Commit c2719503 authored by Herbert Xu's avatar Herbert Xu

random: Remove kernel blocking API

This patch removes the kernel blocking API as it has been completely
replaced by the callback API.
Signed-off-by: default avatarHerbert Xu <herbert@gondor.apana.org.au>
parent 57225e67
...@@ -1264,18 +1264,6 @@ void get_random_bytes(void *buf, int nbytes) ...@@ -1264,18 +1264,6 @@ void get_random_bytes(void *buf, int nbytes)
} }
EXPORT_SYMBOL(get_random_bytes); EXPORT_SYMBOL(get_random_bytes);
/*
* Equivalent function to get_random_bytes with the difference that this
* function blocks the request until the nonblocking_pool is initialized.
*/
void get_blocking_random_bytes(void *buf, int nbytes)
{
if (unlikely(nonblocking_pool.initialized == 0))
wait_event(urandom_init_wait, nonblocking_pool.initialized);
extract_entropy(&nonblocking_pool, buf, nbytes, 0, 0);
}
EXPORT_SYMBOL(get_blocking_random_bytes);
/* /*
* Add a callback function that will be invoked when the nonblocking * Add a callback function that will be invoked when the nonblocking
* pool is initialised. * pool is initialised.
......
...@@ -21,7 +21,6 @@ extern void add_input_randomness(unsigned int type, unsigned int code, ...@@ -21,7 +21,6 @@ extern void add_input_randomness(unsigned int type, unsigned int code,
extern void add_interrupt_randomness(int irq, int irq_flags); extern void add_interrupt_randomness(int irq, int irq_flags);
extern void get_random_bytes(void *buf, int nbytes); extern void get_random_bytes(void *buf, int nbytes);
extern void get_blocking_random_bytes(void *buf, int nbytes);
extern int add_random_ready_callback(struct random_ready_callback *rdy); extern int add_random_ready_callback(struct random_ready_callback *rdy);
extern void del_random_ready_callback(struct random_ready_callback *rdy); extern void del_random_ready_callback(struct random_ready_callback *rdy);
extern void get_random_bytes_arch(void *buf, int nbytes); extern void get_random_bytes_arch(void *buf, int nbytes);
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment