|
14 | 14 | //! | ----------------- | ------------------ | -------------- |
15 | 15 | //! | Linux, Android | `*‑linux‑*` | [`getrandom`][1] system call if available, otherwise [`/dev/urandom`][2] after successfully polling `/dev/random` |
16 | 16 | //! | Windows | `*‑windows‑*` | [`BCryptGenRandom`] |
17 | | -//! | macOS | `*‑apple‑darwin` | [`getentropy`][3] if available, otherwise [`/dev/random`][4] (identical to `/dev/urandom`) |
| 17 | +//! | macOS | `*‑apple‑darwin` | [`getentropy`][3] if available, otherwise [`/dev/urandom`][4] (identical to `/dev/random`) |
18 | 18 | //! | iOS | `*‑apple‑ios` | [`SecRandomCopyBytes`] |
19 | 19 | //! | FreeBSD | `*‑freebsd` | [`getrandom`][5] if available, otherwise [`kern.arandom`][6] |
20 | 20 | //! | OpenBSD | `*‑openbsd` | [`getentropy`][7] |
21 | 21 | //! | NetBSD | `*‑netbsd` | [`kern.arandom`][8] |
22 | | -//! | Dragonfly BSD | `*‑dragonfly` | [`getrandom`][9] if available, otherwise [`/dev/random`][10] |
| 22 | +//! | Dragonfly BSD | `*‑dragonfly` | [`getrandom`][9] if available, otherwise [`/dev/urandom`][10] (identical to `/dev/random`) |
23 | 23 | //! | Solaris, illumos | `*‑solaris`, `*‑illumos` | [`getrandom`][11] if available, otherwise [`/dev/random`][12] |
24 | 24 | //! | Fuchsia OS | `*‑fuchsia` | [`cprng_draw`] |
25 | 25 | //! | Redox | `*‑redox` | `/dev/urandom` |
26 | | -//! | Haiku | `*‑haiku` | `/dev/random` (identical to `/dev/urandom`) |
| 26 | +//! | Haiku | `*‑haiku` | `/dev/urandom` (identical to `/dev/random`) |
27 | 27 | //! | Hermit | `x86_64-*-hermit` | [`RDRAND`] |
28 | 28 | //! | SGX | `x86_64‑*‑sgx` | [`RDRAND`] |
29 | 29 | //! | VxWorks | `*‑wrs‑vxworks‑*` | `randABytes` after checking entropy pool initialization with `randSecure` |
30 | 30 | //! | ESP-IDF | `*‑espidf` | [`esp_fill_random`] |
31 | | -//! | Emscripten | `*‑emscripten` | `/dev/random` (identical to `/dev/urandom`) |
| 31 | +//! | Emscripten | `*‑emscripten` | `/dev/urandom` (identical to `/dev/random`) |
32 | 32 | //! | WASI | `wasm32‑wasi` | [`random_get`] |
33 | 33 | //! | Web Browser and Node.js | `wasm32‑*‑unknown` | [`Crypto.getRandomValues`] if available, then [`crypto.randomFillSync`] if on Node.js, see [WebAssembly support] |
34 | 34 | //! | SOLID | `*-kmc-solid_*` | `SOLID_RNG_SampleRandomBytes` |
|
150 | 150 | //! [1]: http://man7.org/linux/man-pages/man2/getrandom.2.html |
151 | 151 | //! [2]: http://man7.org/linux/man-pages/man4/urandom.4.html |
152 | 152 | //! [3]: https://www.unix.com/man-page/mojave/2/getentropy/ |
153 | | -//! [4]: https://www.unix.com/man-page/mojave/4/random/ |
| 153 | +//! [4]: https://www.unix.com/man-page/mojave/4/urandom/ |
154 | 154 | //! [5]: https://www.freebsd.org/cgi/man.cgi?query=getrandom&manpath=FreeBSD+12.0-stable |
155 | 155 | //! [6]: https://www.freebsd.org/cgi/man.cgi?query=random&sektion=4 |
156 | 156 | //! [7]: https://man.openbsd.org/getentropy.2 |
|
0 commit comments