too =)
>> /dev/nbrandom ? no block random? :)
>>
>> 2013/9/24 Richard Könning 
>> <Richard.Koenning@ts.fujitsu.**com<richard.koenn...@ts.fujitsu.com>
>> >:
>>
>>> Am 24.09.2013 02:05, schrieb starlight.201...@binnacle.cx:
>>>
>>>  At 12:59 9/23/2013 -0700, Michael Sierchio wrote:
>>>>
>>>>>
>>>>> I'll repeat myself - the fact that the
>>>>> /dev/random implementation you're using
>>>>> blocks is a serious design flaw.
>>>>>
>>>>
>>>> Convince Linus, the GPG developers et al.--not me.
>>>>
>>>
>>> No one has to convince Linus, every one is free to use /dev/urandom
>>> instead
>>> of /dev/random.
>>>
>>> Ciao,
>>> Richard
>>>
>>
> To stop Fedora 17 /dev/random blocking I:
>
> 1) Hacked rngd to use RdRand and extract full entropy from the RdRand
> output
> 2) Adjusted the kernel pool parameters so it aggressively pulled from rngd
> when the pool was less than 90% full
> 3) Fixed the broken rngd invocation on Fedora so it didn't silently fail
> when there wasn't a TPM.
>
> Then /dev/random didn't block and life was good.
>
>
> ______________________________**______________________________**__________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           majord...@openssl.org
>



-- 
Roberto Spadim
SPAEmpresarial

Reply via email to