xref: /netbsd-src/sbin/rndctl/rndctl.8 (revision 95d875fb90b1458e4f1de6950286ddcd6644bc61)
1.\"	$NetBSD: rndctl.8,v 1.5 1999/03/10 05:16:18 erh Exp $
2.\"
3.\" Copyright (c) 1997 Michael Graff
4.\" All rights reserved.
5.\"
6.\" Redistribution and use in source and binary forms, with or without
7.\" modification, are permitted provided that the following conditions
8.\" are met:
9.\" 1. Redistributions of source code must retain the above copyright
10.\"    notice, this list of conditions and the following disclaimer.
11.\" 2. Redistributions in binary form must reproduce the above copyright
12.\"    notice, this list of conditions and the following disclaimer in the
13.\"    documentation and/or other materials provided with the distribution.
14.\" 3. The name of the author may not be used to endorse or promote products
15.\"    derived from this software without specific prior written permission.
16.\"
17.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
18.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
19.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
20.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
21.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
22.\" BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
23.\" LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
24.\" AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
25.\" OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27.\" SUCH DAMAGE.
28.\"
29.Dd October 12, 1997
30.Dt RNDCTL 8
31.Os NetBSD
32.Sh NAME
33.Nm rndctl
34.Nd in-kernel random number generator management tool
35.Sh SYNOPSIS
36.Nm
37.Fl CEce
38.Op Fl t Ar devtype
39.Op Fl d Ar devname
40.Nm ""
41.Fl l
42.Op Fl t Ar devtype
43.Op Fl d Ar devname
44.Sh DESCRIPTION
45The
46.Nm
47program manages which devices timing information is to be collected by,
48and alters the estimation of entropy of sources.
49.Sh OPTIONS
50The following options are available:
51.Bl -tag -width 123456
52.It Fl C
53Disable collection of timing information for the given
54device name or device type.
55.It Fl c
56Enable collection of timing information for the given
57device name of device type.
58.It Fl E
59Disable entropy estimation from the collected timing information
60for the given device name or device type.  The timing information is still
61collected and mixed into the internal entropy pool, but no entropy is assumed
62to be present.
63.It Fl e
64Enable entropy estimation using the collected timing information
65for the given device name or device type.
66.It Fl l
67List all sources, or only those specified by the
68.Ar devtype
69or
70.Ar devname
71specified.
72.It Fl t
73All devices of type
74.Ar devtype
75are altered or displayed.
76.It Fl d
77Only the device named
78.Ar devname
79is altered or displayed.
80.El
81.Sh WARNINGS
82Turning on entropy collection from unsafe sources can weaken system security.
83Care should be taken when using this command.
84.Sh HISTORY
85The
86.Nm
87program was first made available in
88.Nx 1.3 .
89.Sh AUTHOR
90The
91.Nm
92program was written by Michael Graff <explorer@flame.org>.
93.Sh SEE ALSO
94.Xr rnd 4 ,
95.Xr rnd 9
96