#ifndef RND_H
#define RND_H
#define HIG_ENTROPY_SOURCE "/dev/random"
#define LOW_ENTROPY_SOURCE "/dev/urandom"
/* secrand is not really secure, but the name only suggests it's better to use
* than rand(3) when transferring bytes over the network in non-security
* critical structure members. secrand() is only used to fill up salts actually.
*/
extern int secrand(void);
extern void gen_key_bytes(unsigned char *area, size_t len);
#endif /* RND_H */
git Git repository'/>
* patchwork:
[media] s5k4ecgx: select CRC32 helper
[media] dvb: avoid warning in dvb_net
[media] v4l: tvp5150: Don't override output pinmuxing at stream on/off time
[media] v4l: tvp5150: Fix comment regarding output pin muxing
[media] v4l: tvp5150: Reset device at probe time, not in get/set format handlers
[media] pctv452e: move buffer to heap, no mutex
[media] media/cobalt: use pci_irq_allocate_vectors
[media] cec: fix race between configuring and unconfiguring
[media] cec: move cec_report_phys_addr into cec_config_thread_func
[media] cec: replace cec_report_features by cec_fill_msg_report_features
[media] cec: update log_addr[] before finishing configuration
[media] cec: CEC_MSG_GIVE_FEATURES should abort for CEC version < 2
[media] cec: when canceling a message, don't overwrite old status info
[media] cec: fix report_current_latency
[media] smiapp: Make suspend and resume functions __maybe_unused
[media] smiapp: Implement power-on and power-off sequences without runtime PM