diff options
author | 2005-07-17 08:50:55 +0000 | |
---|---|---|
committer | 2005-07-17 08:50:55 +0000 | |
commit | d71e9523fb5556b2da35bf9ea1bd73b67b62c811 (patch) | |
tree | e303e91c5f3a98d2ae4e6702bfa7187adf3774e1 /lib/libc/crypt | |
parent | Implement an ``enable/disable echo'' option, defaults to off. (diff) | |
download | wireguard-openbsd-d71e9523fb5556b2da35bf9ea1bd73b67b62c811.tar.xz wireguard-openbsd-d71e9523fb5556b2da35bf9ea1bd73b67b62c811.zip |
punctuation and minor rewording, ok jmc
Diffstat (limited to 'lib/libc/crypt')
-rw-r--r-- | lib/libc/crypt/arc4random.3 | 4 | ||||
-rw-r--r-- | lib/libc/crypt/blowfish.3 | 8 |
2 files changed, 6 insertions, 6 deletions
diff --git a/lib/libc/crypt/arc4random.3 b/lib/libc/crypt/arc4random.3 index bd2a371a18d..fd127439bcf 100644 --- a/lib/libc/crypt/arc4random.3 +++ b/lib/libc/crypt/arc4random.3 @@ -1,4 +1,4 @@ -.\" $OpenBSD: arc4random.3,v 1.18 2005/06/07 19:04:58 kjell Exp $ +.\" $OpenBSD: arc4random.3,v 1.19 2005/07/17 08:50:55 jaredy Exp $ .\" .\" Copyright 1997 Niels Provos <provos@physnet.uni-hamburg.de> .\" All rights reserved. @@ -59,7 +59,7 @@ On each call, an ARC4 generator is used to generate a new result. The .Fn arc4random function uses the ARC4 cipher key stream generator, -which uses 8*8 8 bit S-Boxes. +which uses 8*8 8-bit S-Boxes. The S-Boxes can be in about (2**1700) states. .Pp .Fn arc4random diff --git a/lib/libc/crypt/blowfish.3 b/lib/libc/crypt/blowfish.3 index 44f7eb2bbf7..4ee2fd2c2d8 100644 --- a/lib/libc/crypt/blowfish.3 +++ b/lib/libc/crypt/blowfish.3 @@ -1,4 +1,4 @@ -.\" $OpenBSD: blowfish.3,v 1.12 2003/08/28 12:35:00 jmc Exp $ +.\" $OpenBSD: blowfish.3,v 1.13 2005/07/17 08:50:55 jaredy Exp $ .\" .\" Copyright 1997 Niels Provos <provos@physnet.uni-hamburg.de> .\" All rights reserved. @@ -57,12 +57,12 @@ .Sh DESCRIPTION .Pa Blowfish is a fast unpatented block cipher designed by Bruce Schneier. -It basically consists of a 16 times iterated Feistel network. -The block size is 64 bit and the maximum key size is 448 bit. +It basically consists of a 16-round Feistel network. +The block size is 64 bits and the maximum key size is 448 bits. .Pp The .Fn blf_key -function initializes the 4 8bit S-boxes and the 18 Subkeys with +function initializes the 4 8-bit S-boxes and the 18 Subkeys with the hexadecimal digits of Pi. The key is used for further randomization. The first argument to |