diff options
author | deraadt <> | 2019-09-28 15:00:44 +0000 |
---|---|---|
committer | deraadt <> | 2019-09-28 15:00:44 +0000 |
commit | 6d64f4945aa38e327699e34de8fd7f86fdb0008b (patch) | |
tree | 45aa2f66fd13cb6cfc5a099bb6d4735afb6deb09 | |
parent | 4c3c86f8ec24b0a9743047e6964185608aef6f2d (diff) | |
download | openbsd-6d64f4945aa38e327699e34de8fd7f86fdb0008b.tar.gz openbsd-6d64f4945aa38e327699e34de8fd7f86fdb0008b.tar.bz2 openbsd-6d64f4945aa38e327699e34de8fd7f86fdb0008b.zip |
Xr random 4 in a better way
-rw-r--r-- | src/lib/libc/crypt/arc4random.3 | 8 |
1 files changed, 5 insertions, 3 deletions
diff --git a/src/lib/libc/crypt/arc4random.3 b/src/lib/libc/crypt/arc4random.3 index fd0185707f..2bc7dd0d00 100644 --- a/src/lib/libc/crypt/arc4random.3 +++ b/src/lib/libc/crypt/arc4random.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: arc4random.3,v 1.35 2014/11/25 16:45:24 millert Exp $ | 1 | .\" $OpenBSD: arc4random.3,v 1.36 2019/09/28 15:00:44 deraadt Exp $ |
2 | .\" | 2 | .\" |
3 | .\" Copyright 1997 Niels Provos <provos@physnet.uni-hamburg.de> | 3 | .\" Copyright 1997 Niels Provos <provos@physnet.uni-hamburg.de> |
4 | .\" All rights reserved. | 4 | .\" All rights reserved. |
@@ -30,7 +30,7 @@ | |||
30 | .\" | 30 | .\" |
31 | .\" Manual page, using -mandoc macros | 31 | .\" Manual page, using -mandoc macros |
32 | .\" | 32 | .\" |
33 | .Dd $Mdocdate: November 25 2014 $ | 33 | .Dd $Mdocdate: September 28 2019 $ |
34 | .Dt ARC4RANDOM 3 | 34 | .Dt ARC4RANDOM 3 |
35 | .Os | 35 | .Os |
36 | .Sh NAME | 36 | .Sh NAME |
@@ -68,7 +68,9 @@ On each call, a cryptographic pseudo-random number generator is used | |||
68 | to generate a new result. | 68 | to generate a new result. |
69 | One data pool is used for all consumers in a process, so that consumption | 69 | One data pool is used for all consumers in a process, so that consumption |
70 | under program flow can act as additional stirring. | 70 | under program flow can act as additional stirring. |
71 | The subsystem is re-seeded from the kernel random number subsystem using | 71 | The subsystem is re-seeded from the kernel |
72 | .Xr random 4 | ||
73 | subsystem using | ||
72 | .Xr getentropy 2 | 74 | .Xr getentropy 2 |
73 | on a regular basis, and also upon | 75 | on a regular basis, and also upon |
74 | .Xr fork 2 . | 76 | .Xr fork 2 . |