summaryrefslogtreecommitdiffstats
path: root/po/es/man4/random.4.po
diff options
context:
space:
mode:
Diffstat (limited to 'po/es/man4/random.4.po')
-rw-r--r--po/es/man4/random.4.po699
1 files changed, 699 insertions, 0 deletions
diff --git a/po/es/man4/random.4.po b/po/es/man4/random.4.po
new file mode 100644
index 00000000..7ce43ef6
--- /dev/null
+++ b/po/es/man4/random.4.po
@@ -0,0 +1,699 @@
+# Spanish translation of manpages
+# This file is distributed under the same license as the manpages-l10n package.
+# Copyright © of this file:
+# Juan Piernas <piernas@ditec.um.es>, 1998-1999.
+msgid ""
+msgstr ""
+"Project-Id-Version: manpages-l10n\n"
+"POT-Creation-Date: 2024-03-01 17:05+0100\n"
+"PO-Revision-Date: 1999-06-26 19:53+0200\n"
+"Last-Translator: Juan Piernas <piernas@ditec.um.es>\n"
+"Language-Team: Spanish <debian-l10n-spanish@lists.debian.org>\n"
+"Language: es\n"
+"MIME-Version: 1.0\n"
+"Content-Type: text/plain; charset=UTF-8\n"
+"Content-Transfer-Encoding: 8bit\n"
+"Plural-Forms: nplurals=2; plural=(n != 1);\n"
+"X-Generator: Lokalize 20.04.1\n"
+
+#. type: TH
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, fuzzy, no-wrap
+#| msgid "I</dev/random>"
+msgid "random"
+msgstr "I</dev/random>"
+
+#. type: TH
+#: archlinux fedora-40 fedora-rawhide mageia-cauldron
+#, no-wrap
+msgid "2023-10-31"
+msgstr "31 Octubre 2023"
+
+#. type: TH
+#: archlinux fedora-40 fedora-rawhide mageia-cauldron
+#, no-wrap
+msgid "Linux man-pages 6.06"
+msgstr "Páginas de manual de Linux 6.06"
+
+#. type: SH
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "NAME"
+msgstr "NOMBRE"
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid "random, urandom - kernel random number source devices"
+msgstr ""
+"random, urandom - dispositivos de la fuente de números aleatorios del núcleo"
+
+#. type: SH
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "SYNOPSIS"
+msgstr "SINOPSIS"
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, fuzzy, no-wrap
+#| msgid "#include E<lt>linux/random.hE<gt>"
+msgid "#include E<lt>linux/random.hE<gt>\n"
+msgstr "#include E<lt>linux/random.hE<gt>"
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, fuzzy, no-wrap
+#| msgid "B<int ioctl(>I<fd>B<, RND>I<request>B<, >I<param>B<);>"
+msgid "B<int ioctl(>I<fd>B<, RND>I<request>B<, >I<param>B<);>\n"
+msgstr "B<int ioctl(>I<fd>B<, RND>I<request>B<, >I<param>B<);>"
+
+#. type: SH
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "DESCRIPTION"
+msgstr "DESCRIPCIÓN"
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"The character special files I</dev/random> and I</dev/urandom> (present "
+"since Linux 1.3.30) provide an interface to the kernel's random number "
+"generator. The file I</dev/random> has major device number 1 and minor "
+"device number 8. The file I</dev/urandom> has major device number 1 and "
+"minor device number 9."
+msgstr ""
+"Los ficheros especiales de caracteres I</dev/random> y I</dev/urandom> "
+"(presente desde la versión 1.3.30 de Linux) proporcionan una interfaz con el "
+"generador de números aleatorios del núcleo. El fichero I</dev/random> tiene "
+"1 como número major de dispositivo y 8 como número menor de dispositivo. El "
+"fichero I</dev/urandom> tiene 1 como número major de dispositivo y 9 como "
+"número menor de dispositivo."
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"The random number generator gathers environmental noise from device drivers "
+"and other sources into an entropy pool. The generator also keeps an "
+"estimate of the number of bits of noise in the entropy pool. From this "
+"entropy pool, random numbers are created."
+msgstr ""
+"El generador de números aleatorios recoge el ruido ambiental procedente de "
+"los manejadores de dispositivo y otras fuentes y lo guarda en un \"almacen "
+"de entropía\". El generador también mantiene una estimación del número de "
+"bits de ruído en el almacen de entropía. Los números aleatorios se crean a "
+"partir de este almacen."
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"Linux 3.17 and later provides the simpler and safer B<getrandom>(2) "
+"interface which requires no special files; see the B<getrandom>(2) manual "
+"page for details."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"When read, the I</dev/urandom> device returns random bytes using a "
+"pseudorandom number generator seeded from the entropy pool. Reads from this "
+"device do not block (i.e., the CPU is not yielded), but can incur an "
+"appreciable delay when requesting large amounts of data."
