diff options
author | NIIBE Yutaka <gniibe@fsij.org> | 2021-11-18 12:02:24 +0900 |
---|---|---|
committer | NIIBE Yutaka <gniibe@fsij.org> | 2021-11-18 12:04:21 +0900 |
commit | 5493282b4aacd6b466c4ddd366ce9eb4036b3562 (patch) | |
tree | 078569182cf1efea1072866900b3fb1760304fc1 /random/random-csprng.c | |
parent | 2101da04924b1361e2a1021b406a519a3bde9aee (diff) | |
download | libgcrypt-5493282b4aacd6b466c4ddd366ce9eb4036b3562.tar.gz |
random: Fix rndgetentropy correctly uses rndjent.
* random/rndgetentropy.c (_gcry_rndgetentropy_gather_random): Call
_gcry_rndjent_poll for GCRY_VERY_STRONG_RANDOM.
--
GnuPG-bug-id: 5692
Signed-off-by: NIIBE Yutaka <gniibe@fsij.org>
Diffstat (limited to 'random/random-csprng.c')
-rw-r--r-- | random/random-csprng.c | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/random/random-csprng.c b/random/random-csprng.c index 1664b708..6d6c082e 100644 --- a/random/random-csprng.c +++ b/random/random-csprng.c @@ -354,7 +354,8 @@ _gcry_rngcsprng_close_fds (void) lock_pool (); #if USE_RNDGETENTROPY _gcry_rndgetentropy_gather_random (NULL, 0, 0, 0); -#elif USE_RNDLINUX +#endif +#if USE_RNDLINUX _gcry_rndlinux_gather_random (NULL, 0, 0, 0); #endif pool_filled = 0; /* Force re-open on next use. */ |