On Fri, 29 Jul 2005 20:56:58 -0400, David Shaw said: > cat /good/random/source | gpg --enarmor
There is even an easier way: gpg --gen-random -a 1 12 Returns 16 bytes of armored random; i.e. actual 12 bytes. This uses the same algorithm gpg uses for session keys. By using 2 instead of 1 gpg will use the algorithm it uses for creating keys (i.e. it might block until enough random is available). Should should use a multiple of 3 for the number of random bytes, so that gpg won't produce padding characters. Salam-Shalom, Werner _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users