Module Name:    src
Committed By:   wiz
Date:           Wed Sep  4 05:37:07 UTC 2019

Modified Files:
        src/share/man/man4: rnd.4

Log Message:
New sentence, new line. Use \(em.


To generate a diff of this commit:
cvs rdiff -u -r1.27 -r1.28 src/share/man/man4/rnd.4

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/share/man/man4/rnd.4
diff -u src/share/man/man4/rnd.4:1.27 src/share/man/man4/rnd.4:1.28
--- src/share/man/man4/rnd.4:1.27	Wed Sep  4 04:03:25 2019
+++ src/share/man/man4/rnd.4	Wed Sep  4 05:37:06 2019
@@ -1,4 +1,4 @@
-.\"	$NetBSD: rnd.4,v 1.27 2019/09/04 04:03:25 riastradh Exp $
+.\"	$NetBSD: rnd.4,v 1.28 2019/09/04 05:37:06 wiz Exp $
 .\"
 .\" Copyright (c) 2014 The NetBSD Foundation, Inc.
 .\" All rights reserved.
@@ -187,8 +187,8 @@ quantum computers.
 Systems with nonvolatile storage should store a secret from
 .Pa /dev/urandom
 on disk during installation or shutdown, and feed it back during boot,
-so that the work the operating system has done to gather entropy --
-including the work its operator may have done to flip a coin! -- can be
+so that the work the operating system has done to gather entropy \(em
+including the work its operator may have done to flip a coin! \(em can be
 saved from one boot to the next, and so that newly installed systems
 are not vulnerable to generating cryptographic keys predictably.
 .Pp
@@ -205,7 +205,7 @@ in
 which is enabled by default; see
 .Xr rc.conf 5 .
 .Sh LIMITATIONS
-Some people worry about recovery from state compromise -- that is,
+Some people worry about recovery from state compromise \(em that is,
 ensuring that even if an attacker sees the entire state of the
 operating system, then the attacker will be unable to predict any new
 future outputs as long as the operating system gathers fresh entropy
@@ -562,7 +562,7 @@ Past versions of the
 subsystem were concerned with
 .Sq information-theoretic
 security, under the premise that the number of bits of entropy out must
-not exceed the number of bits of entropy in -- never mind that its
+not exceed the number of bits of entropy in \(em never mind that its
 .Sq entropy estimation
 is essentially meaningless without a model for the physical processes
 the system is observing.
@@ -571,7 +571,8 @@ But every cryptographic protocol in prac
 PGP, etc., expands short secrets deterministically into long streams of
 bits, and their security relies on conjectures that a computationally
 bounded attacker cannot distinguish the long streams from uniform
-random.  If we couldn't do that for
+random.
+If we couldn't do that for
 .Fa /dev/random ,
 it would be hopeless to assume we could for HTTPS, SSH, PGP, etc.
 .Pp

Reply via email to