42 строки
1.3 KiB
Diff
42 строки
1.3 KiB
Diff
From 06a4ef9dd099b011346fccd2a1cc96711cf129f3 Mon Sep 17 00:00:00 2001
|
|
From: Kamil Dudka <kdudka@redhat.com>
|
|
Date: Mon, 11 Apr 2022 09:14:52 +0200
|
|
Subject: [PATCH] Resolves: #90663 - prevent crash when HOME is unset
|
|
|
|
elinks-0.11.0-ssl-noegd.patch rebased on 0.15.0
|
|
---
|
|
src/network/ssl/ssl.c | 17 -----------------
|
|
1 file changed, 17 deletions(-)
|
|
|
|
diff --git a/src/network/ssl/ssl.c b/src/network/ssl/ssl.c
|
|
index dbc506c..c09daa2 100644
|
|
--- a/src/network/ssl/ssl.c
|
|
+++ b/src/network/ssl/ssl.c
|
|
@@ -123,23 +123,6 @@ ssl_set_private_paths(SSL_CTX *ctx)
|
|
static void
|
|
init_openssl(struct module *module)
|
|
{
|
|
- char f_randfile[PATH_MAX];
|
|
-
|
|
- /* In a nutshell, on OS's without a /dev/urandom, the OpenSSL library
|
|
- * cannot initialize the PRNG and so every attempt to use SSL fails.
|
|
- * It's actually an OpenSSL FAQ, and according to them, it's up to the
|
|
- * application coders to seed the RNG. -- William Yodlowsky */
|
|
- RAND_file_name(f_randfile, sizeof(f_randfile));
|
|
-#ifdef HAVE_RAND_EGD
|
|
- if (RAND_egd(f_randfile) < 0) {
|
|
- /* Not an EGD, so read and write to it */
|
|
-#endif
|
|
- if (RAND_load_file(f_randfile, -1))
|
|
- RAND_write_file(f_randfile);
|
|
-#ifdef HAVE_RAND_EGD
|
|
- }
|
|
-#endif
|
|
-
|
|
#if defined(HAVE_RAND_ADD) && defined(CONFIG_OS_DOS)
|
|
{
|
|
unsigned char *os_pool;
|
|
--
|
|
2.34.1
|
|
|