.\" Copyright 1993 David Metcalfe (david@prism.demon.co.uk)
.\"
+.\" %%%LICENSE_START(VERBATIM)
.\" Permission is granted to make and distribute verbatim copies of this
.\" manual provided the copyright notice and this permission notice are
.\" preserved on all copies.
.\"
.\" Formatted or processed versions of this manual, if unaccompanied by
.\" the source, must acknowledge the copyright and authors of this work.
+.\" %%%LICENSE_END
.\"
.\" References consulted:
.\" Linux libc source code
.\" Lewine's _POSIX Programmer's Guide_ (O'Reilly & Associates, 1991)
.\" 386BSD man pages
.\" Modified Sat Jul 24 18:54:45 1993 by Rik Faith (faith@cs.unc.edu)
-.TH MEMFROB 3 2010-09-10 "GNU" "Linux Programmer's Manual"
+.TH MEMFROB 3 2014-03-17 "GNU" "Linux Programmer's Manual"
.SH NAME
memfrob \- frobnicate (encrypt) a memory area
.SH SYNOPSIS
encrypted memory area.
.PP
Note that this function is not a proper encryption routine as the XOR
-constant is fixed, and is only suitable for hiding strings.
-.SH "RETURN VALUE"
+constant is fixed, and is suitable only for hiding strings.
+.SH RETURN VALUE
The
.BR memfrob ()
function returns a pointer to the encrypted memory
area.
-.SH "CONFORMING TO"
+.SH ATTRIBUTES
+.SS Multithreading (see pthreads(7))
+The
+.BR memfrob ()
+function is thread-safe.
+.SH CONFORMING TO
The
.BR memfrob ()
function is unique to the
GNU C Library.
-.SH "SEE ALSO"
+.SH SEE ALSO
.BR strfry (3)
+.SH COLOPHON
+This page is part of release 3.79 of the Linux
+.I man-pages
+project.
+A description of the project,
+information about reporting bugs,
+and the latest version of this page,
+can be found at
+\%http://www.kernel.org/doc/man\-pages/.