diff options
author | Matteo Bernardini | 2020-02-24 11:30:13 +0100 |
---|---|---|
committer | Matteo Bernardini | 2020-02-24 11:30:13 +0100 |
commit | 27811f4c33fd0b9a2e7ea64a4fbf4969d4e56bd4 (patch) | |
tree | 3887c02a1345299dccb436665f332db2411deec8 /system/haveged/README | |
parent | 5de2bc5ab8f479fb924d4c5b543c6e0a37999431 (diff) | |
download | slackbuilds-27811f4c33fd0b9a2e7ea64a4fbf4969d4e56bd4.tar.gz |
20200224.1 global branch merge.current-20200224.1
Signed-off-by: Matteo Bernardini <ponce@slackbuilds.org>
Diffstat (limited to 'system/haveged/README')
-rw-r--r-- | system/haveged/README | 27 |
1 files changed, 0 insertions, 27 deletions
diff --git a/system/haveged/README b/system/haveged/README deleted file mode 100644 index 187b3bdda9..0000000000 --- a/system/haveged/README +++ /dev/null @@ -1,27 +0,0 @@ -haveged (a simple entropy-gathering daemon) - -The haveged project is an attempt to provide an easy-to-use, unpredictable -random number generator based upon an adaptation of the HAVEGE algorithm. -Haveged was created to remedy low-entropy conditions in the Linux random -device that can occur under some workloads, especially on headless servers. - -The HAVEGE algorithm is based upon the indirect effects of unrelated hardware -events on the instruction timing of a calculation that is sensitive to -processor features such as branch predictors and instruction/data access -mechanisms. -Samples from a high-resolution timer are input into the algorithm to -produce a stream of random data in a collection buffer. The contents of this -buffer can be fed into the random device or accessed directly through the -file system. File system access is a useful alternative to those situations -where use of the random device is either inappropriate or not available. - -Add the following snippet to your /etc/rc.d/rc.M to start up haveged at boot: - -# Starting HAVEGED entropy daemon -if [ -x /etc/rc.d/rc.haveged ]; then - /etc/rc.d/rc.haveged start -fi - -You can see how many bits of entropy are available to the system by reading -the /proc/sys/kernel/random/entropy_avail file, and check the size of your -entropy pool at /proc/sys/kernel/random/poolsize. |