]>
Commit | Line | Data |
---|---|---|
3b10b313 MT |
1 | --- elinks-0.11.0/src/network/ssl/ssl.c.noegd 2006-01-10 09:24:50.000000000 +0100 |
2 | +++ elinks-0.11.0/src/network/ssl/ssl.c 2006-01-10 09:25:01.000000000 +0100 | |
3 | @@ -44,18 +44,6 @@ SSL_CTX *context = NULL; | |
4 | static void | |
5 | init_openssl(struct module *module) | |
6 | { | |
7 | - unsigned char f_randfile[PATH_MAX]; | |
8 | - | |
9 | - /* In a nutshell, on OS's without a /dev/urandom, the OpenSSL library | |
10 | - * cannot initialize the PRNG and so every attempt to use SSL fails. | |
11 | - * It's actually an OpenSSL FAQ, and according to them, it's up to the | |
12 | - * application coders to seed the RNG. -- William Yodlowsky */ | |
13 | - if (RAND_egd(RAND_file_name(f_randfile, sizeof(f_randfile))) < 0) { | |
14 | - /* Not an EGD, so read and write to it */ | |
15 | - if (RAND_load_file(f_randfile, -1)) | |
16 | - RAND_write_file(f_randfile); | |
17 | - } | |
18 | - | |
19 | SSLeay_add_ssl_algorithms(); | |
20 | context = SSL_CTX_new(SSLv23_client_method()); | |
21 | SSL_CTX_set_options(context, SSL_OP_ALL); |