From owner-freebsd-security Wed May 3 14: 6: 8 2000 Delivered-To: freebsd-security@freebsd.org Received: from apollo.backplane.com (apollo.backplane.com [216.240.41.2]) by hub.freebsd.org (Postfix) with ESMTP id 22CAD37BF26 for ; Wed, 3 May 2000 14:06:04 -0700 (PDT) (envelope-from dillon@apollo.backplane.com) Received: (from dillon@localhost) by apollo.backplane.com (8.9.3/8.9.1) id OAA65010; Wed, 3 May 2000 14:06:01 -0700 (PDT) (envelope-from dillon) Date: Wed, 3 May 2000 14:06:01 -0700 (PDT) From: Matthew Dillon Message-Id: <200005032106.OAA65010@apollo.backplane.com> To: James Wyatt Cc: "Andrew J. Korty" , security@FreeBSD.ORG Subject: Re: Cryptographic dump(8) References: Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org :How can you tell how much entropy is in the 'pool' for /dev/random and :it's about to start being not-so-random? Pull a sample once in a while and :Chi test it? I like being able to know. - Jy@ I suppose you could, but since /dev/random is system-wide it should be very random. Matthew Dillon To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message