diff options
Diffstat (limited to 'doc')
-rw-r--r-- | doc/man/pwmake.1.pod | 3 | ||||
-rw-r--r-- | doc/man/pwquality.3.pod | 4 |
2 files changed, 6 insertions, 1 deletions
diff --git a/doc/man/pwmake.1.pod b/doc/man/pwmake.1.pod index 33efe9a..22e0939 100644 --- a/doc/man/pwmake.1.pod +++ b/doc/man/pwmake.1.pod @@ -25,6 +25,9 @@ the attacker might obtain the direct access to the password hash or the password is used as an encryption key I<80> to I<128> bits should be used depending on your level of paranoia. +Any I<entropy-bits> value outside of the I<56> to I<256> bits range will be +adjusted to fit within the allowed range. + =head1 OPTIONS The first and only argument is the number of bits of entropy used to generate diff --git a/doc/man/pwquality.3.pod b/doc/man/pwquality.3.pod index 8e4ab79..2604845 100644 --- a/doc/man/pwquality.3.pod +++ b/doc/man/pwquality.3.pod @@ -61,7 +61,9 @@ manipulate the I<pwq> settings object. The pwquality_generate() function generates a random password of I<entropy_bits> entropy and checks it according to the settings. The -I<*password> is allocated on the heap by the library. +I<*password> is allocated on the heap by the library. The I<entropy_bits> +value is adjusted to fit within the B<PWQ_MIN_ENTROPY_BITS> and +B<PWQ_MAX_ENTROPY_BITS> range before generating a password. The pwquality_check() function checks the I<password> according to the settings. It returns either score (value between 0 and 100), negative |