openbsd-ports/security/p5-Net_SSLeay/patches/patch-SSLeay_pm
sturm 2bed0118ca don't fall back to an insecure entropy source
from ubuntu via Alexander Bluhm <bluhm at genua.de>
2006-01-21 18:02:56 +00:00

23 lines
885 B
Plaintext

$OpenBSD: patch-SSLeay_pm,v 1.1 2006/01/21 18:02:56 sturm Exp $
--- SSLeay.pm.orig Sat Jan 21 18:58:09 2006
+++ SSLeay.pm Sat Jan 21 18:58:31 2006
@@ -1853,8 +1853,8 @@ sub randomize (;$$) {
my ($rn_seed_file, $seed, $egd_path) = @_;
my $rnsf = defined($rn_seed_file) && -r $rn_seed_file;
+ $egd_path = '';
$egd_path = $ENV{'EGD_PATH'} if $ENV{'EGD_PATH'};
- $egd_path = '/tmp/entropy' unless $egd_path;
RAND_seed(rand() + $$); # Stir it with time and pid
@@ -1865,7 +1865,7 @@ sub randomize (;$$) {
RAND_load_file($rn_seed_file, -s _) if $rnsf;
RAND_seed($seed) if $seed;
RAND_seed($ENV{RND_SEED}) if $ENV{RND_SEED};
- RAND_egd($egd_path) if -S $egd_path;
+ RAND_egd($egd_path) if -e $egd_path && -S _;
RAND_load_file($Net::SSLeay::random_device, $Net::SSLeay::how_random/8)
if -r $Net::SSLeay::random_device;
}