diff options
author | NIIBE Yutaka <gniibe@fsij.org> | 2021-11-16 15:05:07 +0900 |
---|---|---|
committer | NIIBE Yutaka <gniibe@fsij.org> | 2021-11-17 14:56:22 +0900 |
commit | d0fcb4da98a05097bc0cd6dc7377cb02aaa8b61c (patch) | |
tree | f37b75045f34633f4a40df9441a71c5e064fceb8 | |
parent | cf85258e6aff87f5b0614097b4ff2972ceb703fd (diff) | |
download | libgcrypt-d0fcb4da98a05097bc0cd6dc7377cb02aaa8b61c.tar.gz |
Fix jent_read_entropy for JENT_CPU_JITTERENTROPY_SECURE_MEMORY.
* random/jitterentropy-base.c (jent_read_entropy): Fix conditional
compile.
--
The call of jent_random_data had been enabled wrongly, until this
update. But it was safer side for the RNG. Peformance was bad,
though.
GnuPG-bug-id: 5523
Signed-off-by: NIIBE Yutaka <gniibe@fsij.org>
-rw-r--r-- | random/jitterentropy-base.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/random/jitterentropy-base.c b/random/jitterentropy-base.c index 5ff6654c..9aef266a 100644 --- a/random/jitterentropy-base.c +++ b/random/jitterentropy-base.c @@ -221,7 +221,7 @@ ssize_t jent_read_entropy(struct rand_data *ec, char *data, size_t len) * memory protects the entropy pool. Moreover, note that using this * call reduces the speed of the RNG by up to half */ -#ifndef CONFIG_CRYPTO_CPU_JITTERENTROPY_SECURE_MEMORY +#ifndef JENT_CPU_JITTERENTROPY_SECURE_MEMORY jent_random_data(ec); #endif |