mirror of https://github.com/mkerrisk/man-pages
random.4: Mention PRNG used by urandom
/dev/urandom uses a pseudo-random number generator to replace missing entropy. Signed-off-by: Heinrich Schuchardt <xypron.glpk@gmx.de> Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
This commit is contained in:
parent
1734469103
commit
9949f5cb18
|
@ -63,8 +63,9 @@ will be set to
|
|||
.LP
|
||||
A read from the \fI/dev/urandom\fP device will not block
|
||||
waiting for more entropy.
|
||||
As a result, if there is not sufficient entropy in the
|
||||
entropy pool, the returned values are theoretically vulnerable to a
|
||||
If there is not sufficient entropy, a pseudorandom number generator is used
|
||||
to create the requested bytes.
|
||||
As a result, in this case the returned values are theoretically vulnerable to a
|
||||
cryptographic attack on the algorithms used by the driver.
|
||||
Knowledge of how to do this is not available in the current unclassified
|
||||
literature, but it is theoretically possible that such an attack may
|
||||
|
|
Loading…
Reference in New Issue