From 262ead3bed927df69498fce93205cf65e19c2062 Mon Sep 17 00:00:00 2001 From: kjell Date: Sat, 22 Apr 2000 20:48:46 +0000 Subject: [PATCH] Don't be wasteful of entropy when generating keys. --- share/man/man8/vpn.8 | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/share/man/man8/vpn.8 b/share/man/man8/vpn.8 index ac862e6281a..1b6c367b231 100644 --- a/share/man/man8/vpn.8 +++ b/share/man/man8/vpn.8 @@ -1,4 +1,4 @@ -.\" $OpenBSD: vpn.8,v 1.32 2000/04/22 02:04:23 angelos Exp $ +.\" $OpenBSD: vpn.8,v 1.33 2000/04/22 20:48:46 kjell Exp $ .\" Copyright 1998 Niels Provos .\" All rights reserved. .\" @@ -85,9 +85,9 @@ being unguessable, it is very important that the keys be chosen using a strong random source. One practical method of generating them is by using the .Xr random 4 -device. To produce 160 bits of randomness, for example, do a: +device. To produce 160 bits (20 bytes) of randomness, for example, do a: .Bd -literal - dd if=/dev/urandom bs=1024 count=1 | sha1 + dd if=/dev/urandom bs=20 count=1 |perl -pe 's/(.)/unpack('H2',)/ges' .Ed .Pp Different cipher types may require different sized keys. -- 2.20.1