random.4: Minor wording fixes

Reviewed-by: Nikos Mavrogiannopoulos <nmav@redhat.com>
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
This commit is contained in:
Michael Kerrisk 2016-11-10 13:28:27 +01:00
parent f64f220c5e
commit debb291e3f
1 changed files with 3 additions and 3 deletions

View File

@ -43,8 +43,8 @@ When read, the
.I /dev/urandom
device returns random bytes using a pseudorandom
number generator seeded from the entropy pool.
That operation is non-blocking.
When used during early boot time, this device may return
Reads from this device are nonblocking.
When read during early boot time, this device may return
data prior to the entropy pool being initialized.
If this is of concern in your application, use
.BR getrandom (2)
@ -328,7 +328,7 @@ which gets added to the entropy pool.
Zero the entropy count of all pools and add some system data (such as
wall clock) to the pools.
.SH BUGS
When used during early boot,
During early boot time, reads from
.I /dev/urandom
may return data prior to the entropy pool being initialized.
.SH FILES