diff options
author | Kjell Wooding <kjell@cvs.openbsd.org> | 2000-04-22 20:48:47 +0000 |
---|---|---|
committer | Kjell Wooding <kjell@cvs.openbsd.org> | 2000-04-22 20:48:47 +0000 |
commit | 4cb8c57181aba96d3b1e0e1a76cdec98ecac3b3a (patch) | |
tree | 7b48de8ac3b23e607595012e46789cee80dd54d6 /share/man/man8/vpn.8 | |
parent | 7322a8fd5127a6230055b7837a52705325737ebb (diff) |
Don't be wasteful of entropy when generating keys.
Diffstat (limited to 'share/man/man8/vpn.8')
-rw-r--r-- | share/man/man8/vpn.8 | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/share/man/man8/vpn.8 b/share/man/man8/vpn.8 index ac862e6281a..1b6c367b231 100644 --- a/share/man/man8/vpn.8 +++ b/share/man/man8/vpn.8 @@ -1,4 +1,4 @@ -.\" $OpenBSD: vpn.8,v 1.32 2000/04/22 02:04:23 angelos Exp $ +.\" $OpenBSD: vpn.8,v 1.33 2000/04/22 20:48:46 kjell Exp $ .\" Copyright 1998 Niels Provos <provos@physnet.uni-hamburg.de> .\" All rights reserved. .\" @@ -85,9 +85,9 @@ being unguessable, it is very important that the keys be chosen using a strong random source. One practical method of generating them is by using the .Xr random 4 -device. To produce 160 bits of randomness, for example, do a: +device. To produce 160 bits (20 bytes) of randomness, for example, do a: .Bd -literal - dd if=/dev/urandom bs=1024 count=1 | sha1 + dd if=/dev/urandom bs=20 count=1 |perl -pe 's/(.)/unpack('H2',)/ges' .Ed .Pp Different cipher types may require different sized keys. |