diff options
author | Neal H. Walfield <[email protected]> | 2016-02-02 10:50:08 +0000 |
---|---|---|
committer | Neal H. Walfield <[email protected]> | 2016-02-02 10:50:52 +0000 |
commit | 75311cfe18071b94c66121a9785b133b6df345a3 (patch) | |
tree | 52d39f052ed874c9743239777c9d6a7c1f294b25 | |
parent | scd: Fix size_t/int mismatch in libusb (diff) | |
download | gnupg-75311cfe18071b94c66121a9785b133b6df345a3.tar.gz gnupg-75311cfe18071b94c66121a9785b133b6df345a3.zip |
doc: Note that rngd can also be used to quickly generate insecure keys.
* doc/gpg-agent.texi (Agent Options): Add comment to the description
of --debug-quick-random that rngd can also be used to quickly generate
key.
--
Signed-off-by: Neal H. Walfield <[email protected]>
Diffstat (limited to '')
-rw-r--r-- | doc/gpg-agent.texi | 8 |
1 files changed, 7 insertions, 1 deletions
diff --git a/doc/gpg-agent.texi b/doc/gpg-agent.texi index f4da9cfdc..5a387d42a 100644 --- a/doc/gpg-agent.texi +++ b/doc/gpg-agent.texi @@ -243,9 +243,15 @@ debugger. This option inhibits the use of the very secure random quality level (Libgcrypt’s @code{GCRY_VERY_STRONG_RANDOM}) and degrades all request down to standard random quality. It is only used for testing and -shall not be used for any production quality keys. This option is +should not be used for any production quality keys. This option is only effective when given on the command line. +On GNU/Linux, another way to quickly generate insecure keys is to use +@command{rngd} to fill the kernel's entropy pool with lower quality +random data. @command{rngd} is typically provided by the +@command{rng-tools} package. It can be run as follows: @samp{sudo +rngd -f -r /dev/urandom}. + @item --debug-pinentry @opindex debug-pinentry This option enables extra debug information pertaining to the |