f3c777d5ea
Allows to use /dev/random for generating the master key instead of the default Go implementation. When the kernel random generator has been properly initialized both are considered equally secure, however: * Versions of Go prior to 1.9 just fall back to /dev/urandom if the getrandom() syscall would be blocking (Go Bug #19274) * Kernel versions prior to 3.17 do not support getrandom(), and there is no check if the random generator has been properly initialized before reading from /dev/urandom This is especially useful for embedded hardware with low-entroy. Please note that generation of the master key might block indefinitely if the kernel cannot harvest enough entropy. |
||
---|---|---|
.. | ||
configfile | ||
contentenc | ||
cryptocore | ||
ctlsock | ||
exitcodes | ||
fusefrontend | ||
fusefrontend_reverse | ||
nametransform | ||
openfiletable | ||
pathiv | ||
prefer_openssl | ||
readpassword | ||
serialize_reads | ||
siv_aead | ||
speed | ||
stupidgcm | ||
syscallcompat | ||
tlog |