diff options
author | NIIBE Yutaka <gniibe@fsij.org> | 2022-01-11 14:47:13 +0900 |
---|---|---|
committer | NIIBE Yutaka <gniibe@fsij.org> | 2022-01-11 14:47:13 +0900 |
commit | 560943805a525a6f479b666578b0ff7d51e6f833 (patch) | |
tree | 358f75853d2ef04a97f063b22c8aff4f5c0979d0 /random/random-system.c | |
parent | 83e58191d3d960b3efda960dd6fe50e8f0b02bda (diff) | |
download | libgcrypt-560943805a525a6f479b666578b0ff7d51e6f833.tar.gz |
random: Rename rndlinux module to rndoldlinux.
* configure.ac (USE_RNDOLDLINUX): Rename from USE_RNDLINUX.
(GCRYPT_RANDOM): Use rndoldlinux.lo.
* doc/gcrypt.texi: Update.
* random/Makefile.am (EXTRA_librandom_la_SOURCES): Update.
* random/rndoldlinux.c: Rename from rndlinux.c. Rename the function.
* random/rand-internal.h: Update the function name.
* random/random-csprng.c: Update the calls to the function.
* random/random-drbg.c: Likewise.
* random/random-system.c: Likewise.
* src/global.c: Use USE_RNDOLDLINUX.
--
GnuPG-bug-id: 5759
Signed-off-by: NIIBE Yutaka <gniibe@fsij.org>
Diffstat (limited to 'random/random-system.c')
-rw-r--r-- | random/random-system.c | 10 |
1 files changed, 5 insertions, 5 deletions
diff --git a/random/random-system.c b/random/random-system.c index 8e50120c..a1d17ad0 100644 --- a/random/random-system.c +++ b/random/random-system.c @@ -149,8 +149,8 @@ get_random (void *buffer, size_t length, int level) #if USE_RNDGETENTROPY rc = _gcry_rndgetentropy_gather_random (read_cb, 0, length, level); -#elif USE_RNDLINUX - rc = _gcry_rndlinux_gather_random (read_cb, 0, length, level); +#elif USE_RNDOLDLINUX + rc = _gcry_rndoldlinux_gather_random (read_cb, 0, length, level); #elif USE_RNDUNIX rc = _gcry_rndunix_gather_random (read_cb, 0, length, level); #elif USE_RNDW32 @@ -190,7 +190,7 @@ _gcry_rngsystem_initialize (int full) /* Try to close the FDs of the random gather module. This is - currently only implemented for rndlinux. */ + currently only implemented for rndgetentropy/rndoldlinux. */ void _gcry_rngsystem_close_fds (void) { @@ -198,8 +198,8 @@ _gcry_rngsystem_close_fds (void) #if USE_RNDGETENTROPY _gcry_rndgetentropy_gather_random (NULL, 0, 0, 0); #endif -#if USE_RNDLINUX - _gcry_rndlinux_gather_random (NULL, 0, 0, 0); +#if USE_RNDOLDLINUX + _gcry_rndoldlinux_gather_random (NULL, 0, 0, 0); #endif unlock_rng (); } |