From 2c7135dbfb7d9a1e1711f1e73884d36f3fc3ff18 Mon Sep 17 00:00:00 2001 From: Michael Kerrisk Date: Wed, 28 Jan 2015 07:04:54 +0100 Subject: [PATCH] getrandom.2: Minor tweaks to Heinrich's text Signed-off-by: Michael Kerrisk --- man2/getrandom.2 | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/man2/getrandom.2 b/man2/getrandom.2 index 469da27f1..3652b001a 100644 --- a/man2/getrandom.2 +++ b/man2/getrandom.2 @@ -173,7 +173,7 @@ This system call is Linux-specific. As of Linux 3.19 the following limits apply: .IP * 3 When reading from -.I /dev/urandom +.IR /dev/urandom , a maximum of 33554431 bytes is returned by a single call to .BR getrandom () on a system where @@ -181,13 +181,13 @@ on a system where has a size of 32 bits. .IP * When reading from -.I /dev/random +.IR /dev/random , a maximum of 512 bytes is returned. -.SS Initilization of the entropy pool +.SS Initialization of the entropy pool The kernel collects bits of entropy from environment. -When a sufficient number of random bits has been collected the +When a sufficient number of random bits has been collected, the .I /dev/urandom -entropy pool is set to initialized. +entropy pool is considered to be initialized. .SS Interruption by a signal handler A call to .BR getrandom ()