On Wed, Oct 02, 2002 at 10:09:11PM -0400, Hezekiah wrote:
>       Notice the HUGE difference in the number of bytes generated. Is this a bug in
> Crypto++, or is there some weird condition that makes the operating system
> random number generator go weird when the CPU maxes out? Either way, should I
> be worried about this affecting the quality of the cryptography?

That is wierd. The test that failed tries to make sure that the blocking
RNG's (in this case /dev/random) entropy estimation isn't totally off. It
seems unlikely that /dev/random was actually able to gather 14588
bytes of entropy in 2 seconds, so I'd say there might be a bug in the
/dev/random driver. Can you look in the source code for your OS, find out
the person who wrote the /dev/random driver, and ask him to look into
this?

Reply via email to