summaryrefslogtreecommitdiff
path: root/share/man/man8/vpn.8
diff options
context:
space:
mode:
authorKjell Wooding <kjell@cvs.openbsd.org>2000-04-22 20:48:47 +0000
committerKjell Wooding <kjell@cvs.openbsd.org>2000-04-22 20:48:47 +0000
commit4cb8c57181aba96d3b1e0e1a76cdec98ecac3b3a (patch)
tree7b48de8ac3b23e607595012e46789cee80dd54d6 /share/man/man8/vpn.8
parent7322a8fd5127a6230055b7837a52705325737ebb (diff)
Don't be wasteful of entropy when generating keys.
Diffstat (limited to 'share/man/man8/vpn.8')
-rw-r--r--share/man/man8/vpn.86
1 files changed, 3 insertions, 3 deletions
diff --git a/share/man/man8/vpn.8 b/share/man/man8/vpn.8
index ac862e6281a..1b6c367b231 100644
--- a/share/man/man8/vpn.8
+++ b/share/man/man8/vpn.8
@@ -1,4 +1,4 @@
-.\" $OpenBSD: vpn.8,v 1.32 2000/04/22 02:04:23 angelos Exp $
+.\" $OpenBSD: vpn.8,v 1.33 2000/04/22 20:48:46 kjell Exp $
.\" Copyright 1998 Niels Provos <provos@physnet.uni-hamburg.de>
.\" All rights reserved.
.\"
@@ -85,9 +85,9 @@ being unguessable, it is very important that the keys be chosen using a
strong random source. One practical method of generating them
is by using the
.Xr random 4
-device. To produce 160 bits of randomness, for example, do a:
+device. To produce 160 bits (20 bytes) of randomness, for example, do a:
.Bd -literal
- dd if=/dev/urandom bs=1024 count=1 | sha1
+ dd if=/dev/urandom bs=20 count=1 |perl -pe 's/(.)/unpack('H2',)/ges'
.Ed
.Pp
Different cipher types may require different sized keys.