diff options
author | Guilhem Moulin <guilhem@fripost.org> | 2014-01-23 02:18:40 +0100 |
---|---|---|
committer | Guilhem Moulin <guilhem@fripost.org> | 2015-06-07 04:27:57 +0200 |
commit | ba40cbca9650e1ddaa8357c21b5de31cc376c481 (patch) | |
tree | 292c6f88b870eee95d229c52a42b74655bc7ae2e /COPYRIGHT | |
parent | ef60bfefc79b00a41ca3a8e9388d3cf3ff46068e (diff) |
Ensure urandom entropy is of cryptographic quality.
The non-blocking PRNG /dev/urandom doesn't block if it has been seeded
enough, sadly (e.g., if the entropy pool is empty). Reading a few bytes
from the *blocking* should ensure that "the kernel RNG has [...] reach
full entropy at least once, which guarantees cryptographic quality of
the rest of the /dev/urandom stream." -- Tor bug #10676
https://trac.torproject.org/projects/tor/ticket/10676
See also urandom(4).
Diffstat (limited to 'COPYRIGHT')
0 files changed, 0 insertions, 0 deletions