Browse Source

punctuation and minor rewording, ok jmc

OPENBSD_3_8
jaredy 19 years ago
parent
commit
9598fd3fc1
2 changed files with 6 additions and 6 deletions
  1. +2
    -2
      src/lib/libc/crypt/arc4random.3
  2. +4
    -4
      src/lib/libc/crypt/blowfish.3

+ 2
- 2
src/lib/libc/crypt/arc4random.3 View File

@ -1,4 +1,4 @@
.\" $OpenBSD: arc4random.3,v 1.18 2005/06/07 19:04:58 kjell Exp $
.\" $OpenBSD: arc4random.3,v 1.19 2005/07/17 08:50:55 jaredy Exp $
.\" .\"
.\" Copyright 1997 Niels Provos <provos@physnet.uni-hamburg.de> .\" Copyright 1997 Niels Provos <provos@physnet.uni-hamburg.de>
.\" All rights reserved. .\" All rights reserved.
@ -59,7 +59,7 @@ On each call, an ARC4 generator is used to generate a new result.
The The
.Fn arc4random .Fn arc4random
function uses the ARC4 cipher key stream generator, function uses the ARC4 cipher key stream generator,
which uses 8*8 8 bit S-Boxes.
which uses 8*8 8-bit S-Boxes.
The S-Boxes can be in about (2**1700) states. The S-Boxes can be in about (2**1700) states.
.Pp .Pp
.Fn arc4random .Fn arc4random


+ 4
- 4
src/lib/libc/crypt/blowfish.3 View File

@ -1,4 +1,4 @@
.\" $OpenBSD: blowfish.3,v 1.12 2003/08/28 12:35:00 jmc Exp $
.\" $OpenBSD: blowfish.3,v 1.13 2005/07/17 08:50:55 jaredy Exp $
.\" .\"
.\" Copyright 1997 Niels Provos <provos@physnet.uni-hamburg.de> .\" Copyright 1997 Niels Provos <provos@physnet.uni-hamburg.de>
.\" All rights reserved. .\" All rights reserved.
@ -57,12 +57,12 @@
.Sh DESCRIPTION .Sh DESCRIPTION
.Pa Blowfish .Pa Blowfish
is a fast unpatented block cipher designed by Bruce Schneier. is a fast unpatented block cipher designed by Bruce Schneier.
It basically consists of a 16 times iterated Feistel network.
The block size is 64 bit and the maximum key size is 448 bit.
It basically consists of a 16-round Feistel network.
The block size is 64 bits and the maximum key size is 448 bits.
.Pp .Pp
The The
.Fn blf_key .Fn blf_key
function initializes the 4 8bit S-boxes and the 18 Subkeys with
function initializes the 4 8-bit S-boxes and the 18 Subkeys with
the hexadecimal digits of Pi. the hexadecimal digits of Pi.
The key is used for further randomization. The key is used for further randomization.
The first argument to The first argument to


Loading…
Cancel
Save