. Running through strace showed
> that something was attempting to reading from /dev/random. Sometimes
> it ran fine, but at least 25-30% it ended up blocking until the
> entropy pool is refilled. To test I moved /dev/random, and created a
> link from /dev/urandom to /dev/random (the former doesn't block, but
> isn't cryptographically secure). It looks as if this could be related
> to the loading of the SecureRandomSeedGenerator class.
>

Why not use a fixed random seed for unit tests? That would make them
more repeatable and avoid this problem, no?

Reply via email to