aboutsummaryrefslogtreecommitdiffstats
path: root/apps/req.c
diff options
context:
space:
mode:
authorRichard Levitte <levitte@openssl.org>2000-06-28 16:47:45 +0000
committerRichard Levitte <levitte@openssl.org>2000-06-28 16:47:45 +0000
commitf365611ca32190a032db1e292ccf55f110acea9a (patch)
tree5cd87b63feb2db1a4fa6c73e74d6fb3177e6aa57 /apps/req.c
parent523c83ec9a200ccb35c21561078a258b61f51795 (diff)
downloadopenssl-f365611ca32190a032db1e292ccf55f110acea9a.tar.gz
Undo the changes I just made. I'm not sure what I was thinking of.
The message to everyone is "Do not hack OpenSSL when stressed"...
Diffstat (limited to 'apps/req.c')
-rw-r--r--apps/req.c13
1 files changed, 2 insertions, 11 deletions
diff --git a/apps/req.c b/apps/req.c
index 55e53342cf..fd26ed8343 100644
--- a/apps/req.c
+++ b/apps/req.c
@@ -103,7 +103,6 @@
* -key file - make a request using key in file (or use it for verification).
* -keyform - key file format.
* -rand file(s) - load the file(s) into the PRNG.
- * -egd file - load PRNG seed from EGD named socket.
* -newkey - make a key and a request.
* -modulus - print RSA modulus.
* -x509 - output a self signed X509 structure instead.
@@ -157,7 +156,7 @@ int MAIN(int argc, char **argv)
char *req_exts = NULL;
EVP_CIPHER *cipher=NULL;
int modulus=0;
- char *inrand=NULL,*inegd=NULL;
+ char *inrand=NULL;
char *passargin = NULL, *passargout = NULL;
char *passin = NULL, *passout = NULL;
char *p;
@@ -246,11 +245,6 @@ int MAIN(int argc, char **argv)
if (--argc < 1) goto bad;
inrand= *(++argv);
}
- else if (strcmp(*argv,"-egd") == 0)
- {
- if (--argc < 1) goto bad;
- inegd= *(++argv);
- }
else if (strcmp(*argv,"-newkey") == 0)
{
int is_numeric;
@@ -387,7 +381,6 @@ bad:
BIO_printf(bio_err," -rand file%cfile%c...\n", LIST_SEPARATOR_CHAR, LIST_SEPARATOR_CHAR);
BIO_printf(bio_err," load the file (or the files in the directory) into\n");
BIO_printf(bio_err," the random number generator\n");
- BIO_printf(bio_err," -egd file load random seed from EGD socket\n");
BIO_printf(bio_err," -newkey rsa:bits generate a new RSA key of 'bits' in size\n");
BIO_printf(bio_err," -newkey dsa:file generate a new DSA key, parameters taken from CA in 'file'\n");
@@ -562,9 +555,7 @@ bad:
app_RAND_load_file(randfile, bio_err, 0);
if (inrand)
app_RAND_load_files(inrand);
- if (inegd)
- RAND_egd(inegd);
-
+
if (newkey <= 0)
{
newkey=(int)CONF_get_number(req_conf,SECTION,BITS);