Allowing user processes to do this probably would be a security hole,
as you could tell when /dev/urandom was "faking" it, and hence
processes using it were being less secure.
>
> For my purposes, a /proc/entropy file that did something like
> sprintf(buffer, "%d\n", random_state.entropy_count);
> would be perfect.
>
> Comments? Jeers?
>
A root-only ioctl() on /dev/(u)random is probably the right way to do
this.
-hpa
-- PGP: 2047/2A960705 BA 03 D3 2C 14 A8 A8 BD 1E DF FE 69 EE 35 BD 74 See http://www.zytor.com/~hpa/ for web page and full PGP public key I am Bahá'í -- ask me about it or see http://www.bahai.org/ "To love another person is to see the face of God." -- Les Misérables