From 5df353beff71ba1f1e84cd691ef3edf892aa5311 Mon Sep 17 00:00:00 2001 From: deraadt <> Date: Mon, 2 Jun 2014 15:08:38 +0000 Subject: A few months back there was a big community fuss regarding direct-use of the intel RDRAND instruction. Consensus was RDRAND should probably only be used as an additional source of entropy in a mixer. Guess which library bends over backwards to provide easy access to RDRAND? Yep. Guess which applications are using this support? Not even one... but still, this is being placed as a trap for someone. Send this support straight to the abyss. ok kettenis --- src/lib/libcrypto/engine/engine.h | 1 - 1 file changed, 1 deletion(-) (limited to 'src/lib/libcrypto/engine/engine.h') diff --git a/src/lib/libcrypto/engine/engine.h b/src/lib/libcrypto/engine/engine.h index 5c2f7b0527..e99ad750e4 100644 --- a/src/lib/libcrypto/engine/engine.h +++ b/src/lib/libcrypto/engine/engine.h @@ -320,7 +320,6 @@ void ENGINE_load_padlock(void); #endif void ENGINE_load_cryptodev(void); void ENGINE_load_rsax(void); -void ENGINE_load_rdrand(void); void ENGINE_load_builtin_engines(void); /* Get and set global flags (ENGINE_TABLE_FLAG_***) for the implementation -- cgit v1.2.3-55-g6feb