On Fri, May 26, 2023 at 9:11 PM Jonathan Billings wrote:
>
> The detail is covered in articles on lwn.net., search for RNG.
>
> It’s worth reading here:
> https://lwn.net/Articles/884875/
>
> Some of the comments on /dev/random blocking aren’t quite correct for Fedora
> kernels in 37 and 38.
>
>
>
>> The detail is covered in articles on lwn.net., search for RNG.
It’s worth reading here:
https://lwn.net/Articles/884875/
Some of the comments on /dev/random blocking aren’t quite correct for Fedora
kernels in 37 and 38.
Fun story: a couple jobs back we had a fancy documentation service
On Fri, May 26, 2023 at 8:07 PM Samuel Sieb wrote:
>
> On 5/26/23 09:48, Jeffrey Walton wrote:
> > haveged is a userspace daemon. It helps programs which use it, but it
> > does not help the system.
>
> It does help the system. It feeds /dev/random.
> From the package description:
> : Haveged us
On 5/26/23 09:48, Jeffrey Walton wrote:
haveged is a userspace daemon. It helps programs which use it, but it
does not help the system.
It does help the system. It feeds /dev/random.
From the package description:
: Haveged uses HAVEGE (HArdware Volatile Entropy Gathering and Expansion)
: to ma
On Fri, May 26, 2023 at 11:32 AM Bill Cunningham wrote:
>
> On 5/26/2023 4:38 AM, J.Witvliet--- via users wrote:
> >
> > -Original Message-
> > From: Jeffrey Walton
> >
> > On Thu, May 25, 2023 at 9:18 PM Bill Cunningham
> > wrote:
> >> How would you access randomization at the sy
On 5/26/2023 4:38 AM, J.Witvliet--- via users wrote:
-Original Message-
From: Jeffrey Walton
Sent: Friday, May 26, 2023 4:20 AM
To: Community support for Fedora users
Subject: Re: randomization
On Thu, May 25, 2023 at 9:18 PM Bill Cunningham wrote:
How would you access
-Original Message-
From: Jeffrey Walton
Sent: Friday, May 26, 2023 4:20 AM
To: Community support for Fedora users
Subject: Re: randomization
On Thu, May 25, 2023 at 9:18 PM Bill Cunningham wrote:
>
> How would you access randomization at the system level? No via
> sran
> On 26 May 2023, at 05:18, Michael Hennebry
> wrote:
>
> My understanding is that urandom will never run out
> because it is an interface to a pseudorandom number generator.
> random gets its data from a hardware random number pool.
> Correct?
The detail is covered in articles on lwn.net., s
I believe entropy is somehow obtained from the hardware.
On Fri, May 26, 2023, 12:18 AM Michael Hennebry <
henne...@web.cs.ndsu.nodak.edu> wrote:
> On Thu, 25 May 2023, Chris Adams wrote:
>
> > There's also /dev/urandom (which should never "run out" of randomness),
> > but IIRC they're the basica
On Thu, 25 May 2023, Chris Adams wrote:
There's also /dev/urandom (which should never "run out" of randomness),
but IIRC they're the basically same now and neither will block (except
possibly during boot).
My understanding is that urandom will never run out
because it is an interface to a pseu
On 5/25/2023 10:19 PM, Jeffrey Walton wrote:
...
You should use /dev/urandom nowadays, not /dev/random. According to
Theodore Ts'o on the Linux Kernel Crypto mailing list, /dev/random has
been deprecated for a decade.
From Re: [RFC PATCH v12 3/4] Linux Random Number Generator:[1]
Practically
On 5/25/2023 10:24 PM, Chris Adams wrote:
Once upon a time, Samuel Sieb said:
On 5/25/23 18:18, Bill Cunningham wrote:
How would you access randomization at the system level? No
via srand or rand, but the randomization the system offers through
/dev/random. Would this be a fedora level s
Once upon a time, Samuel Sieb said:
> On 5/25/23 18:18, Bill Cunningham wrote:
> > How would you access randomization at the system level? No
> >via srand or rand, but the randomization the system offers through
> >/dev/random. Would this be a fedora level system call ?
> >
> > I intend to
On Thu, May 25, 2023 at 9:18 PM Bill Cunningham wrote:
>
> How would you access randomization at the system level? No via
> srand or rand, but the randomization the system offers through
> /dev/random. Would this be a fedora level system call ?
>
> I intend to take a 512 or 1024, for exa
On 5/25/23 18:18, Bill Cunningham wrote:
How would you access randomization at the system level? No via
srand or rand, but the randomization the system offers through
/dev/random. Would this be a fedora level system call ?
I intend to take a 512 or 1024, for example, size chunk and f
15 matches
Mail list logo