diff options
Diffstat (limited to 'www-client/elinks/files/elinks-0.12_pre5-rand-egd.patch')
-rw-r--r-- | www-client/elinks/files/elinks-0.12_pre5-rand-egd.patch | 20 |
1 files changed, 0 insertions, 20 deletions
diff --git a/www-client/elinks/files/elinks-0.12_pre5-rand-egd.patch b/www-client/elinks/files/elinks-0.12_pre5-rand-egd.patch deleted file mode 100644 index 6c5679a95bbd..000000000000 --- a/www-client/elinks/files/elinks-0.12_pre5-rand-egd.patch +++ /dev/null @@ -1,20 +0,0 @@ ---- a/src/network/ssl/ssl.c -+++ b/src/network/ssl/ssl.c -@@ -84,11 +84,16 @@ init_openssl(struct module *module) - * cannot initialize the PRNG and so every attempt to use SSL fails. - * It's actually an OpenSSL FAQ, and according to them, it's up to the - * application coders to seed the RNG. -- William Yodlowsky */ -- if (RAND_egd(RAND_file_name(f_randfile, sizeof(f_randfile))) < 0) { -+ RAND_file_name(f_randfile, sizeof(f_randfile)); -+#ifdef HAVE_RAND_EGD -+ if (RAND_egd(f_randfile) < 0) { - /* Not an EGD, so read and write to it */ -+#endif - if (RAND_load_file(f_randfile, -1)) - RAND_write_file(f_randfile); -+#ifdef HAVE_RAND_EGD - } -+#endif - - SSLeay_add_ssl_algorithms(); - context = SSL_CTX_new(SSLv23_client_method()); |