Let’s state that I have a huge bunch of truly unpredictable random data in file "random.bin". The random data has been created outside of my system and has been securely transfered into my system.
- How could I feed this file to the OS entropy pool so that a subsequent call to /dev/random by my fancy software will not block?
- Would the command ‘cat random.bin > /dev/random’ makes it?
- The question is not about the use of /dev/urandom.
- Answer must not make use of fancy tool like ‘havege’.
- Perfect answer would be Unix flavour independent (so working on AIX, Solaris, RHEL, BSD, …).
- It is similar but different than question Feeding /dev/random entropy pool? .