Mon Apr 13 14:30:05 2015 UTC ()
Omit needless define.


(riastradh)
diff -r1.4 -r1.5 src/sys/dev/rnd_private.h

cvs diff -r1.4 -r1.5 src/sys/dev/Attic/rnd_private.h (expand / switch to unified diff)

--- src/sys/dev/Attic/rnd_private.h 2013/08/27 19:30:10 1.4
+++ src/sys/dev/Attic/rnd_private.h 2015/04/13 14:30:05 1.5
@@ -1,14 +1,14 @@ @@ -1,14 +1,14 @@
1/* $NetBSD: rnd_private.h,v 1.4 2013/08/27 19:30:10 riastradh Exp $ */ 1/* $NetBSD: rnd_private.h,v 1.5 2015/04/13 14:30:05 riastradh Exp $ */
2 2
3/*- 3/*-
4 * Copyright (c) 1997 The NetBSD Foundation, Inc. 4 * Copyright (c) 1997 The NetBSD Foundation, Inc.
5 * All rights reserved. 5 * All rights reserved.
6 * 6 *
7 * This code is derived from software contributed to The NetBSD Foundation 7 * This code is derived from software contributed to The NetBSD Foundation
8 * by Michael Graff <explorer@flame.org>. This code uses ideas and 8 * by Michael Graff <explorer@flame.org>. This code uses ideas and
9 * algorithms from the Linux driver written by Ted Ts'o. 9 * algorithms from the Linux driver written by Ted Ts'o.
10 * 10 *
11 * Redistribution and use in source and binary forms, with or without 11 * Redistribution and use in source and binary forms, with or without
12 * modification, are permitted provided that the following conditions 12 * modification, are permitted provided that the following conditions
13 * are met: 13 * are met:
14 * 1. Redistributions of source code must retain the above copyright 14 * 1. Redistributions of source code must retain the above copyright
@@ -30,29 +30,22 @@ @@ -30,29 +30,22 @@
30 * POSSIBILITY OF SUCH DAMAGE. 30 * POSSIBILITY OF SUCH DAMAGE.
31 */ 31 */
32 32
33#ifndef _DEV_RNDPRIVATE_H 33#ifndef _DEV_RNDPRIVATE_H
34#define _DEV_RNDPRIVATE_H 34#define _DEV_RNDPRIVATE_H
35/* 35/*
36 * Number of bytes returned per hash. This value is used in both 36 * Number of bytes returned per hash. This value is used in both
37 * rnd.c and rndpool.c to decide when enough entropy exists to do a 37 * rnd.c and rndpool.c to decide when enough entropy exists to do a
38 * hash to extract it. 38 * hash to extract it.
39 */ 39 */
40#define RND_ENTROPY_THRESHOLD 10 40#define RND_ENTROPY_THRESHOLD 10
41 41
42/* 42/*
43 * Size of the event queue. This _MUST_ be a power of 2. 
44 */ 
45#ifndef RND_EVENTQSIZE 
46#define RND_EVENTQSIZE 128 
47#endif 
48 
49/* 
50 * Used by rnd_extract_data() and rndpool_extract_data() to describe how 43 * Used by rnd_extract_data() and rndpool_extract_data() to describe how
51 * "good" the data has to be. 44 * "good" the data has to be.
52 */ 45 */
53#define RND_EXTRACT_ANY 0 /* extract anything, even if no entropy */ 46#define RND_EXTRACT_ANY 0 /* extract anything, even if no entropy */
54#define RND_EXTRACT_GOOD 1 /* return as many good bytes 47#define RND_EXTRACT_GOOD 1 /* return as many good bytes
55 (short read ok) */ 48 (short read ok) */
56 49
57uint32_t rnd_extract_data(void *, uint32_t, uint32_t); 50uint32_t rnd_extract_data(void *, uint32_t, uint32_t);
58#endif 51#endif