summaryrefslogtreecommitdiff
path: root/doc/man/pwmake.1.pod
diff options
context:
space:
mode:
authorTomas Mraz <tmraz@fedoraproject.org>2021-04-01 17:34:52 +0200
committerTomas Mraz <tmraz@fedoraproject.org>2021-04-01 17:34:52 +0200
commit847716b053a8ce7bdf610819acb13772d1c981c3 (patch)
tree89e182631b883849651e8b35bf68d38feefeab79 /doc/man/pwmake.1.pod
parent42c4c7c880f73e0cc0a64af719fd2b3a3e07b9b2 (diff)
downloadlibpwquality-git-847716b053a8ce7bdf610819acb13772d1c981c3.tar.gz
Document the range of allowed entropy bits when generating passwords
Diffstat (limited to 'doc/man/pwmake.1.pod')
-rw-r--r--doc/man/pwmake.1.pod3
1 files changed, 3 insertions, 0 deletions
diff --git a/doc/man/pwmake.1.pod b/doc/man/pwmake.1.pod
index 33efe9a..22e0939 100644
--- a/doc/man/pwmake.1.pod
+++ b/doc/man/pwmake.1.pod
@@ -25,6 +25,9 @@ the attacker might obtain the direct access to the password hash or the
password is used as an encryption key I<80> to I<128> bits should be
used depending on your level of paranoia.
+Any I<entropy-bits> value outside of the I<56> to I<256> bits range will be
+adjusted to fit within the allowed range.
+
=head1 OPTIONS
The first and only argument is the number of bits of entropy used to generate