diff options
author | fanquake <fanquake@gmail.com> | 2019-10-26 08:22:11 -0400 |
---|---|---|
committer | fanquake <fanquake@gmail.com> | 2019-11-18 08:56:40 -0500 |
commit | 4fcfcc294e7cb17956e283d09050cb997093a35d (patch) | |
tree | 231dd1b4fb78e155295388e987bdf9d5b0d9b315 /src/random.h | |
parent | 5624ab0b4f844dc7c17aeb1b009f002c33c38fb3 (diff) |
random: stop retrieving random bytes from OpenSSL
On the ::SLOW path we would use OpenSSL as an additional source of
random bytes. This commit removes that functionality. Note that this was
always only an additional source, and that we never checked the return
value
RAND_bytes(): https://www.openssl.org/docs/manmaster/man3/RAND_bytes.html
RAND_bytes() puts num cryptographically strong pseudo-random bytes into buf.
Diffstat (limited to 'src/random.h')
-rw-r--r-- | src/random.h | 1 |
1 files changed, 0 insertions, 1 deletions
diff --git a/src/random.h b/src/random.h index 7768f9d3c5..2d8ab085e3 100644 --- a/src/random.h +++ b/src/random.h @@ -35,7 +35,6 @@ * that fast seeding includes, but additionally: * - OS entropy (/dev/urandom, getrandom(), ...). The application will terminate if * this entropy source fails. - * - Bytes from OpenSSL's RNG (which itself may be seeded from various sources) * - Another high-precision timestamp (indirectly committing to a benchmark of all the * previous sources). * These entropy sources are slower, but designed to make sure the RNG state contains |