From 14f0af323099c9755be0da87f959c8238b01f1b1 Mon Sep 17 00:00:00 2001 From: deraadt <> Date: Sat, 28 Sep 2019 15:00:44 +0000 Subject: [PATCH] Xr random 4 in a better way --- src/lib/libc/crypt/arc4random.3 | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/src/lib/libc/crypt/arc4random.3 b/src/lib/libc/crypt/arc4random.3 index fd018570..2bc7dd0d 100644 --- a/src/lib/libc/crypt/arc4random.3 +++ b/src/lib/libc/crypt/arc4random.3 @@ -1,4 +1,4 @@ -.\" $OpenBSD: arc4random.3,v 1.35 2014/11/25 16:45:24 millert Exp $ +.\" $OpenBSD: arc4random.3,v 1.36 2019/09/28 15:00:44 deraadt Exp $ .\" .\" Copyright 1997 Niels Provos .\" All rights reserved. @@ -30,7 +30,7 @@ .\" .\" Manual page, using -mandoc macros .\" -.Dd $Mdocdate: November 25 2014 $ +.Dd $Mdocdate: September 28 2019 $ .Dt ARC4RANDOM 3 .Os .Sh NAME @@ -68,7 +68,9 @@ On each call, a cryptographic pseudo-random number generator is used to generate a new result. One data pool is used for all consumers in a process, so that consumption under program flow can act as additional stirring. -The subsystem is re-seeded from the kernel random number subsystem using +The subsystem is re-seeded from the kernel +.Xr random 4 +subsystem using .Xr getentropy 2 on a regular basis, and also upon .Xr fork 2 .