diff options
author | Michael Kerrisk <mtk.manpages@gmail.com> | 2010-01-16 18:21:45 +0100 |
---|---|---|
committer | Michael Kerrisk <mtk.manpages@gmail.com> | 2010-01-16 18:21:45 +0100 |
commit | 23588a6ab4d66d9aa4dacb107be4a2c2bda382f7 (patch) | |
tree | 51d4fc59370c28ebaf18a99d7c7ce163399ff1e3 /man4 | |
parent | 74cee5593970c04684fc6332f719e9ad47af90cd (diff) | |
download | man-pages-23588a6ab4d66d9aa4dacb107be4a2c2bda382f7.tar.gz |
random.4: wfix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
Diffstat (limited to 'man4')
-rw-r--r-- | man4/random.4 | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/man4/random.4 b/man4/random.4 index d4a0d923bc..30de59f93e 100644 --- a/man4/random.4 +++ b/man4/random.4 @@ -44,7 +44,7 @@ waiting for more entropy. As a result, if there is not sufficient entropy in the entropy pool, the returned values are theoretically vulnerable to a cryptographic attack on the algorithms used by the driver. -Knowledge of how to do this is not available in the current non-classified +Knowledge of how to do this is not available in the current unclassified literature, but it is theoretically possible that such an attack may exist. If this is a concern in your application, use \fI/dev/random\fP |