aboutsummaryrefslogtreecommitdiffstats
path: root/man4
diff options
context:
space:
mode:
authorMichael Kerrisk <mtk.manpages@gmail.com>2010-01-16 18:21:45 +0100
committerMichael Kerrisk <mtk.manpages@gmail.com>2010-01-16 18:21:45 +0100
commit23588a6ab4d66d9aa4dacb107be4a2c2bda382f7 (patch)
tree51d4fc59370c28ebaf18a99d7c7ce163399ff1e3 /man4
parent74cee5593970c04684fc6332f719e9ad47af90cd (diff)
downloadman-pages-23588a6ab4d66d9aa4dacb107be4a2c2bda382f7.tar.gz
random.4: wfix
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
Diffstat (limited to 'man4')
-rw-r--r--man4/random.42
1 files changed, 1 insertions, 1 deletions
diff --git a/man4/random.4 b/man4/random.4
index d4a0d923bc..30de59f93e 100644
--- a/man4/random.4
+++ b/man4/random.4
@@ -44,7 +44,7 @@ waiting for more entropy.
As a result, if there is not sufficient entropy in the
entropy pool, the returned values are theoretically vulnerable to a
cryptographic attack on the algorithms used by the driver.
-Knowledge of how to do this is not available in the current non-classified
+Knowledge of how to do this is not available in the current unclassified
literature, but it is theoretically possible that such an attack may
exist.
If this is a concern in your application, use \fI/dev/random\fP