diff options
author | Jack Lloyd <[email protected]> | 2018-09-05 09:16:39 -0400 |
---|---|---|
committer | Jack Lloyd <[email protected]> | 2018-09-05 09:16:39 -0400 |
commit | 5034df7f364a7bc1f451150012ffb811b66f1a9e (patch) | |
tree | 399fee1c1f4ffa5869d8d7e633c3d895c8b5ae70 | |
parent | 0acbd3ce1d2d13c81926db6cb1c6f76e1edacc06 (diff) |
Update docs
-rw-r--r-- | doc/manual/rng.rst | 13 |
1 files changed, 5 insertions, 8 deletions
diff --git a/doc/manual/rng.rst b/doc/manual/rng.rst index 1828cc8b8..b8549e9bc 100644 --- a/doc/manual/rng.rst +++ b/doc/manual/rng.rst @@ -233,14 +233,11 @@ and entropy. The following entropy sources are currently used: - * System RNG. This is simply however the system RNG is implemented on the - current system (arc4random, reading /dev/urandom, or RtlGenRandom). - * RDRAND: is used if available, but not counted as contributing entropy - * RDSEED: is used if available, but not counted as contributing entropy - * Darwin SecRandomCopyBytes. This may be redundant with the system RNG - * /dev/random and /dev/urandom. This may be redundant with the system RNG - * getentropy, only used on OpenBSD currently - * /proc walk: read files in /proc. Last ditch protection against + * The system RNG (``arc4random``, ``/dev/urandom``, or ``RtlGenRandom``). + * RDRAND and RSEED are used if available, but not counted as contributing entropy + * ``/dev/random`` and ``/dev/urandom``. This may be redundant with the system RNG + * ``getentropy``, only used on OpenBSD currently + * ``/proc`` walk: read files in ``/proc``. Last ditch protection against flawed system RNG. * Win32 stats: takes snapshot of current system processes. Last ditch protection against flawed system RNG. |