random.7: Fixes after review by Laurent Georget

Reviewed-by: Laurent Georget <laurent@lgeorget.eu>
Reported-by: Laurent Georget <laurent@lgeorget.eu>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
This commit is contained in:
Michael Kerrisk 2016-11-15 07:18:08 +01:00
parent bb02bcefe9
commit 76d8c32d6f
1 changed files with 4 additions and 4 deletions

View File

@ -38,9 +38,10 @@ and
.I /dev/random
devices, both described in
.BR random (4).
These devices have been present on Linux since early times.
These devices have been present on Linux since early times,
and are also available on many other systems.
.IP *
The
The Linux-specific
.BR getrandom (2)
system call, available since Linux 3.17.
This system call provides access either to the same source as
@ -64,7 +65,6 @@ flag to the system call.
.SS Initialization of the entropy pool
The kernel collects bits of entropy from the environment.
When a sufficient number of random bits has been collected, the
.I urandom
entropy pool is considered to be initialized.
.SS Choice of random device
Unless you are doing long-term key generation (and most likely not even
@ -92,7 +92,7 @@ The disadvantage of
.B GRND_RANDOM
and reads from
.I /dev/random
is that the operation can block.
is that the operation can block for an indefinite period of time.
Furthermore, dealing with the partially fulfilled
requests that can occur when using
.B GRND_RANDOM