diff options
author | Matteo Bernardini | 2019-11-02 09:32:55 +0100 |
---|---|---|
committer | Matteo Bernardini | 2019-11-02 09:32:55 +0100 |
commit | a5dc6f94e982a5133196f66fb2d33756063bbe57 (patch) | |
tree | ea496620a3bb4185e47b08377b9c82c640f8058c /system/haveged/README | |
parent | 833a418a9448f32874014c89bf70b7f065bdb220 (diff) | |
download | slackbuilds-a5dc6f94e982a5133196f66fb2d33756063bbe57.tar.gz |
20191102.1 global branch merge.current-20191102.1
Signed-off-by: Matteo Bernardini <ponce@slackbuilds.org>
Diffstat (limited to 'system/haveged/README')
-rw-r--r-- | system/haveged/README | 27 |
1 files changed, 0 insertions, 27 deletions
diff --git a/system/haveged/README b/system/haveged/README deleted file mode 100644 index 187b3bdda9..0000000000 --- a/system/haveged/README +++ /dev/null @@ -1,27 +0,0 @@ -haveged (a simple entropy-gathering daemon) - -The haveged project is an attempt to provide an easy-to-use, unpredictable -random number generator based upon an adaptation of the HAVEGE algorithm. -Haveged was created to remedy low-entropy conditions in the Linux random -device that can occur under some workloads, especially on headless servers. - -The HAVEGE algorithm is based upon the indirect effects of unrelated hardware -events on the instruction timing of a calculation that is sensitive to -processor features such as branch predictors and instruction/data access -mechanisms. -Samples from a high-resolution timer are input into the algorithm to -produce a stream of random data in a collection buffer. The contents of this -buffer can be fed into the random device or accessed directly through the -file system. File system access is a useful alternative to those situations -where use of the random device is either inappropriate or not available. - -Add the following snippet to your /etc/rc.d/rc.M to start up haveged at boot: - -# Starting HAVEGED entropy daemon -if [ -x /etc/rc.d/rc.haveged ]; then - /etc/rc.d/rc.haveged start -fi - -You can see how many bits of entropy are available to the system by reading -the /proc/sys/kernel/random/entropy_avail file, and check the size of your -entropy pool at /proc/sys/kernel/random/poolsize. |