mirror of https://github.com/mkerrisk/man-pages
AEB, Improved descrtiption of read from /dev/urandom
This commit is contained in:
parent
055fd5fae5
commit
c892f4ca9f
|
@ -8,6 +8,7 @@
|
|||
.\" Some changes by tytso and aeb.
|
||||
.\"
|
||||
.\" 2004-12-16, John V. Belmonte/mtk, Updated init and quit scripts
|
||||
.\" 2004-04-08, AEB, Improved descrtiption of read from /dev/urandom
|
||||
.\"
|
||||
.TH RANDOM 4 2003-10-25 "Linux" "Linux Programmer's Manual"
|
||||
.SH NAME
|
||||
|
@ -33,8 +34,9 @@ high quality randomness such as one-time pad or key generation.
|
|||
When the entropy pool is empty, reads from \fB/dev/random\fP will block
|
||||
until additional environmental noise is gathered.
|
||||
.LP
|
||||
When read, \fB/dev/urandom\fP device will return as many bytes as are
|
||||
requested. As a result, if there is not sufficient entropy in the
|
||||
A read from the \fB/dev/urandom\fP device will not block
|
||||
waiting for more entropy.
|
||||
As a result, if there is not sufficient entropy in the
|
||||
entropy pool, the returned values are theoretically vulnerable to a
|
||||
cryptographic attack on the algorithms used by the driver. Knowledge of
|
||||
how to do this is not available in the current non-classified
|
||||
|
|
Loading…
Reference in New Issue