Otherwise, we might be seeding the RNG using bad randomness, which is
dangerous. The one use of this function from within the kernel -- not
from userspace -- is being removed (keys/big_key), so that call site
isn't relevant in assessing this.
Cc: Herbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
                if (!buf)
                        return -ENOMEM;
 
-               get_random_bytes(buf, slen);
+               err = get_random_bytes_wait(buf, slen);
+               if (err)
+                       goto out;
                seed = buf;
        }
 
        err = crypto_rng_alg(tfm)->seed(tfm, seed, slen);
-
+out:
        kzfree(buf);
        return err;
 }