From 70f23e475b23af25e2035e2b5cfe1f5a8a7ea9f9 Mon Sep 17 00:00:00 2001 From: Sebastian Huber Date: Mon, 20 Nov 2017 08:08:30 +0100 Subject: Clarify INTERNAL_ERROR_ARC4RANDOM_GETENTROPY_FAIL Update #3239. --- bsp-howto/getentropy.rst | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) (limited to 'bsp-howto') diff --git a/bsp-howto/getentropy.rst b/bsp-howto/getentropy.rst index b460450..10303a3 100644 --- a/bsp-howto/getentropy.rst +++ b/bsp-howto/getentropy.rst @@ -21,7 +21,10 @@ turn are used by various cryptographic functions. suitable for such applications. The :c:func:`getentropy` implementation must fill the specified memory region -of the given size with random numbers and return 0 on success. +of the given size with random numbers and return 0 on success. A non-zero +return may cause the :c:macro:`INTERNAL_ERROR_ARC4RANDOM_GETENTROPY_FAIL` +internal error by one of the +`ARC4RANDOM(3) `_ functions. In general, for embedded systems it is not easy to get some real entropy. Normally, that can only be reached with some extra hardware support. Some microcontrollers -- cgit v1.2.3