diff options
Diffstat (limited to 'src/lib/libc/crypt/arc4random.3')
-rw-r--r-- | src/lib/libc/crypt/arc4random.3 | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/src/lib/libc/crypt/arc4random.3 b/src/lib/libc/crypt/arc4random.3 index 988de1d0f6..b10115c4d8 100644 --- a/src/lib/libc/crypt/arc4random.3 +++ b/src/lib/libc/crypt/arc4random.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: arc4random.3,v 1.10 1999/07/04 18:59:42 aaron Exp $ | 1 | .\" $OpenBSD: arc4random.3,v 1.11 1999/07/09 13:35:15 aaron Exp $ |
2 | .\" Copyright 1997 Niels Provos <provos@physnet.uni-hamburg.de> | 2 | .\" Copyright 1997 Niels Provos <provos@physnet.uni-hamburg.de> |
3 | .\" All rights reserved. | 3 | .\" All rights reserved. |
4 | .\" | 4 | .\" |
@@ -47,19 +47,19 @@ | |||
47 | .Fn arc4random_addrandom "u_char *dat" "int datlen" | 47 | .Fn arc4random_addrandom "u_char *dat" "int datlen" |
48 | .Sh DESCRIPTION | 48 | .Sh DESCRIPTION |
49 | The | 49 | The |
50 | .Fn arc4random | 50 | .Fn arc4random |
51 | function uses the key stream generator employed by the | 51 | function uses the key stream generator employed by the |
52 | arc4 cipher, which uses 8*8 8 bit S-Boxes. The S-Boxes | 52 | arc4 cipher, which uses 8*8 8 bit S-Boxes. The S-Boxes |
53 | can be in about (2**1700) states. | 53 | can be in about (2**1700) states. |
54 | .Pp | 54 | .Pp |
55 | The | 55 | The |
56 | .Fn arc4random_stir | 56 | .Fn arc4random_stir |
57 | function reads data from | 57 | function reads data from |
58 | .Pa /dev/arandom | 58 | .Pa /dev/arandom |
59 | and uses it to permute the S-Boxes via | 59 | and uses it to permute the S-Boxes via |
60 | .Fn arc4random_addrandom . | 60 | .Fn arc4random_addrandom . |
61 | .Pp | 61 | .Pp |
62 | There is no need to call | 62 | There is no need to call |
63 | .Fn arc4random_stir | 63 | .Fn arc4random_stir |
64 | before using | 64 | before using |
65 | .Fn arc4random , | 65 | .Fn arc4random , |
@@ -72,7 +72,7 @@ automatically initializes itself. | |||
72 | .Xr random 3 | 72 | .Xr random 3 |
73 | .Sh HISTORY | 73 | .Sh HISTORY |
74 | An algorithm call | 74 | An algorithm call |
75 | .Pa RC4 | 75 | .Pa RC4 |
76 | was designed by RSA Data Security, Inc. It was considered a trade secret, | 76 | was designed by RSA Data Security, Inc. It was considered a trade secret, |
77 | but not trademarked. | 77 | but not trademarked. |
78 | A clone of this was posted anonymously to the USENET and was confirmed to | 78 | A clone of this was posted anonymously to the USENET and was confirmed to |
@@ -81,5 +81,5 @@ Because of the trade secret situation, RSA Data Security, Inc. can do | |||
81 | nothing about the situation. | 81 | nothing about the situation. |
82 | Since | 82 | Since |
83 | .Pa RC4 | 83 | .Pa RC4 |
84 | used to be a trade secret, the cipher is now referred to as | 84 | used to be a trade secret, the cipher is now referred to as |
85 | .Pa ARC4 . | 85 | .Pa ARC4 . |