Module Name: src
Committed By: wiz
Date: Wed Sep 4 05:37:07 UTC 2019
Modified Files:
src/share/man/man4: rnd.4
Log Message:
New sentence, new line. Use \(em.
To generate a diff of this commit:
cvs rdiff -u -r1.27 -r1.28 src/share/man/man4/rnd.4
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
Modified files:
Index: src/share/man/man4/rnd.4
diff -u src/share/man/man4/rnd.4:1.27 src/share/man/man4/rnd.4:1.28
--- src/share/man/man4/rnd.4:1.27 Wed Sep 4 04:03:25 2019
+++ src/share/man/man4/rnd.4 Wed Sep 4 05:37:06 2019
@@ -1,4 +1,4 @@
-.\" $NetBSD: rnd.4,v 1.27 2019/09/04 04:03:25 riastradh Exp $
+.\" $NetBSD: rnd.4,v 1.28 2019/09/04 05:37:06 wiz Exp $
.\"
.\" Copyright (c) 2014 The NetBSD Foundation, Inc.
.\" All rights reserved.
@@ -187,8 +187,8 @@ quantum computers.
Systems with nonvolatile storage should store a secret from
.Pa /dev/urandom
on disk during installation or shutdown, and feed it back during boot,
-so that the work the operating system has done to gather entropy --
-including the work its operator may have done to flip a coin! -- can be
+so that the work the operating system has done to gather entropy \(em
+including the work its operator may have done to flip a coin! \(em can be
saved from one boot to the next, and so that newly installed systems
are not vulnerable to generating cryptographic keys predictably.
.Pp
@@ -205,7 +205,7 @@ in
which is enabled by default; see
.Xr rc.conf 5 .
.Sh LIMITATIONS
-Some people worry about recovery from state compromise -- that is,
+Some people worry about recovery from state compromise \(em that is,
ensuring that even if an attacker sees the entire state of the
operating system, then the attacker will be unable to predict any new
future outputs as long as the operating system gathers fresh entropy
@@ -562,7 +562,7 @@ Past versions of the
subsystem were concerned with
.Sq information-theoretic
security, under the premise that the number of bits of entropy out must
-not exceed the number of bits of entropy in -- never mind that its
+not exceed the number of bits of entropy in \(em never mind that its
.Sq entropy estimation
is essentially meaningless without a model for the physical processes
the system is observing.
@@ -571,7 +571,8 @@ But every cryptographic protocol in prac
PGP, etc., expands short secrets deterministically into long streams of
bits, and their security relies on conjectures that a computationally
bounded attacker cannot distinguish the long streams from uniform
-random. If we couldn't do that for
+random.
+If we couldn't do that for
.Fa /dev/random ,
it would be hopeless to assume we could for HTTPS, SSH, PGP, etc.
.Pp