From 76d8c32d6fedec701e1ea26d9d0957d25b9e5e60 Mon Sep 17 00:00:00 2001 From: Michael Kerrisk Date: Tue, 15 Nov 2016 07:18:08 +0100 Subject: [PATCH] random.7: Fixes after review by Laurent Georget Reviewed-by: Laurent Georget Reported-by: Laurent Georget Signed-off-by: Michael Kerrisk --- man7/random.7 | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/man7/random.7 b/man7/random.7 index e8e712067..71283c133 100644 --- a/man7/random.7 +++ b/man7/random.7 @@ -38,9 +38,10 @@ and .I /dev/random devices, both described in .BR random (4). -These devices have been present on Linux since early times. +These devices have been present on Linux since early times, +and are also available on many other systems. .IP * -The +The Linux-specific .BR getrandom (2) system call, available since Linux 3.17. This system call provides access either to the same source as @@ -64,7 +65,6 @@ flag to the system call. .SS Initialization of the entropy pool The kernel collects bits of entropy from the environment. When a sufficient number of random bits has been collected, the -.I urandom entropy pool is considered to be initialized. .SS Choice of random device Unless you are doing long-term key generation (and most likely not even @@ -92,7 +92,7 @@ The disadvantage of .B GRND_RANDOM and reads from .I /dev/random -is that the operation can block. +is that the operation can block for an indefinite period of time. Furthermore, dealing with the partially fulfilled requests that can occur when using .B GRND_RANDOM