summaryrefslogtreecommitdiff
path: root/src/lib/libssl/d1_clnt.c
diff options
context:
space:
mode:
authorderaadt <>2014-04-14 17:45:38 +0000
committerderaadt <>2014-04-14 17:45:38 +0000
commitfbbc137e481f092be7bdc3fedb505f5c2d89eba0 (patch)
tree9a82fc040475abf4e516b4c99e34037b7ef267da /src/lib/libssl/d1_clnt.c
parent64b5c0c827fdf0a319303f85f2a6cecdf997f204 (diff)
downloadopenbsd-fbbc137e481f092be7bdc3fedb505f5c2d89eba0.tar.gz
openbsd-fbbc137e481f092be7bdc3fedb505f5c2d89eba0.tar.bz2
openbsd-fbbc137e481f092be7bdc3fedb505f5c2d89eba0.zip
So the OpenSSL codebase does "get the time, add it as a random seed"
in a bunch of places inside the TLS engine, to try to keep entropy high. I wonder if their moto is "If you can't solve a problem, at least try to do it badly". ok miod
Diffstat (limited to 'src/lib/libssl/d1_clnt.c')
-rw-r--r--src/lib/libssl/d1_clnt.c2
1 files changed, 0 insertions, 2 deletions
diff --git a/src/lib/libssl/d1_clnt.c b/src/lib/libssl/d1_clnt.c
index 15c4bca58c..4c6aac7536 100644
--- a/src/lib/libssl/d1_clnt.c
+++ b/src/lib/libssl/d1_clnt.c
@@ -147,7 +147,6 @@ int
147dtls1_connect(SSL *s) 147dtls1_connect(SSL *s)
148{ 148{
149 BUF_MEM *buf = NULL; 149 BUF_MEM *buf = NULL;
150 unsigned long Time = (unsigned long)time(NULL);
151 void (*cb)(const SSL *ssl, int type, int val) = NULL; 150 void (*cb)(const SSL *ssl, int type, int val) = NULL;
152 int ret = -1; 151 int ret = -1;
153 int new_state, state, skip = 0; 152 int new_state, state, skip = 0;
@@ -156,7 +155,6 @@ dtls1_connect(SSL *s)
156 char labelbuffer[sizeof(DTLS1_SCTP_AUTH_LABEL)]; 155 char labelbuffer[sizeof(DTLS1_SCTP_AUTH_LABEL)];
157#endif 156#endif
158 157
159 RAND_add(&Time, sizeof(Time), 0);
160 ERR_clear_error(); 158 ERR_clear_error();
161 errno = 0; 159 errno = 0;
162 160