=================================================================== RCS file: /cvsrepo/anoncvs/cvs/www/crypto.html,v retrieving revision 1.12 retrieving revision 1.13 diff -u -r1.12 -r1.13 --- www/crypto.html 1998/02/23 19:43:46 1.12 +++ www/crypto.html 1998/02/23 21:46:03 1.13 @@ -31,7 +31,7 @@ in the operating system. We require that the cryptographic software we use be freely available and with good licenses. We do not use cryptography with nasty patents. -We also require that such software is from a countries with useful export +We also require that such software is from countries with useful export licenses because we do not wish to break the laws of any country.

When we make OpenBSD releases or snapshots we do our build processes @@ -62,14 +62,15 @@ the PRNG should have a very long cycle length. -Since a PRNG is normally just an algorithm where the same initial -starting values will yield the same output. On a multiuser operating -system there are many sources which allow seeding the PRNG with random -data. The OpenBSD kernel uses the mouse interrupt timing, network data -interrupt latency, inter-keypress timing and disk IO information to -fill an entropy pool. Random numbers are available for kernel -routines and are exported via devices to userland programs. -In OpenBSD random numbers are used in many places, such as

+A PRNG is normally just an algorithm where the same initial starting +values will yield the same sequence of outputs. On a multiuser +operating system there are many sources which allow seeding the PRNG +with random data. The OpenBSD kernel uses the mouse interrupt timing, +network data interrupt latency, inter-keypress timing and disk IO +information to fill an entropy pool. Random numbers are available for +kernel routines and are exported via devices to userland programs. +So far random numbers are used in the following places

+