+msgstr ""
+
+#. This is a real problem; see
+#. commit 9b4d008787f864f17d008c9c15bbe8a0f7e2fc24
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"When read during early boot time, I</dev/urandom> may return data prior to "
+"the entropy pool being initialized. If this is of concern in your "
+"application, use B<getrandom>(2) or I</dev/random> instead."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"The I</dev/random> device is a legacy interface which dates back to a time "
+"where the cryptographic primitives used in the implementation of I</dev/"
+"urandom> were not widely trusted. It will return random bytes only within "
+"the estimated number of bits of fresh noise in the entropy pool, blocking if "
+"necessary. I</dev/random> is suitable for applications that need high "
+"quality randomness, and can afford indeterminate delays."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"When the entropy pool is empty, reads from I</dev/random> will block until "
+"additional environmental noise is gathered. Since Linux 5.6, the "
+"B<O_NONBLOCK> flag is ignored as I</dev/random> will no longer block except "
+"during early boot process. In earlier versions, if B<open>(2) is called "
+"for I</dev/random> with the B<O_NONBLOCK> flag, a subsequent B<read>(2) "
+"will not block if the requested number of bytes is not available. Instead, "
+"the available bytes are returned. If no byte is available, B<read>(2) will "
+"return -1 and I<errno> will be set to B<EAGAIN>."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"The B<O_NONBLOCK> flag has no effect when opening I</dev/urandom>. When "
+"calling B<read>(2) for the device I</dev/urandom>, reads of up to 256 bytes "
+"will return as many bytes as are requested and will not be interrupted by a "
+"signal handler. Reads with a buffer over this limit may return less than "
+"the requested number of bytes or fail with the error B<EINTR>, if "
+"interrupted by a signal handler."
+msgstr ""
+
+#. commit 79a8468747c5f95ed3d5ce8376a3e82e0c5857fc
+#. SEC_XFER_SIZE in drivers/char/random.c
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"Since Linux 3.16, a B<read>(2) from I</dev/urandom> will return at most "
+"32\\ MB. A B<read>(2) from I</dev/random> will return at most 512 bytes "
+"(340 bytes before Linux 2.6.12)."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"Writing to I</dev/random> or I</dev/urandom> will update the entropy pool "
+"with the data written, but this will not result in a higher entropy count. "
+"This means that it will impact the contents read from both files, but it "
+"will not make reads from I</dev/random> faster."
+msgstr ""
+
+#. type: SS
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "Usage"
+msgstr "Modo de empleo"
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"The I</dev/random> interface is considered a legacy interface, and I</dev/"
+"urandom> is preferred and sufficient in all use cases, with the exception of "
+"applications which require randomness during early boot time; for these "
+"applications, B<getrandom>(2) must be used instead, because it will block "
+"until the entropy pool is initialized."
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"If a seed file is saved across reboots as recommended below, the output is "
+"cryptographically secure against attackers without local root access as soon "
+"as it is reloaded in the boot sequence, and perfectly adequate for network "
+"encryption session keys. (All major Linux distributions have saved the seed "
+"file across reboots since 2000 at least.) Since reads from I</dev/random> "
+"may block, users will usually want to open it in nonblocking mode (or "
+"perform a read with timeout), and provide some sort of user notification if "
+"the desired entropy is not immediately available."
+msgstr ""
+
+#. type: SS
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "Configuration"
+msgstr "Configuración"
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"If your system does not have I</dev/random> and I</dev/urandom> created "
+"already, they can be created with the following commands:"
+msgstr ""
+"Si en su sistema no existen todavía I</dev/random> y I</dev/urandom>, puede "
+"crearlos con las siguientes órdenes:"
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid ""
+"mknod -m 666 /dev/random c 1 8\n"
+"mknod -m 666 /dev/urandom c 1 9\n"
+"chown root:root /dev/random /dev/urandom\n"
+msgstr ""
+"mknod -m 666 /dev/random c 1 8\n"
+"mknod -m 666 /dev/urandom c 1 9\n"
+"chown root:root /dev/random /dev/urandom\n"
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"When a Linux system starts up without much operator interaction, the entropy "
+"pool may be in a fairly predictable state. This reduces the actual amount "
+"of noise in the entropy pool below the estimate. In order to counteract "
+"this effect, it helps to carry entropy pool information across shut-downs "
+"and start-ups. To do this, add the lines to an appropriate script which is "
+"run during the Linux system start-up sequence:"
+msgstr ""
+"Cuando un sistema Linux arranca sin mucha interación del operador, el "
+"almacen de entropía puede estar en un estado bastante predecible. Esto "
+"reduce la cantidad actual de ruido en el almacen de entropía por debajo de "
+"lo recomendado. Para contrarestar este efecto, podemos conservar la "
