mirror of https://github.com/mkerrisk/man-pages
getrandom.2: wfix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
This commit is contained in:
parent
724d21bbb8
commit
b4a9630f4b
|
@ -50,6 +50,7 @@ pool.
|
|||
This behavior can be changed via the
|
||||
.I flags
|
||||
argument.
|
||||
|
||||
If the
|
||||
.IR /dev/urandom
|
||||
pool has been initialized,
|
||||
|
@ -311,7 +312,7 @@ relies on entropy gathered from device drivers and other sources of
|
|||
environmental noise.
|
||||
It is designed to produce a small
|
||||
amount of high-quality seed material to seed a
|
||||
cryptographic pseudo-random number generator (CPRNG).
|
||||
cryptographic pseudorandom number generator (CPRNG).
|
||||
It is designed for security, not speed, and is poorly
|
||||
suited to generating large amounts of cryptographic random data.
|
||||
Users should be very economical in the amount of seed
|
||||
|
@ -328,7 +329,7 @@ of data for Monte Carlo simulations or other
|
|||
programs/algorithms which are doing probabilistic sampling.
|
||||
And indeed, such usage is unnecessary (and will be slow):
|
||||
instead, use these interfaces to provide a small amount of
|
||||
data used to seed a user-space pseudo-random number generator
|
||||
data used to seed a user-space pseudorandom number generator
|
||||
for use by such applications.
|
||||
.\"
|
||||
.SS Generating cryptographic keys
|
||||
|
|
Loading…
Reference in New Issue