summaryrefslogtreecommitdiff
path: root/random
diff options
context:
space:
mode:
authorNIIBE Yutaka <gniibe@fsij.org>2021-11-16 15:05:07 +0900
committerNIIBE Yutaka <gniibe@fsij.org>2021-11-17 14:56:22 +0900
commitd0fcb4da98a05097bc0cd6dc7377cb02aaa8b61c (patch)
treef37b75045f34633f4a40df9441a71c5e064fceb8 /random
parentcf85258e6aff87f5b0614097b4ff2972ceb703fd (diff)
downloadlibgcrypt-d0fcb4da98a05097bc0cd6dc7377cb02aaa8b61c.tar.gz
Fix jent_read_entropy for JENT_CPU_JITTERENTROPY_SECURE_MEMORY.
* random/jitterentropy-base.c (jent_read_entropy): Fix conditional compile. -- The call of jent_random_data had been enabled wrongly, until this update. But it was safer side for the RNG. Peformance was bad, though. GnuPG-bug-id: 5523 Signed-off-by: NIIBE Yutaka <gniibe@fsij.org>
Diffstat (limited to 'random')
-rw-r--r--random/jitterentropy-base.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/random/jitterentropy-base.c b/random/jitterentropy-base.c
index 5ff6654c..9aef266a 100644
--- a/random/jitterentropy-base.c
+++ b/random/jitterentropy-base.c
@@ -221,7 +221,7 @@ ssize_t jent_read_entropy(struct rand_data *ec, char *data, size_t len)
* memory protects the entropy pool. Moreover, note that using this
* call reduces the speed of the RNG by up to half
*/
-#ifndef CONFIG_CRYPTO_CPU_JITTERENTROPY_SECURE_MEMORY
+#ifndef JENT_CPU_JITTERENTROPY_SECURE_MEMORY
jent_random_data(ec);
#endif