rngd man page

rngd — Check and feed random data from hardware device to kernel random device

Synopsis

rngd [-b, --background] [-f, --foreground] [-o, --random-device=file] [-p, --pid-file=file] [-r, --rng-device=file] [-s, --random-step=nnn] [-W, --fill-watermark=nnn] [-d, --no-drng=1|0] [-n, --no-tpm=1|0] [-q, --quiet] [-v, --verbose] [-?, --help] [-V, --version]

Description

This daemon feeds data from a random number generator to the kernel's random number entropy pool, after first checking the data to ensure that it is properly random.

The -f or --foreground options can be used to tell rngd to avoid forking on startup. This is typically used for debugging. The -b or --background options, which fork and put rngd into the background automatically, are the default.

The -r or --rng-device options can be used to select an alternate source of input, besides the default /dev/hwrandom. The -o or --random-device options can be used to select an alternate entropy output device, besides the default /dev/random. Note that this device must support the Linux kernel /dev/random ioctl API.

Options

-b, --background
Become a daemon (default)
-f, --foreground
Do not fork and become a daemon
-p file, --pid-file=file
File used for recording daemon PID, and multiple exclusion (default: /var/run/rngd.pid)
-o file, --random-device=file
Kernel device used for random number output (default: /dev/random)
-r file, --rng-device=file
Kernel device used for random number input (default: /dev/hwrandom)
-s nnn, --random-step=nnn
Number of bytes written to random-device at a time (default: 64)
-W n, --fill-watermark=nnn
Once we start doing it, feed entropy to random-device until at least fill-watermark bits of entropy are available in its entropy pool (default: 2048). Setting this too high will cause rngd to dominate the contents of the entropy pool. Low values will hurt system performance during entropy starves. Do not set fill-watermark above the size of the entropy pool (usually 4096 bits).
-d 1|0, --no-drng=1|0
Do not use drng as a source of random number input (default:0)
-n 1|0, --no-tpm=1|0
Do not use tpm as a source of random number input (default:0)
-q, --quiet
Suppress error messages
-v, --verbose
Report available entropy sources
-?, --help
Give a short summary of all program options.
-V, --version
Print program version

Authors

Philipp Rumpf
Jeff Garzik - jgarzik@pobox.com
Matt Sottek
Brad Hill

Referenced By

ipsec_rsasigkey(8), rngd_selinux(8), rngtest(1).

March 2001 rng-tools 5