diff options
author | 2014-01-19 00:39:40 +0000 | |
---|---|---|
committer | 2014-01-19 00:39:40 +0000 | |
commit | ec33a7664d2f3a19abd038ef7c5985861157bd44 (patch) | |
tree | 22855fb4a15f60db7514516e842c14d15735bab8 /sys/dev/rndvar.h | |
parent | we no long use the /var/hash files, but rely on the SHA256.sig file. (diff) | |
download | wireguard-openbsd-ec33a7664d2f3a19abd038ef7c5985861157bd44.tar.xz wireguard-openbsd-ec33a7664d2f3a19abd038ef7c5985861157bd44.zip |
With the earlier initialization of the random subsystem, random_hostseed()
is no longer providing significant value. The random subsystem is in
pretty good state, and moments later userland will feed the dmesg.
ok jsing
Diffstat (limited to 'sys/dev/rndvar.h')
-rw-r--r-- | sys/dev/rndvar.h | 3 |
1 files changed, 1 insertions, 2 deletions
diff --git a/sys/dev/rndvar.h b/sys/dev/rndvar.h index 165e7f8ea96..5e631d92dbf 100644 --- a/sys/dev/rndvar.h +++ b/sys/dev/rndvar.h @@ -1,4 +1,4 @@ -/* $OpenBSD: rndvar.h,v 1.31 2013/03/29 01:35:37 tedu Exp $ */ +/* $OpenBSD: rndvar.h,v 1.32 2014/01/19 00:39:40 deraadt Exp $ */ /* * Copyright (c) 1996,2000 Michael Shalayeff. @@ -71,7 +71,6 @@ extern struct rndstats rndstats; void random_init(void); void random_start(void); -void random_hostseed(void); void enqueue_randomness(int, int); void arc4random_buf(void *, size_t); |