diff options
author | Jack Lloyd <[email protected]> | 2018-08-27 12:32:36 -0400 |
---|---|---|
committer | Jack Lloyd <[email protected]> | 2018-08-27 12:32:36 -0400 |
commit | 394d94925198af82d72632c161ed9ece3f0cc3fa (patch) | |
tree | 7dbe7f8da9caca82feafe8eddbe5f8629cdc5995 /doc | |
parent | 612a585f4c0b1abe406b7fe68d50069af878c23a (diff) |
Document the implemented entropy sources
Diffstat (limited to 'doc')
-rw-r--r-- | doc/manual/rng.rst | 14 |
1 files changed, 14 insertions, 0 deletions
diff --git a/doc/manual/rng.rst b/doc/manual/rng.rst index bc34d75a9..ce44c7d16 100644 --- a/doc/manual/rng.rst +++ b/doc/manual/rng.rst @@ -220,6 +220,20 @@ has been hashed by the ``RandomNumberGenerator`` that asked for the entropy, thus any hashing you do will be wasteful of both CPU cycles and entropy. +The following entropy sources are currently used: + + * System RNG. This is simply however the system RNG is implemented on the + current system (arc4random, reading /dev/urandom, or RtlGenRandom). + * RDRAND: is used if available, but not counted as contributing entropy + * RDSEED: is used if available, but not counted as contributing entropy + * Darwin SecRandomCopyBytes. This may be redundant with the system RNG + * /dev/random and /dev/urandom. This may be redundant with the system RNG + * getentropy, only used on OpenBSD currently + * /proc walk: read files in /proc. Last ditch protection against + flawed system RNG. + * Win32 stats: takes snapshot of current system processes. Last ditch + protection against flawed system RNG. + Fork Safety --------------------------------- |