summaryrefslogtreecommitdiff
path: root/docs/ENVIRONMENT.md
diff options
context:
space:
mode:
authorJason A. Donenfeld <Jason@zx2c4.com>2022-03-06 22:15:44 -0700
committerLuca Boccassi <luca.boccassi@gmail.com>2022-03-14 19:47:13 +0000
commitffa047a03e4c5f6bd3af73b7eecb99cd230fe204 (patch)
treeec7d89170b956d63cb5ac04a4e77251d77aea7bc /docs/ENVIRONMENT.md
parente28770e3674c42365eb22adf35a556e8cccb9bfb (diff)
downloadsystemd-ffa047a03e4c5f6bd3af73b7eecb99cd230fe204.tar.gz
random-util: remove RDRAND usage
/dev/urandom is seeded with RDRAND. Calling genuine_random_bytes(..., ..., 0) will use /dev/urandom as a last resort. Hence, we gain nothing here by having our own RDRAND wrapper, because /dev/urandom already is based on RDRAND output, even before /dev/urandom has fully initialized. Furthermore, RDRAND is not actually fast! And on each successive generation of new x86 CPUs, from both AMD and Intel, it just gets slower. This commit simplifies things by just using /dev/urandom in cases where we before might use RDRAND, since /dev/urandom will always have RDRAND mixed in as part of it. And above where I say "/dev/urandom", what I actually mean is GRND_INSECURE, which is the same thing but won't generate warnings in dmesg.
Diffstat (limited to 'docs/ENVIRONMENT.md')
-rw-r--r--docs/ENVIRONMENT.md3
1 files changed, 0 insertions, 3 deletions
diff --git a/docs/ENVIRONMENT.md b/docs/ENVIRONMENT.md
index 1391e9642e..5477110bcc 100644
--- a/docs/ENVIRONMENT.md
+++ b/docs/ENVIRONMENT.md
@@ -97,9 +97,6 @@ All tools:
systems built with libxcrypt and is ignored on systems using glibc's
original, internal `crypt()` implementation.)
-* `$SYSTEMD_RDRAND=0` — if set, the RDRAND instruction will never be used,
- even if the CPU supports it.
-
* `$SYSTEMD_SECCOMP=0` — if set, seccomp filters will not be enforced, even if
support for it is compiled in and available in the kernel.