diff options
author | Richard Levitte <levitte@openssl.org> | 2000-06-28 16:47:45 +0000 |
---|---|---|
committer | Richard Levitte <levitte@openssl.org> | 2000-06-28 16:47:45 +0000 |
commit | f365611ca32190a032db1e292ccf55f110acea9a (patch) | |
tree | 5cd87b63feb2db1a4fa6c73e74d6fb3177e6aa57 /crypto | |
parent | 523c83ec9a200ccb35c21561078a258b61f51795 (diff) | |
download | openssl-f365611ca32190a032db1e292ccf55f110acea9a.tar.gz |
Undo the changes I just made. I'm not sure what I was thinking of.
The message to everyone is "Do not hack OpenSSL when stressed"...
Diffstat (limited to 'crypto')
-rw-r--r-- | crypto/rand/rand_egd.c | 11 |
1 files changed, 0 insertions, 11 deletions
diff --git a/crypto/rand/rand_egd.c b/crypto/rand/rand_egd.c index ad5385acaa..02a0d86fa3 100644 --- a/crypto/rand/rand_egd.c +++ b/crypto/rand/rand_egd.c @@ -54,7 +54,6 @@ * */ -#include <stdlib.h> #include <openssl/rand.h> /* Query the EGD <URL: http://www.lothar.com/tech/crypto/>. @@ -84,17 +83,12 @@ int RAND_egd_bytes(const char *path,int bytes) int RAND_egd(const char *path) { - const char *s; int ret = -1; struct sockaddr_un addr; int len, num; int fd = -1; unsigned char buf[256]; - s=getenv("RANDEGD"); - if (s != NULL) - path = s; - memset(&addr, 0, sizeof(addr)); addr.sun_family = AF_UNIX; if (strlen(path) > sizeof(addr.sun_path)) @@ -121,17 +115,12 @@ int RAND_egd(const char *path) int RAND_egd_bytes(const char *path,int bytes) { - const char *s; int ret = 0; struct sockaddr_un addr; int len, num; int fd = -1; unsigned char buf[255]; - s=getenv("RANDEGD"); - if (s != NULL) - path = s; - memset(&addr, 0, sizeof(addr)); addr.sun_family = AF_UNIX; if (strlen(path) > sizeof(addr.sun_path)) |