Renamed odp_hw_random_get() to odp_random_data(). Random number API is now separated from crypto API.
Signed-off-by: Petri Savolainen <[email protected]> --- example/ipsec/odp_ipsec_cache.c | 2 +- include/odp/api/crypto.h | 14 -------------- platform/linux-generic/odp_crypto.c | 3 ++- test/validation/crypto/odp_crypto_test_rng.c | 2 +- 4 files changed, 4 insertions(+), 17 deletions(-) diff --git a/example/ipsec/odp_ipsec_cache.c b/example/ipsec/odp_ipsec_cache.c index 904e7b6..5e128c5 100644 --- a/example/ipsec/odp_ipsec_cache.c +++ b/example/ipsec/odp_ipsec_cache.c @@ -98,7 +98,7 @@ int create_ipsec_cache_entry(sa_db_entry_t *cipher_sa, if (params.iv.length) { size_t size = params.iv.length; - odp_hw_random_get(params.iv.data, &size, 1); + odp_random_data(params.iv.data, &size, 1); } /* Synchronous session create for now */ diff --git a/include/odp/api/crypto.h b/include/odp/api/crypto.h index 545c1a5..aad6bd9 100644 --- a/include/odp/api/crypto.h +++ b/include/odp/api/crypto.h @@ -330,20 +330,6 @@ odp_crypto_compl_result(odp_crypto_compl_t completion_event, odp_crypto_op_result_t *result); /** - * Generate random byte string - * - * @param buf Pointer to store result - * @param len Pointer to input length value as well as return value - * @param use_entropy Use entropy - * - * @todo Define the implication of the use_entropy parameter - * - * @return 0 if succesful - */ -int -odp_hw_random_get(uint8_t *buf, size_t *len, odp_bool_t use_entropy); - -/** * @} */ diff --git a/platform/linux-generic/odp_crypto.c b/platform/linux-generic/odp_crypto.c index 46766fa..de60157 100644 --- a/platform/linux-generic/odp_crypto.c +++ b/platform/linux-generic/odp_crypto.c @@ -15,6 +15,7 @@ #include <odp_crypto_internal.h> #include <odp_debug_internal.h> #include <odp/hints.h> +#include <odp/random.h> #include <odp_packet_internal.h> #include <string.h> @@ -447,7 +448,7 @@ odp_crypto_init_global(void) } int -odp_hw_random_get(uint8_t *buf, size_t *len, odp_bool_t use_entropy ODP_UNUSED) +odp_random_data(uint8_t *buf, size_t *len, odp_bool_t use_entropy ODP_UNUSED) { int rc; rc = RAND_bytes(buf, *len); diff --git a/test/validation/crypto/odp_crypto_test_rng.c b/test/validation/crypto/odp_crypto_test_rng.c index 458f908..b6313f0 100644 --- a/test/validation/crypto/odp_crypto_test_rng.c +++ b/test/validation/crypto/odp_crypto_test_rng.c @@ -19,7 +19,7 @@ static void rng_get_size(void) size_t len = TDES_CBC_IV_LEN; uint8_t buf[TDES_CBC_IV_LEN]; - ret = odp_hw_random_get(buf, &len, false); + ret = odp_random_data(buf, &len, false); CU_ASSERT(!ret); CU_ASSERT(len == TDES_CBC_IV_LEN); } -- 2.2.2 _______________________________________________ lng-odp mailing list [email protected] http://lists.linaro.org/mailman/listinfo/lng-odp
