From 4fcfcc294e7cb17956e283d09050cb997093a35d Mon Sep 17 00:00:00 2001 From: fanquake Date: Sat, 26 Oct 2019 08:22:11 -0400 Subject: random: stop retrieving random bytes from OpenSSL On the ::SLOW path we would use OpenSSL as an additional source of random bytes. This commit removes that functionality. Note that this was always only an additional source, and that we never checked the return value RAND_bytes(): https://www.openssl.org/docs/manmaster/man3/RAND_bytes.html RAND_bytes() puts num cryptographically strong pseudo-random bytes into buf. --- src/random.h | 1 - 1 file changed, 1 deletion(-) (limited to 'src/random.h') diff --git a/src/random.h b/src/random.h index 7768f9d3c5..2d8ab085e3 100644 --- a/src/random.h +++ b/src/random.h @@ -35,7 +35,6 @@ * that fast seeding includes, but additionally: * - OS entropy (/dev/urandom, getrandom(), ...). The application will terminate if * this entropy source fails. - * - Bytes from OpenSSL's RNG (which itself may be seeded from various sources) * - Another high-precision timestamp (indirectly committing to a benchmark of all the * previous sources). * These entropy sources are slower, but designed to make sure the RNG state contains -- cgit v1.2.3