summaryrefslogtreecommitdiff
path: root/src/lib/libssl/d1_clnt.c
diff options
context:
space:
mode:
authorderaadt <>2014-04-14 17:45:38 +0000
committerderaadt <>2014-04-14 17:45:38 +0000
commit67dc984dfef68b4f0fe3ddcf4b7e2481dd2c62b9 (patch)
tree9a82fc040475abf4e516b4c99e34037b7ef267da /src/lib/libssl/d1_clnt.c
parent20ca94a4292674751b6713ef6106d34384cef84c (diff)
downloadopenbsd-67dc984dfef68b4f0fe3ddcf4b7e2481dd2c62b9.tar.gz
openbsd-67dc984dfef68b4f0fe3ddcf4b7e2481dd2c62b9.tar.bz2
openbsd-67dc984dfef68b4f0fe3ddcf4b7e2481dd2c62b9.zip
So the OpenSSL codebase does "get the time, add it as a random seed"
in a bunch of places inside the TLS engine, to try to keep entropy high. I wonder if their moto is "If you can't solve a problem, at least try to do it badly". ok miod
Diffstat (limited to 'src/lib/libssl/d1_clnt.c')
-rw-r--r--src/lib/libssl/d1_clnt.c2
1 files changed, 0 insertions, 2 deletions
diff --git a/src/lib/libssl/d1_clnt.c b/src/lib/libssl/d1_clnt.c
index 15c4bca58c..4c6aac7536 100644
--- a/src/lib/libssl/d1_clnt.c
+++ b/src/lib/libssl/d1_clnt.c
@@ -147,7 +147,6 @@ int
147dtls1_connect(SSL *s) 147dtls1_connect(SSL *s)
148{ 148{
149 BUF_MEM *buf = NULL; 149 BUF_MEM *buf = NULL;
150 unsigned long Time = (unsigned long)time(NULL);
151 void (*cb)(const SSL *ssl, int type, int val) = NULL; 150 void (*cb)(const SSL *ssl, int type, int val) = NULL;
152 int ret = -1; 151 int ret = -1;
153 int new_state, state, skip = 0; 152 int new_state, state, skip = 0;
@@ -156,7 +155,6 @@ dtls1_connect(SSL *s)
156 char labelbuffer[sizeof(DTLS1_SCTP_AUTH_LABEL)]; 155 char labelbuffer[sizeof(DTLS1_SCTP_AUTH_LABEL)];
157#endif 156#endif
158 157
159 RAND_add(&Time, sizeof(Time), 0);
160 ERR_clear_error(); 158 ERR_clear_error();
161 errno = 0; 159 errno = 0;
162 160