From 5df353beff71ba1f1e84cd691ef3edf892aa5311 Mon Sep 17 00:00:00 2001 From: deraadt <> Date: Mon, 2 Jun 2014 15:08:38 +0000 Subject: A few months back there was a big community fuss regarding direct-use of the intel RDRAND instruction. Consensus was RDRAND should probably only be used as an additional source of entropy in a mixer. Guess which library bends over backwards to provide easy access to RDRAND? Yep. Guess which applications are using this support? Not even one... but still, this is being placed as a trap for someone. Send this support straight to the abyss. ok kettenis --- src/lib/libcrypto/engine/eng_all.c | 3 --- 1 file changed, 3 deletions(-) (limited to 'src/lib/libcrypto/engine/eng_all.c') diff --git a/src/lib/libcrypto/engine/eng_all.c b/src/lib/libcrypto/engine/eng_all.c index f318ea69c4..fd36594a0b 100644 --- a/src/lib/libcrypto/engine/eng_all.c +++ b/src/lib/libcrypto/engine/eng_all.c @@ -75,9 +75,6 @@ void ENGINE_load_builtin_engines(void) #endif #ifndef OPENSSL_NO_RSAX ENGINE_load_rsax(); -#endif -#ifndef OPENSSL_NO_RDRAND - ENGINE_load_rdrand(); #endif ENGINE_load_dynamic(); #ifndef OPENSSL_NO_STATIC_ENGINE -- cgit v1.2.3-55-g6feb