Browse Source

Xr random 4 in a better way

OPENBSD_6_6
deraadt 5 years ago
parent
commit
14f0af3230
1 changed files with 5 additions and 3 deletions
  1. +5
    -3
      src/lib/libc/crypt/arc4random.3

+ 5
- 3
src/lib/libc/crypt/arc4random.3 View File

@ -1,4 +1,4 @@
.\" $OpenBSD: arc4random.3,v 1.35 2014/11/25 16:45:24 millert Exp $
.\" $OpenBSD: arc4random.3,v 1.36 2019/09/28 15:00:44 deraadt Exp $
.\"
.\" Copyright 1997 Niels Provos <provos@physnet.uni-hamburg.de>
.\" All rights reserved.
@ -30,7 +30,7 @@
.\"
.\" Manual page, using -mandoc macros
.\"
.Dd $Mdocdate: November 25 2014 $
.Dd $Mdocdate: September 28 2019 $
.Dt ARC4RANDOM 3
.Os
.Sh NAME
@ -68,7 +68,9 @@ On each call, a cryptographic pseudo-random number generator is used
to generate a new result.
One data pool is used for all consumers in a process, so that consumption
under program flow can act as additional stirring.
The subsystem is re-seeded from the kernel random number subsystem using
The subsystem is re-seeded from the kernel
.Xr random 4
subsystem using
.Xr getentropy 2
on a regular basis, and also upon
.Xr fork 2 .


Loading…
Cancel
Save