To keep the this bug uptodate: the latest libgcrypt upload reduces the
amount of entropy required to initialize the randomness pool in
libgcrypt (done each time randomness functions are called by
applications that doesn't use a seed file) about 100 times.  From
typical 360kb to 3kb of /dev/urandom consumption.  That still seems to
deplete the entropy pool in the kernel by a significant amount, though,
but the change could be enough to solve the problem in some situations.

/Simon



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to