[PATCH 1/1] random.4: mention PRNG used by urandom

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



/dev/urandom uses a pseudo random number generator to replace
missing entropy.

Signed-off-by: Heinrich Schuchardt <xypron.glpk@xxxxxx>
---
 man4/random.4 | 5 +++--
 1 file changed, 3 insertions(+), 2 deletions(-)

diff --git a/man4/random.4 b/man4/random.4
index 44d9e34..1be19b8 100644
--- a/man4/random.4
+++ b/man4/random.4
@@ -63,8 +63,9 @@ will be set to
 .LP
 A read from the \fI/dev/urandom\fP device will not block
 waiting for more entropy.
-As a result, if there is not sufficient entropy in the
-entropy pool, the returned values are theoretically vulnerable to a
+If there is not sufficient entropy, a pseudorandom number generator is used
+to create the requested bytes.
+As a result, in this case the returned values are theoretically vulnerable to a
 cryptographic attack on the algorithms used by the driver.
 Knowledge of how to do this is not available in the current unclassified
 literature, but it is theoretically possible that such an attack may
-- 
2.1.3

--
To unsubscribe from this list: send the line "unsubscribe linux-man" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [Kernel Documentation]     [Netdev]     [Linux Ethernet Bridging]     [Linux Wireless]     [Kernel Newbies]     [Security]     [Linux for Hams]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux Admin]     [Samba]

  Powered by Linux