1.\" $NetBSD: rndctl.8,v 1.5 1999/03/10 05:16:18 erh Exp $ 2.\" 3.\" Copyright (c) 1997 Michael Graff 4.\" All rights reserved. 5.\" 6.\" Redistribution and use in source and binary forms, with or without 7.\" modification, are permitted provided that the following conditions 8.\" are met: 9.\" 1. Redistributions of source code must retain the above copyright 10.\" notice, this list of conditions and the following disclaimer. 11.\" 2. Redistributions in binary form must reproduce the above copyright 12.\" notice, this list of conditions and the following disclaimer in the 13.\" documentation and/or other materials provided with the distribution. 14.\" 3. The name of the author may not be used to endorse or promote products 15.\" derived from this software without specific prior written permission. 16.\" 17.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR 18.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES 19.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. 20.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 21.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, 22.\" BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; 23.\" LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED 24.\" AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, 25.\" OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 26.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 27.\" SUCH DAMAGE. 28.\" 29.Dd October 12, 1997 30.Dt RNDCTL 8 31.Os NetBSD 32.Sh NAME 33.Nm rndctl 34.Nd in-kernel random number generator management tool 35.Sh SYNOPSIS 36.Nm 37.Fl CEce 38.Op Fl t Ar devtype 39.Op Fl d Ar devname 40.Nm "" 41.Fl l 42.Op Fl t Ar devtype 43.Op Fl d Ar devname 44.Sh DESCRIPTION 45The 46.Nm 47program manages which devices timing information is to be collected by, 48and alters the estimation of entropy of sources. 49.Sh OPTIONS 50The following options are available: 51.Bl -tag -width 123456 52.It Fl C 53Disable collection of timing information for the given 54device name or device type. 55.It Fl c 56Enable collection of timing information for the given 57device name of device type. 58.It Fl E 59Disable entropy estimation from the collected timing information 60for the given device name or device type. The timing information is still 61collected and mixed into the internal entropy pool, but no entropy is assumed 62to be present. 63.It Fl e 64Enable entropy estimation using the collected timing information 65for the given device name or device type. 66.It Fl l 67List all sources, or only those specified by the 68.Ar devtype 69or 70.Ar devname 71specified. 72.It Fl t 73All devices of type 74.Ar devtype 75are altered or displayed. 76.It Fl d 77Only the device named 78.Ar devname 79is altered or displayed. 80.El 81.Sh WARNINGS 82Turning on entropy collection from unsafe sources can weaken system security. 83Care should be taken when using this command. 84.Sh HISTORY 85The 86.Nm 87program was first made available in 88.Nx 1.3 . 89.Sh AUTHOR 90The 91.Nm 92program was written by Michael Graff <explorer@flame.org>. 93.Sh SEE ALSO 94.Xr rnd 4 , 95.Xr rnd 9 96