summaryrefslogtreecommitdiff
path: root/random/random-system.c
diff options
context:
space:
mode:
authorNIIBE Yutaka <gniibe@fsij.org>2022-01-11 14:47:13 +0900
committerNIIBE Yutaka <gniibe@fsij.org>2022-01-11 14:47:13 +0900
commit560943805a525a6f479b666578b0ff7d51e6f833 (patch)
tree358f75853d2ef04a97f063b22c8aff4f5c0979d0 /random/random-system.c
parent83e58191d3d960b3efda960dd6fe50e8f0b02bda (diff)
downloadlibgcrypt-560943805a525a6f479b666578b0ff7d51e6f833.tar.gz
random: Rename rndlinux module to rndoldlinux.
* configure.ac (USE_RNDOLDLINUX): Rename from USE_RNDLINUX. (GCRYPT_RANDOM): Use rndoldlinux.lo. * doc/gcrypt.texi: Update. * random/Makefile.am (EXTRA_librandom_la_SOURCES): Update. * random/rndoldlinux.c: Rename from rndlinux.c. Rename the function. * random/rand-internal.h: Update the function name. * random/random-csprng.c: Update the calls to the function. * random/random-drbg.c: Likewise. * random/random-system.c: Likewise. * src/global.c: Use USE_RNDOLDLINUX. -- GnuPG-bug-id: 5759 Signed-off-by: NIIBE Yutaka <gniibe@fsij.org>
Diffstat (limited to 'random/random-system.c')
-rw-r--r--random/random-system.c10
1 files changed, 5 insertions, 5 deletions
diff --git a/random/random-system.c b/random/random-system.c
index 8e50120c..a1d17ad0 100644
--- a/random/random-system.c
+++ b/random/random-system.c
@@ -149,8 +149,8 @@ get_random (void *buffer, size_t length, int level)
#if USE_RNDGETENTROPY
rc = _gcry_rndgetentropy_gather_random (read_cb, 0, length, level);
-#elif USE_RNDLINUX
- rc = _gcry_rndlinux_gather_random (read_cb, 0, length, level);
+#elif USE_RNDOLDLINUX
+ rc = _gcry_rndoldlinux_gather_random (read_cb, 0, length, level);
#elif USE_RNDUNIX
rc = _gcry_rndunix_gather_random (read_cb, 0, length, level);
#elif USE_RNDW32
@@ -190,7 +190,7 @@ _gcry_rngsystem_initialize (int full)
/* Try to close the FDs of the random gather module. This is
- currently only implemented for rndlinux. */
+ currently only implemented for rndgetentropy/rndoldlinux. */
void
_gcry_rngsystem_close_fds (void)
{
@@ -198,8 +198,8 @@ _gcry_rngsystem_close_fds (void)
#if USE_RNDGETENTROPY
_gcry_rndgetentropy_gather_random (NULL, 0, 0, 0);
#endif
-#if USE_RNDLINUX
- _gcry_rndlinux_gather_random (NULL, 0, 0, 0);
+#if USE_RNDOLDLINUX
+ _gcry_rndoldlinux_gather_random (NULL, 0, 0, 0);
#endif
unlock_rng ();
}