On 07/17/2014 11:38 PM, Theodore Ts'o wrote:
If the GRND_RANDOM flags bit is set, then draw from the /dev/random pool instead of the /dev/urandom pool. The /dev/random pool is limited based on the entropy that can be obtained from environmental noise, so if there is insufficient entropy, the requested number of bytes may not be returned. If there is no entropy available at all, getrandom(2) will either block, or return an error with errno set to EAGAIN if the GRND_NONBLOCK bit is set in flags.
Can we get a GRND_INIT flag or something like that which means "block/return EAGAIN until the kernel pool is initialized"? Thanks.
(See the previous discussion about pool initialization.) -- Florian Weimer / Red Hat Product Security -- To unsubscribe from this list: send the line "unsubscribe linux-crypto" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html