diff options
author | Damien Miller <djm@cvs.openbsd.org> | 2008-06-09 16:00:54 +0000 |
---|---|---|
committer | Damien Miller <djm@cvs.openbsd.org> | 2008-06-09 16:00:54 +0000 |
commit | 247e591286ecf02c6728dc72b0ed2bc168d52464 (patch) | |
tree | b8b2e2339182b003be59640edc3d705ca08790a1 /share/man/man9 | |
parent | 56939efa355c7d584cd75c900aac071690574a7b (diff) |
man bits for arc4random_bytes => arc4random_buf rename; ok deraadt@
Diffstat (limited to 'share/man/man9')
-rw-r--r-- | share/man/man9/Makefile | 4 | ||||
-rw-r--r-- | share/man/man9/random.9 | 8 |
2 files changed, 6 insertions, 6 deletions
diff --git a/share/man/man9/Makefile b/share/man/man9/Makefile index da1dfd6426c..a225b20df2e 100644 --- a/share/man/man9/Makefile +++ b/share/man/man9/Makefile @@ -1,4 +1,4 @@ -# $OpenBSD: Makefile,v 1.138 2008/03/02 21:29:06 djm Exp $ +# $OpenBSD: Makefile,v 1.139 2008/06/09 16:00:53 djm Exp $ # $NetBSD: Makefile,v 1.4 1996/01/09 03:23:01 thorpej Exp $ # Makefile for section 9 (kernel function and variable) manual pages. @@ -254,7 +254,7 @@ MLINKS+=random.9 add_true_randomness.9 \ random.9 add_audio_randomness.9 \ random.9 get_random_bytes.9 \ random.9 arc4random.9 \ - random.9 arc4random_bytes.9 \ + random.9 arc4random_buf.9 \ random.9 arc4random_uniform.9 MLINKS+=rasops.9 rasops_init.9 rasops.9 rasops_reconfig.9 MLINKS+=rssadapt.9 ieee80211_rssadapt_choose.9 \ diff --git a/share/man/man9/random.9 b/share/man/man9/random.9 index b63c3459da1..2246b4fe8be 100644 --- a/share/man/man9/random.9 +++ b/share/man/man9/random.9 @@ -1,4 +1,4 @@ -.\" $OpenBSD: random.9,v 1.24 2008/03/02 22:30:05 djm Exp $ +.\" $OpenBSD: random.9,v 1.25 2008/06/09 16:00:53 djm Exp $ .\" .\" Copyright (c) 1996,2000 Michael Shalayeff .\" All rights reserved. @@ -23,7 +23,7 @@ .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. .\" -.Dd $Mdocdate: March 2 2008 $ +.Dd $Mdocdate: June 9 2008 $ .Dt RND 9 .Os .Sh NAME @@ -50,7 +50,7 @@ .Ft u_int32_t .Fn arc4random "void" .Ft void -.Fn arc4random_bytes "void *buf" "size_t nbytes" +.Fn arc4random_buf "void *buf" "size_t nbytes" .Ft u_int32_t .Fn arc4random_uniform "u_int32_t upper_bound" .Sh DESCRIPTION @@ -85,7 +85,7 @@ device. .Pp .Fn arc4random and -.Fn arc4random_bytes +.Fn arc4random_buf will give random 32 bit numbers hashed with the ARC4 algorithm, which appears to be faster and less abusive to the entropy pool. |