|
14 | 14 | //! | ----------------- | ------------------ | --------------
|
15 | 15 | //! | Linux, Android | `*‑linux‑*` | [`getrandom`][1] system call if available, otherwise [`/dev/urandom`][2] after successfully polling `/dev/random`
|
16 | 16 | //! | Windows | `*‑windows‑*` | [`BCryptGenRandom`]
|
17 |
| -//! | macOS | `*‑apple‑darwin` | [`getentropy`][3] if available, otherwise [`/dev/random`][4] (identical to `/dev/urandom`) |
| 17 | +//! | macOS | `*‑apple‑darwin` | [`getentropy`][3] if available, otherwise [`/dev/urandom`][4] (identical to `/dev/random`) |
18 | 18 | //! | iOS | `*‑apple‑ios` | [`SecRandomCopyBytes`]
|
19 | 19 | //! | FreeBSD | `*‑freebsd` | [`getrandom`][5] if available, otherwise [`kern.arandom`][6]
|
20 | 20 | //! | OpenBSD | `*‑openbsd` | [`getentropy`][7]
|
21 | 21 | //! | NetBSD | `*‑netbsd` | [`kern.arandom`][8]
|
22 |
| -//! | Dragonfly BSD | `*‑dragonfly` | [`getrandom`][9] if available, otherwise [`/dev/random`][10] |
| 22 | +//! | Dragonfly BSD | `*‑dragonfly` | [`getrandom`][9] if available, otherwise [`/dev/urandom`][10] (identical to `/dev/random`) |
23 | 23 | //! | Solaris, illumos | `*‑solaris`, `*‑illumos` | [`getrandom`][11] if available, otherwise [`/dev/random`][12]
|
24 | 24 | //! | Fuchsia OS | `*‑fuchsia` | [`cprng_draw`]
|
25 | 25 | //! | Redox | `*‑redox` | `/dev/urandom`
|
26 |
| -//! | Haiku | `*‑haiku` | `/dev/random` (identical to `/dev/urandom`) |
| 26 | +//! | Haiku | `*‑haiku` | `/dev/urandom` (identical to `/dev/random`) |
27 | 27 | //! | Hermit | `x86_64-*-hermit` | [`RDRAND`]
|
28 | 28 | //! | SGX | `x86_64‑*‑sgx` | [`RDRAND`]
|
29 | 29 | //! | VxWorks | `*‑wrs‑vxworks‑*` | `randABytes` after checking entropy pool initialization with `randSecure`
|
30 | 30 | //! | ESP-IDF | `*‑espidf` | [`esp_fill_random`]
|
31 |
| -//! | Emscripten | `*‑emscripten` | `/dev/random` (identical to `/dev/urandom`) |
| 31 | +//! | Emscripten | `*‑emscripten` | `/dev/urandom` (identical to `/dev/random`) |
32 | 32 | //! | WASI | `wasm32‑wasi` | [`random_get`]
|
33 | 33 | //! | Web Browser and Node.js | `wasm32‑*‑unknown` | [`Crypto.getRandomValues`] if available, then [`crypto.randomFillSync`] if on Node.js, see [WebAssembly support]
|
34 | 34 | //! | SOLID | `*-kmc-solid_*` | `SOLID_RNG_SampleRandomBytes`
|
|
150 | 150 | //! [1]: http://man7.org/linux/man-pages/man2/getrandom.2.html
|
151 | 151 | //! [2]: http://man7.org/linux/man-pages/man4/urandom.4.html
|
152 | 152 | //! [3]: https://www.unix.com/man-page/mojave/2/getentropy/
|
153 |
| -//! [4]: https://www.unix.com/man-page/mojave/4/random/ |
| 153 | +//! [4]: https://www.unix.com/man-page/mojave/4/urandom/ |
154 | 154 | //! [5]: https://www.freebsd.org/cgi/man.cgi?query=getrandom&manpath=FreeBSD+12.0-stable
|
155 | 155 | //! [6]: https://www.freebsd.org/cgi/man.cgi?query=random&sektion=4
|
156 | 156 | //! [7]: https://man.openbsd.org/getentropy.2
|
|
0 commit comments