seed->cpPath = ap_server_root_relative(mc->pPool, arg2+5);
}
else if ((arg2len > 4) && strEQn(arg2, "egd:", 4)) {
+#ifdef HAVE_SSL_RAND_EGD
seed->nSrc = SSL_RSSRC_EGD;
seed->cpPath = ap_server_root_relative(mc->pPool, arg2+4);
+#else
+ return "egd not supported with this SSL toolkit";
+#endif
}
else if (strcEQ(arg2, "builtin")) {
seed->nSrc = SSL_RSSRC_BUILTIN;
nDone += ssl_rand_feedfp(p, fp, pRandSeed->nBytes);
ssl_util_ppclose(s, p, fp);
}
+#if HAVE_SSL_RAND_EDG
else if (pRandSeed->nSrc == SSL_RSSRC_EGD) {
/*
* seed in contents provided by the external
continue;
nDone += n;
}
+#endif
else if (pRandSeed->nSrc == SSL_RSSRC_BUILTIN) {
struct {
time_t t;
#define modssl_X509_verify_cert(c) X509_verify_cert(c)
+#define HAVE_SSL_RAND_EDG /* since 9.5.1 */
+
#else /* RSA sslc */
#ifndef STACK_OF
SSL_set_verify(ssl, verify, cb)
#endif
+/* sslc does not support this function, OpenSSL has since 9.5.1 */
+#define RAND_status() 1
+
#endif /* SSL_TOOLKIT_COMPAT_H */