On Wed, Oct 02, 2002 at 10:09:11PM -0400, Hezekiah wrote: > Notice the HUGE difference in the number of bytes generated. Is this a bug in > Crypto++, or is there some weird condition that makes the operating system > random number generator go weird when the CPU maxes out? Either way, should I > be worried about this affecting the quality of the cryptography?
That is wierd. The test that failed tries to make sure that the blocking RNG's (in this case /dev/random) entropy estimation isn't totally off. It seems unlikely that /dev/random was actually able to gather 14588 bytes of entropy in 2 seconds, so I'd say there might be a bug in the /dev/random driver. Can you look in the source code for your OS, find out the person who wrote the /dev/random driver, and ask him to look into this?
