random.4: Mention PRNG used by urandom

/dev/urandom uses a pseudo-random number generator to replace
missing entropy.

Signed-off-by: Heinrich Schuchardt <xypron.glpk@gmx.de>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
This commit is contained in:
Heinrich Schuchardt 2014-11-26 23:58:29 +01:00 committed by Michael Kerrisk
parent 1734469103
commit 9949f5cb18
1 changed files with 3 additions and 2 deletions

View File

@ -63,8 +63,9 @@ will be set to
.LP
A read from the \fI/dev/urandom\fP device will not block
waiting for more entropy.
As a result, if there is not sufficient entropy in the
entropy pool, the returned values are theoretically vulnerable to a
If there is not sufficient entropy, a pseudorandom number generator is used
to create the requested bytes.
As a result, in this case the returned values are theoretically vulnerable to a
cryptographic attack on the algorithms used by the driver.
Knowledge of how to do this is not available in the current unclassified
literature, but it is theoretically possible that such an attack may