summaryrefslogtreecommitdiff
path: root/src/lib/libssl/d1_srvr.c
diff options
context:
space:
mode:
authorderaadt <>2014-04-14 17:45:38 +0000
committerderaadt <>2014-04-14 17:45:38 +0000
commitfbbc137e481f092be7bdc3fedb505f5c2d89eba0 (patch)
tree9a82fc040475abf4e516b4c99e34037b7ef267da /src/lib/libssl/d1_srvr.c
parent64b5c0c827fdf0a319303f85f2a6cecdf997f204 (diff)
downloadopenbsd-fbbc137e481f092be7bdc3fedb505f5c2d89eba0.tar.gz
openbsd-fbbc137e481f092be7bdc3fedb505f5c2d89eba0.tar.bz2
openbsd-fbbc137e481f092be7bdc3fedb505f5c2d89eba0.zip
So the OpenSSL codebase does "get the time, add it as a random seed"
in a bunch of places inside the TLS engine, to try to keep entropy high. I wonder if their moto is "If you can't solve a problem, at least try to do it badly". ok miod
Diffstat (limited to 'src/lib/libssl/d1_srvr.c')
-rw-r--r--src/lib/libssl/d1_srvr.c2
1 files changed, 0 insertions, 2 deletions
diff --git a/src/lib/libssl/d1_srvr.c b/src/lib/libssl/d1_srvr.c
index 95dffe9484..164fcfbf1f 100644
--- a/src/lib/libssl/d1_srvr.c
+++ b/src/lib/libssl/d1_srvr.c
@@ -145,7 +145,6 @@ int
145dtls1_accept(SSL *s) 145dtls1_accept(SSL *s)
146{ 146{
147 BUF_MEM *buf; 147 BUF_MEM *buf;
148 unsigned long Time = (unsigned long)time(NULL);
149 void (*cb)(const SSL *ssl, int type, int val) = NULL; 148 void (*cb)(const SSL *ssl, int type, int val) = NULL;
150 unsigned long alg_k; 149 unsigned long alg_k;
151 int ret = -1; 150 int ret = -1;
@@ -156,7 +155,6 @@ dtls1_accept(SSL *s)
156 char labelbuffer[sizeof(DTLS1_SCTP_AUTH_LABEL)]; 155 char labelbuffer[sizeof(DTLS1_SCTP_AUTH_LABEL)];
157#endif 156#endif
158 157
159 RAND_add(&Time, sizeof(Time), 0);
160 ERR_clear_error(); 158 ERR_clear_error();
161 errno = 0; 159 errno = 0;
162 160