diff options
author | Damien Miller <djm@cvs.openbsd.org> | 2005-08-01 05:31:50 +0000 |
---|---|---|
committer | Damien Miller <djm@cvs.openbsd.org> | 2005-08-01 05:31:50 +0000 |
commit | 0fd85d9caed3489931a1fa9c2b7520960293653d (patch) | |
tree | a91a7efad0cc571bfd295e04cd7518411b40c3c9 /share/man/man9 | |
parent | 5402133a408cb5f027047857c1d8baf243cb41cf (diff) |
expose arc4random_bytes() API; ok deraadt@
Diffstat (limited to 'share/man/man9')
-rw-r--r-- | share/man/man9/Makefile | 5 | ||||
-rw-r--r-- | share/man/man9/random.9 | 6 |
2 files changed, 8 insertions, 3 deletions
diff --git a/share/man/man9/Makefile b/share/man/man9/Makefile index 09db4bfa948..6c95312b224 100644 --- a/share/man/man9/Makefile +++ b/share/man/man9/Makefile @@ -1,4 +1,4 @@ -# $OpenBSD: Makefile,v 1.98 2005/06/18 00:25:05 jmc Exp $ +# $OpenBSD: Makefile,v 1.99 2005/08/01 05:31:49 djm Exp $ # $NetBSD: Makefile,v 1.4 1996/01/09 03:23:01 thorpej Exp $ # Makefile for section 9 (kernel function and variable) manual pages. @@ -206,7 +206,8 @@ MLINKS+=random.9 add_true_randomness.9 \ random.9 add_disk_randomness.9 \ random.9 add_audio_randomness.9 \ random.9 get_random_bytes.9 \ - random.9 arc4random.9 + random.9 arc4random.9 \ + random.9 arc4random_bytes.9 MLINKS+=rssadapt.9 ieee80211_rssadapt_choose.9 \ rssadapt.9 ieee80211_rssadapt_input.9 \ rssadapt.9 ieee80211_rssadapt_lower_rate.9 \ diff --git a/share/man/man9/random.9 b/share/man/man9/random.9 index 64c25a9fbbd..425abfbd5fc 100644 --- a/share/man/man9/random.9 +++ b/share/man/man9/random.9 @@ -1,4 +1,4 @@ -.\" $OpenBSD: random.9,v 1.19 2004/04/04 13:19:36 jmc Exp $ +.\" $OpenBSD: random.9,v 1.20 2005/08/01 05:31:49 djm Exp $ .\" .\" Copyright (c) 1996,2000 Michael Shalayeff .\" All rights reserved. @@ -49,6 +49,8 @@ .Fn get_random_bytes "void *buf" "size_t nbytes" .Ft u_int32_t .Fn arc4random "void" +.Ft void +.Fn arc4random_bytes "void *buf" "size_t nbytes" .Sh DESCRIPTION The .Fn add_mouse_randomness , @@ -80,6 +82,8 @@ as it would by the device. .Pp .Fn arc4random +and +.Fn arc4random_bytes will give random 32 bit numbers hashed with the ARC4 algorithm, which appears to be faster and less abusive to the entropy pool. |