summaryrefslogtreecommitdiff
path: root/share/man/man9
diff options
context:
space:
mode:
authorDamien Miller <djm@cvs.openbsd.org>2008-06-09 16:00:54 +0000
committerDamien Miller <djm@cvs.openbsd.org>2008-06-09 16:00:54 +0000
commit247e591286ecf02c6728dc72b0ed2bc168d52464 (patch)
treeb8b2e2339182b003be59640edc3d705ca08790a1 /share/man/man9
parent56939efa355c7d584cd75c900aac071690574a7b (diff)
man bits for arc4random_bytes => arc4random_buf rename; ok deraadt@
Diffstat (limited to 'share/man/man9')
-rw-r--r--share/man/man9/Makefile4
-rw-r--r--share/man/man9/random.98
2 files changed, 6 insertions, 6 deletions
diff --git a/share/man/man9/Makefile b/share/man/man9/Makefile
index da1dfd6426c..a225b20df2e 100644
--- a/share/man/man9/Makefile
+++ b/share/man/man9/Makefile
@@ -1,4 +1,4 @@
-# $OpenBSD: Makefile,v 1.138 2008/03/02 21:29:06 djm Exp $
+# $OpenBSD: Makefile,v 1.139 2008/06/09 16:00:53 djm Exp $
# $NetBSD: Makefile,v 1.4 1996/01/09 03:23:01 thorpej Exp $
# Makefile for section 9 (kernel function and variable) manual pages.
@@ -254,7 +254,7 @@ MLINKS+=random.9 add_true_randomness.9 \
random.9 add_audio_randomness.9 \
random.9 get_random_bytes.9 \
random.9 arc4random.9 \
- random.9 arc4random_bytes.9 \
+ random.9 arc4random_buf.9 \
random.9 arc4random_uniform.9
MLINKS+=rasops.9 rasops_init.9 rasops.9 rasops_reconfig.9
MLINKS+=rssadapt.9 ieee80211_rssadapt_choose.9 \
diff --git a/share/man/man9/random.9 b/share/man/man9/random.9
index b63c3459da1..2246b4fe8be 100644
--- a/share/man/man9/random.9
+++ b/share/man/man9/random.9
@@ -1,4 +1,4 @@
-.\" $OpenBSD: random.9,v 1.24 2008/03/02 22:30:05 djm Exp $
+.\" $OpenBSD: random.9,v 1.25 2008/06/09 16:00:53 djm Exp $
.\"
.\" Copyright (c) 1996,2000 Michael Shalayeff
.\" All rights reserved.
@@ -23,7 +23,7 @@
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
.\"
-.Dd $Mdocdate: March 2 2008 $
+.Dd $Mdocdate: June 9 2008 $
.Dt RND 9
.Os
.Sh NAME
@@ -50,7 +50,7 @@
.Ft u_int32_t
.Fn arc4random "void"
.Ft void
-.Fn arc4random_bytes "void *buf" "size_t nbytes"
+.Fn arc4random_buf "void *buf" "size_t nbytes"
.Ft u_int32_t
.Fn arc4random_uniform "u_int32_t upper_bound"
.Sh DESCRIPTION
@@ -85,7 +85,7 @@ device.
.Pp
.Fn arc4random
and
-.Fn arc4random_bytes
+.Fn arc4random_buf
will give random 32 bit numbers hashed with
the ARC4 algorithm, which appears to be faster and less abusive
to the entropy pool.