diff --git a/src/random.cpp b/src/random.cpp index 48d20d7d72..b453fdd9b8 100644 --- a/src/random.cpp +++ b/src/random.cpp @@ -11,8 +11,8 @@ #include // for Windows API #include #endif -#include // for LogPrint() -#include // for WAIT_LOCK +#include // for LogPrintf() +#include // for Mutex #include // for GetTime() #include @@ -716,7 +716,7 @@ bool Random_SanityCheck() uint64_t start = GetPerformanceCounter(); /* This does not measure the quality of randomness, but it does test that - * OSRandom() overwrites all 32 bytes of the output given a maximum + * GetOSRand() overwrites all 32 bytes of the output given a maximum * number of tries. */ static const ssize_t MAX_TRIES = 1024; diff --git a/src/random.h b/src/random.h index 9d1f751773..b5a7faf48c 100644 --- a/src/random.h +++ b/src/random.h @@ -52,7 +52,6 @@ * sources used in the 'slow' seeder are included, but also: * - 256 bits from the hardware RNG (rdseed or rdrand) when available. * - (On Windows) Performance monitoring data from the OS. - * - (On Windows) Through OpenSSL, the screen contents. * - Strengthen the entropy for 100 ms using repeated SHA512. * * When mixing in new entropy, H = SHA512(entropy || old_rng_state) is computed, and