diff options
Diffstat (limited to '')
| -rw-r--r-- | src/lib/libc/crypt/arc4random.3 | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/src/lib/libc/crypt/arc4random.3 b/src/lib/libc/crypt/arc4random.3 index 988de1d0f6..b10115c4d8 100644 --- a/src/lib/libc/crypt/arc4random.3 +++ b/src/lib/libc/crypt/arc4random.3 | |||
| @@ -1,4 +1,4 @@ | |||
| 1 | .\" $OpenBSD: arc4random.3,v 1.10 1999/07/04 18:59:42 aaron Exp $ | 1 | .\" $OpenBSD: arc4random.3,v 1.11 1999/07/09 13:35:15 aaron Exp $ |
| 2 | .\" Copyright 1997 Niels Provos <provos@physnet.uni-hamburg.de> | 2 | .\" Copyright 1997 Niels Provos <provos@physnet.uni-hamburg.de> |
| 3 | .\" All rights reserved. | 3 | .\" All rights reserved. |
| 4 | .\" | 4 | .\" |
| @@ -47,19 +47,19 @@ | |||
| 47 | .Fn arc4random_addrandom "u_char *dat" "int datlen" | 47 | .Fn arc4random_addrandom "u_char *dat" "int datlen" |
| 48 | .Sh DESCRIPTION | 48 | .Sh DESCRIPTION |
| 49 | The | 49 | The |
| 50 | .Fn arc4random | 50 | .Fn arc4random |
| 51 | function uses the key stream generator employed by the | 51 | function uses the key stream generator employed by the |
| 52 | arc4 cipher, which uses 8*8 8 bit S-Boxes. The S-Boxes | 52 | arc4 cipher, which uses 8*8 8 bit S-Boxes. The S-Boxes |
| 53 | can be in about (2**1700) states. | 53 | can be in about (2**1700) states. |
| 54 | .Pp | 54 | .Pp |
| 55 | The | 55 | The |
| 56 | .Fn arc4random_stir | 56 | .Fn arc4random_stir |
| 57 | function reads data from | 57 | function reads data from |
| 58 | .Pa /dev/arandom | 58 | .Pa /dev/arandom |
| 59 | and uses it to permute the S-Boxes via | 59 | and uses it to permute the S-Boxes via |
| 60 | .Fn arc4random_addrandom . | 60 | .Fn arc4random_addrandom . |
| 61 | .Pp | 61 | .Pp |
| 62 | There is no need to call | 62 | There is no need to call |
| 63 | .Fn arc4random_stir | 63 | .Fn arc4random_stir |
| 64 | before using | 64 | before using |
| 65 | .Fn arc4random , | 65 | .Fn arc4random , |
| @@ -72,7 +72,7 @@ automatically initializes itself. | |||
| 72 | .Xr random 3 | 72 | .Xr random 3 |
| 73 | .Sh HISTORY | 73 | .Sh HISTORY |
| 74 | An algorithm call | 74 | An algorithm call |
| 75 | .Pa RC4 | 75 | .Pa RC4 |
| 76 | was designed by RSA Data Security, Inc. It was considered a trade secret, | 76 | was designed by RSA Data Security, Inc. It was considered a trade secret, |
| 77 | but not trademarked. | 77 | but not trademarked. |
| 78 | A clone of this was posted anonymously to the USENET and was confirmed to | 78 | A clone of this was posted anonymously to the USENET and was confirmed to |
| @@ -81,5 +81,5 @@ Because of the trade secret situation, RSA Data Security, Inc. can do | |||
| 81 | nothing about the situation. | 81 | nothing about the situation. |
| 82 | Since | 82 | Since |
| 83 | .Pa RC4 | 83 | .Pa RC4 |
| 84 | used to be a trade secret, the cipher is now referred to as | 84 | used to be a trade secret, the cipher is now referred to as |
| 85 | .Pa ARC4 . | 85 | .Pa ARC4 . |
