From cb0f55a4b829d9f2198b10c224a4ca626de7ded3 Mon Sep 17 00:00:00 2001 From: Sebastian Huber Date: Thu, 26 Apr 2018 09:05:20 +0200 Subject: Update due to BSP source reorganization This patch is a part of the BSP source reorganization. Close #3285. --- bsp-howto/getentropy.rst | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'bsp-howto/getentropy.rst') diff --git a/bsp-howto/getentropy.rst b/bsp-howto/getentropy.rst index 10303a3..840ba1e 100644 --- a/bsp-howto/getentropy.rst +++ b/bsp-howto/getentropy.rst @@ -31,10 +31,10 @@ that can only be reached with some extra hardware support. Some microcontrollers integrate a true random number generator or something similar for cryptographic applications. That is the preferred source of entropy for most BSPs. For example the -`atsam BSP uses the TRNG for its entropy source `_. +`atsam BSP uses the TRNG for its entropy source `_. There is also a quite limited -`default implementation based on the CPU counter `_. +`default implementation based on the CPU counter `_. Due to the fact that it is a time based source, the values provided by :c:func:`getentropy` are quite predictable. This implementation is not appropriate for any cryptographic applications but it is good enough for some -- cgit v1.2.3