Blame SOURCES/elinks-0.11.0-ssl-noegd.patch
|
|
68f3b8 |
--- elinks-0.11.0/src/network/ssl/ssl.c.noegd 2006-01-10 09:24:50.000000000 +0100
|
|
|
68f3b8 |
+++ elinks-0.11.0/src/network/ssl/ssl.c 2006-01-10 09:25:01.000000000 +0100
|
|
|
68f3b8 |
@@ -44,18 +44,6 @@ SSL_CTX *context = NULL;
|
|
|
68f3b8 |
static void
|
|
|
68f3b8 |
init_openssl(struct module *module)
|
|
|
68f3b8 |
{
|
|
|
68f3b8 |
- unsigned char f_randfile[PATH_MAX];
|
|
|
68f3b8 |
-
|
|
|
68f3b8 |
- /* In a nutshell, on OS's without a /dev/urandom, the OpenSSL library
|
|
|
68f3b8 |
- * cannot initialize the PRNG and so every attempt to use SSL fails.
|
|
|
68f3b8 |
- * It's actually an OpenSSL FAQ, and according to them, it's up to the
|
|
|
68f3b8 |
- * application coders to seed the RNG. -- William Yodlowsky */
|
|
|
68f3b8 |
- if (RAND_egd(RAND_file_name(f_randfile, sizeof(f_randfile))) < 0) {
|
|
|
68f3b8 |
- /* Not an EGD, so read and write to it */
|
|
|
68f3b8 |
- if (RAND_load_file(f_randfile, -1))
|
|
|
68f3b8 |
- RAND_write_file(f_randfile);
|
|
|
68f3b8 |
- }
|
|
|
68f3b8 |
-
|
|
|
68f3b8 |
SSLeay_add_ssl_algorithms();
|
|
|
68f3b8 |
context = SSL_CTX_new(SSLv23_client_method());
|
|
|
68f3b8 |
SSL_CTX_set_options(context, SSL_OP_ALL);
|