forked from mirrors/linux
		
	random: Remove kernel blocking API
This patch removes the kernel blocking API as it has been completely replaced by the callback API. Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
This commit is contained in:
		
							parent
							
								
									57225e6797
								
							
						
					
					
						commit
						c2719503f5
					
				
					 2 changed files with 0 additions and 13 deletions
				
			
		| 
						 | 
				
			
			@ -1264,18 +1264,6 @@ void get_random_bytes(void *buf, int nbytes)
 | 
			
		|||
}
 | 
			
		||||
EXPORT_SYMBOL(get_random_bytes);
 | 
			
		||||
 | 
			
		||||
/*
 | 
			
		||||
 * Equivalent function to get_random_bytes with the difference that this
 | 
			
		||||
 * function blocks the request until the nonblocking_pool is initialized.
 | 
			
		||||
 */
 | 
			
		||||
void get_blocking_random_bytes(void *buf, int nbytes)
 | 
			
		||||
{
 | 
			
		||||
	if (unlikely(nonblocking_pool.initialized == 0))
 | 
			
		||||
		wait_event(urandom_init_wait, nonblocking_pool.initialized);
 | 
			
		||||
	extract_entropy(&nonblocking_pool, buf, nbytes, 0, 0);
 | 
			
		||||
}
 | 
			
		||||
EXPORT_SYMBOL(get_blocking_random_bytes);
 | 
			
		||||
 | 
			
		||||
/*
 | 
			
		||||
 * Add a callback function that will be invoked when the nonblocking
 | 
			
		||||
 * pool is initialised.
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -21,7 +21,6 @@ extern void add_input_randomness(unsigned int type, unsigned int code,
 | 
			
		|||
extern void add_interrupt_randomness(int irq, int irq_flags);
 | 
			
		||||
 | 
			
		||||
extern void get_random_bytes(void *buf, int nbytes);
 | 
			
		||||
extern void get_blocking_random_bytes(void *buf, int nbytes);
 | 
			
		||||
extern int add_random_ready_callback(struct random_ready_callback *rdy);
 | 
			
		||||
extern void del_random_ready_callback(struct random_ready_callback *rdy);
 | 
			
		||||
extern void get_random_bytes_arch(void *buf, int nbytes);
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
		Loading…
	
		Reference in a new issue