f3c777d5ea
Allows to use /dev/random for generating the master key instead of the default Go implementation. When the kernel random generator has been properly initialized both are considered equally secure, however: * Versions of Go prior to 1.9 just fall back to /dev/urandom if the getrandom() syscall would be blocking (Go Bug #19274) * Kernel versions prior to 3.17 do not support getrandom(), and there is no check if the random generator has been properly initialized before reading from /dev/urandom This is especially useful for embedded hardware with low-entroy. Please note that generation of the master key might block indefinitely if the kernel cannot harvest enough entropy. |
||
---|---|---|
.. | ||
CLI_ABI.md | ||
duplicate-inodes.txt | ||
file-format.md | ||
gocryptfs-logo.png | ||
MANPAGE-render.bash | ||
MANPAGE.md | ||
openssl-gcm.md | ||
performance.txt | ||
SECURITY.md | ||
XFSTESTS.md |