Date: Thu, 23 Aug 2001 02:49:41 -0700 (PDT) From: Joseph Mallett <jmallett@xMach.org> To: freebsd-gnats-submit@freebsd.org Subject: docs/29984: random(4) manpage has typo Message-ID: <200108230949.f7N9nfm28707@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 29984 >Category: docs >Synopsis: random(4) manpage has typo >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-doc >State: open >Quarter: >Keywords: >Date-Required: >Class: doc-bug >Submitter-Id: current-users >Arrival-Date: Thu Aug 23 02:50:01 PDT 2001 >Closed-Date: >Last-Modified: >Originator: Joseph Mallett >Release: 4.4-RC >Organization: xMach >Environment: NA >Description: random(4) manpage has the expression "worst case" in it, yet it is written as "worse case". It is common for people to pronounce it this way, yet as far as I know, the expression is 'worst case' as in 'worse case scenario' and 'in the worst case'. A patch is attached. >How-To-Repeat: man 4 random >Fix: Aphex% diff -u random.orig random.4 --- random.orig Thu Aug 23 09:47:24 2001 +++ random.4 Thu Aug 23 09:47:41 2001 @@ -94,7 +94,7 @@ and thus have some success in guessing the output of the routine. Phil Karn (who devised this mechanism of using MD5 plus a counter to extract random numbers from an entropy pool) calls this -"practical randomness", since in the worse case this is equivalent +"practical randomness", since in the worst case this is equivalent to hashing MD5 with a counter and an undisclosed secret. If MD5 is a strong cryptographic hash, this should be fairly resistant to attack. .Ss Exported interfaces \(em output >Release-Note: >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-doc" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200108230949.f7N9nfm28707>