diff options
author | Nick Mathewson <nickm@torproject.org> | 2015-05-19 16:17:03 -0400 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2015-05-20 15:27:36 -0400 |
commit | f8f407d66a4389035852a229a6945cc08a64b198 (patch) | |
tree | 527054f001d4f1ab0f6ddcbd4727a2a5333debef /src/or/main.c | |
parent | 971f0f8e18c0f3ea9f2aa74a54951235269a1cd1 (diff) | |
download | tor-f8f407d66a4389035852a229a6945cc08a64b198.tar.gz tor-f8f407d66a4389035852a229a6945cc08a64b198.zip |
Now that OpenSSL 0.9.8 is dead, crypto_seed_rng() needs no args
It needed an argument before because it wasn't safe to call
RAND_poll() on openssl 0.9.8c if you had already opened more fds
than would fit in fd_set.
Diffstat (limited to 'src/or/main.c')
-rw-r--r-- | src/or/main.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/src/or/main.c b/src/or/main.c index 651291b57b..3f785a2759 100644 --- a/src/or/main.c +++ b/src/or/main.c @@ -1317,7 +1317,7 @@ run_scheduled_events(time_t now) if (time_to_add_entropy < now) { if (time_to_add_entropy) { /* We already seeded once, so don't die on failure. */ - crypto_seed_rng(0); + crypto_seed_rng(); } /** How often do we add more entropy to OpenSSL's RNG pool? */ #define ENTROPY_INTERVAL (60*60) |