+"información del almacen de entropía entre las paradas y arranques del "
+"sistema. Para hacer esto, añada las líneas a un guión shell adecuado que se "
+"ejecute durante la secuencia de arranque del sistema Linux:"
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid ""
+"echo \"Initializing random number generator...\"\n"
+"random_seed=/var/run/random-seed\n"
+"# Carry a random seed from start-up to start-up\n"
+"# Load and then save the whole entropy pool\n"
+"if [ -f $random_seed ]; then\n"
+" cat $random_seed E<gt>/dev/urandom\n"
+"else\n"
+" touch $random_seed\n"
+"fi\n"
+"chmod 600 $random_seed\n"
+"poolfile=/proc/sys/kernel/random/poolsize\n"
+"[ -r $poolfile ] && bits=$(cat $poolfile) || bits=4096\n"
+"bytes=$(expr $bits / 8)\n"
+"dd if=/dev/urandom of=$random_seed count=1 bs=$bytes\n"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"Also, add the following lines in an appropriate script which is run during "
+"the Linux system shutdown:"
+msgstr ""
+"También, añada las siguientes líneas a un guión shell apropiado que se "
+"ejecute durante la parada del sistema Linux:"
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid ""
+"# Carry a random seed from shut-down to start-up\n"
+"# Save the whole entropy pool\n"
+"echo \"Saving random seed...\"\n"
+"random_seed=/var/run/random-seed\n"
+"touch $random_seed\n"
+"chmod 600 $random_seed\n"
+"poolfile=/proc/sys/kernel/random/poolsize\n"
+"[ -r $poolfile ] && bits=$(cat $poolfile) || bits=4096\n"
+"bytes=$(expr $bits / 8)\n"
+"dd if=/dev/urandom of=$random_seed count=1 bs=$bytes\n"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"In the above examples, we assume Linux 2.6.0 or later, where I</proc/sys/"
+"kernel/random/poolsize> returns the size of the entropy pool in bits (see "
+"below)."
+msgstr ""
+
+#. type: SS
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "/proc interfaces"
+msgstr "Interfaces /proc"
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"The files in the directory I</proc/sys/kernel/random> (present since Linux "
+"2.3.16) provide additional information about the I</dev/random> device:"
+msgstr ""
+
+#. type: TP
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "I<entropy_avail>"
+msgstr "I<entropy_avail>"
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"This read-only file gives the available entropy, in bits. This will be a "
+"number in the range 0 to 4096."
+msgstr ""
+
+#. type: TP
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "I<poolsize>"
+msgstr "I<poolsize>"
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"This file gives the size of the entropy pool. The semantics of this file "
+"vary across kernel versions:"
+msgstr ""
+
+#. type: TP
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "Linux 2.4:"
+msgstr "Linux 2.4:"
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"This file gives the size of the entropy pool in I<bytes>. Normally, this "
+"file will have the value 512, but it is writable, and can be changed to any "
+"value for which an algorithm is available. The choices are 32, 64, 128, "
+"256, 512, 1024, or 2048."
+msgstr ""
+
+#. type: TP
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "Linux 2.6 and later:"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"This file is read-only, and gives the size of the entropy pool in I<bits>. "
+"It contains the value 4096."
+msgstr ""
+
+#. type: TP
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "I<read_wakeup_threshold>"
+msgstr "I<read_wakeup_threshold>"
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"This file contains the number of bits of entropy required for waking up "
+"processes that sleep waiting for entropy from I</dev/random>. The default "
+"is 64."
+msgstr ""
+
+#. type: TP
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "I<write_wakeup_threshold>"
+msgstr "I<write_wakeup_threshold>"
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"This file contains the number of bits of entropy below which we wake up "
+"processes that do a B<select>(2) or B<poll>(2) for write access to I</dev/"
+"random>. These values can be changed by writing to the files."
+msgstr ""
+
+#. type: TP
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "I<uuid> and I<boot_id>"
+msgstr "I<uuid> y I<boot_id>"
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"These read-only files contain random strings like 6fd5a44b-35f4-4ad4-"
+"a9b9-6b9be13e1fe9. The former is generated afresh for each read, the latter "
+"was generated once."
+msgstr ""
+
+#. type: SS
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "ioctl(2) interface"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"The following B<ioctl>(2) requests are defined on file descriptors "
+"connected to either I</dev/random> or I</dev/urandom>. All requests "
+"performed will interact with the input entropy pool impacting both I</dev/"
+"random> and I</dev/urandom>. The B<CAP_SYS_ADMIN> capability is required "
+"for all requests except B<RNDGETENTCNT>."
+msgstr ""
+
+#. type: TP
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "B<RNDGETENTCNT>"
+msgstr "B<RNDGETENTCNT>"
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"Retrieve the entropy count of the input pool, the contents will be the same "
+"as the I<entropy_avail> file under proc. The result will be stored in the "
+"int pointed to by the argument."
