summaryrefslogtreecommitdiffstats
path: root/crypto/rand
diff options
context:
space:
mode:
authorRichard Levitte <levitte@openssl.org>2000-06-28 16:47:45 +0000
committerRichard Levitte <levitte@openssl.org>2000-06-28 16:47:45 +0000
commitf365611ca32190a032db1e292ccf55f110acea9a (patch)
tree5cd87b63feb2db1a4fa6c73e74d6fb3177e6aa57 /crypto/rand
parent523c83ec9a200ccb35c21561078a258b61f51795 (diff)
Undo the changes I just made. I'm not sure what I was thinking of.
The message to everyone is "Do not hack OpenSSL when stressed"...
Diffstat (limited to 'crypto/rand')
-rw-r--r--crypto/rand/rand_egd.c11
1 files changed, 0 insertions, 11 deletions
diff --git a/crypto/rand/rand_egd.c b/crypto/rand/rand_egd.c
index ad5385acaa..02a0d86fa3 100644
--- a/crypto/rand/rand_egd.c
+++ b/crypto/rand/rand_egd.c
@@ -54,7 +54,6 @@
*
*/
-#include <stdlib.h>
#include <openssl/rand.h>
/* Query the EGD <URL: http://www.lothar.com/tech/crypto/>.
@@ -84,17 +83,12 @@ int RAND_egd_bytes(const char *path,int bytes)
int RAND_egd(const char *path)
{
- const char *s;
int ret = -1;
struct sockaddr_un addr;
int len, num;
int fd = -1;
unsigned char buf[256];
- s=getenv("RANDEGD");
- if (s != NULL)
- path = s;
-
memset(&addr, 0, sizeof(addr));
addr.sun_family = AF_UNIX;
if (strlen(path) > sizeof(addr.sun_path))
@@ -121,17 +115,12 @@ int RAND_egd(const char *path)
int RAND_egd_bytes(const char *path,int bytes)
{
- const char *s;
int ret = 0;
struct sockaddr_un addr;
int len, num;
int fd = -1;
unsigned char buf[255];
- s=getenv("RANDEGD");
- if (s != NULL)
- path = s;
-
memset(&addr, 0, sizeof(addr));
addr.sun_family = AF_UNIX;
if (strlen(path) > sizeof(addr.sun_path))