From 252fddba6cd7431db7cbd8a677bb52860ef5ba0a Mon Sep 17 00:00:00 2001
From: rcritten <>
Date: Mon, 3 Oct 2005 14:59:26 +0000
Subject: Add support for seeding the NSS Random Number Generator. This adds a
new directive, NSSRandomSeed based on the mod_ssl SSLRandomSeed directive.
---
docs/mod_nss.html | 30 +++++++++++++++++++++++++++++-
1 file changed, 29 insertions(+), 1 deletion(-)
(limited to 'docs')
diff --git a/docs/mod_nss.html b/docs/mod_nss.html
index 7d6f5f1..71d1ada 100644
--- a/docs/mod_nss.html
+++ b/docs/mod_nss.html
@@ -249,7 +249,6 @@ to verify that the migration was successful.
NSSSession3CacheTimeout 86400builtin: Combines the current system time, the
+current process id
+and a randomly choosen 128-byte extract of the process stack. This is
+not a particularly strong source of entropy.file:/path/to/source: Reads from the specified file.
+If the number of bytes to read is specified it just reads that amount.
+Be aware that some operating systems block on /dev/random if not enough
+entropy is available. This means that the server will wait until that
+data is available to continue startup. These systems generally offer a
+non-blocking device as well, /dev/urandom.exec:/path/to/program: Executes the given program and takes
+the stdout of it as the entryop. If the bytes argument is included it
+reads that many bytes, otherwise it reads until the program exits.NSSRandomSeed startup builtin
+NSSRandomSeed startup /dev/urandom 512
+NSSRandomSeed startup /usr/bin/makerandom