+msgstr ""
+
+#. type: TP
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "B<RNDADDTOENTCNT>"
+msgstr "B<RNDADDTOENTCNT>"
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"Increment or decrement the entropy count of the input pool by the value "
+"pointed to by the argument."
+msgstr ""
+
+#. type: TP
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "B<RNDGETPOOL>"
+msgstr "B<RNDGETPOOL>"
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid "Removed in Linux 2.6.9."
+msgstr ""
+
+#. type: TP
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "B<RNDADDENTROPY>"
+msgstr "B<RNDADDENTROPY>"
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"Add some additional entropy to the input pool, incrementing the entropy "
+"count. This differs from writing to I</dev/random> or I</dev/urandom>, "
+"which only adds some data but does not increment the entropy count. The "
+"following structure is used:"
+msgstr ""
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid ""
+"struct rand_pool_info {\n"
+" int entropy_count;\n"
+" int buf_size;\n"
+" __u32 buf[0];\n"
+"};\n"
+msgstr ""
+"struct rand_pool_info {\n"
+" int entropy_count;\n"
+" int buf_size;\n"
+" __u32 buf[0];\n"
+"};\n"
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"Here I<entropy_count> is the value added to (or subtracted from) the entropy "
+"count, and I<buf> is the buffer of size I<buf_size> which gets added to the "
+"entropy pool."
+msgstr ""
+
+#. type: TP
+#: archlinux fedora-40 fedora-rawhide mageia-cauldron
+#, fuzzy, no-wrap
+#| msgid "B<RNDADDTOENTCNT>"
+msgid "B<RNDZAPENTCNT>"
+msgstr "B<RNDADDTOENTCNT>"
+
+#. type: TQ
+#: archlinux fedora-40 fedora-rawhide mageia-cauldron
+#, fuzzy, no-wrap
+#| msgid "B<RNDGETPOOL>"
+msgid "B<RNDCLEARPOOL>"
+msgstr "B<RNDGETPOOL>"
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"Zero the entropy count of all pools and add some system data (such as wall "
+"clock) to the pools."
+msgstr ""
+
+#. type: SH
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "FILES"
+msgstr "ARCHIVOS"
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid "I</dev/random>"
+msgstr "I</dev/random>"
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid "I</dev/urandom>"
+msgstr "I</dev/urandom>"
+
+#. type: SH
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "NOTES"
+msgstr "NOTAS"
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"For an overview and comparison of the various interfaces that can be used to "
+"obtain randomness, see B<random>(7)."
+msgstr ""
+
+#. type: SH
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "BUGS"
+msgstr "ERRORES"
+
+#. .SH AUTHOR
+#. The kernel's random number generator was written by
+#. Theodore Ts'o (tytso@athena.mit.edu).
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid ""
+"During early boot time, reads from I</dev/urandom> may return data prior to "
+"the entropy pool being initialized."
+msgstr ""
+
+#. type: SH
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "SEE ALSO"
+msgstr "VÉASE TAMBIÉN"
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid "B<mknod>(1), B<getrandom>(2), B<random>(7)"
+msgstr "B<mknod>(1), B<getrandom>(2), B<random>(7)"
+
+#. type: Plain text
+#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide
+#: mageia-cauldron opensuse-leap-15-6 opensuse-tumbleweed
+msgid "RFC\\ 1750, \"Randomness Recommendations for Security\""
+msgstr "RFC\\ 1750, \"Randomness Recommendations for Security\""
+
+#. type: TH
+#: debian-bookworm opensuse-leap-15-6
+#, no-wrap
+msgid "2022-12-04"
+msgstr "4 Diciembre 2022"
+
+#. type: TH
+#: debian-bookworm
+#, no-wrap
+msgid "Linux man-pages 6.03"
+msgstr "Páginas de manual de Linux 6.03"
+
+#. type: TP
+#: debian-bookworm debian-unstable opensuse-leap-15-6 opensuse-tumbleweed
+#, no-wrap
+msgid "B<RNDZAPENTCNT>, B<RNDCLEARPOOL>"
+msgstr "B<RNDZAPENTCNT>, B<RNDCLEARPOOL>"
+
+#. type: TH
+#: debian-unstable opensuse-tumbleweed
+#, no-wrap
+msgid "2023-04-18"
+msgstr "18 Abril 2023"
+
+#. type: TH
+#: debian-unstable opensuse-tumbleweed
+#, no-wrap
+msgid "Linux man-pages 6.05.01"
+msgstr "Páginas de manual de Linux 6.05.01"
+
+#. type: TH
+#: opensuse-leap-15-6
+#, no-wrap
+msgid "Linux man-pages 6.04"
+msgstr "Linux man-pages 6.04"