Sort sections, use standard headers, sort SEE ALSO.

This commit is contained in:
wiz 2001-11-16 12:08:19 +00:00
parent d80de2cabd
commit e8e51dce31

View File

@ -1,4 +1,4 @@
.\" $NetBSD: rndctl.8,v 1.10 2001/11/16 10:25:50 wiz Exp $
.\" $NetBSD: rndctl.8,v 1.11 2001/11/16 12:08:19 wiz Exp $
.\"
.\" Copyright (c) 1997 Michael Graff
.\" All rights reserved.
@ -50,7 +50,7 @@ pseudo-driver, and allows the administrator to control which sources
are allowed to contribute to the randomness pool maintained by
.Xr rnd 4 ,
as well as whether a given source is counts as strongly random.
.Sh OPTIONS
.Pp
The following options are available:
.Bl -tag -width 123456
.It Fl C
@ -88,12 +88,6 @@ Only the device named
.Ar devname
is altered or displayed.
.El
.Sh WARNINGS
Turning on entropy estimation from unsafe or predictable sources will
weaken system security, while turning on entropy collection from such
sources may weaken system security.
.Pp
Care should be taken when using this command.
.Sh FILES
.Bl -tag -width /dev/urandomx -compact
.It Pa /dev/random
@ -101,15 +95,21 @@ Returns ``good'' values only
.It Pa /dev/urandom
Always returns data, degenerates to a pseudo-random generator
.El
.Sh SEE ALSO
.Xr rnd 4 ,
.Xr rnd 9
.Sh HISTORY
The
.Nm
program was first made available in
.Nx 1.3 .
.Sh AUTHOR
.Sh AUTHORS
The
.Nm
program was written by Michael Graff <explorer@flame.org>.
.Sh SEE ALSO
.Xr rnd 4 ,
.Xr rnd 9
.Sh BUGS
Turning on entropy estimation from unsafe or predictable sources will
weaken system security, while turning on entropy collection from such
sources may weaken system security.
.Pp
Care should be taken when using this command.