diff options
author | Nick Mathewson <nickm@torproject.org> | 2015-05-20 15:33:22 -0400 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2015-05-20 15:33:22 -0400 |
commit | ed02a409cfdd51671ff1d80c86cfc7d6458f201f (patch) | |
tree | 527aeae3937418ca204426b682d7efd61c0ad57b /src/or/main.c | |
parent | 32bd533ddac5bd7d594a81119449b3d30206eedd (diff) | |
parent | e9677c8f8d3a24bc572d63dd85fa14e8d596ad78 (diff) | |
download | tor-ed02a409cfdd51671ff1d80c86cfc7d6458f201f.tar.gz tor-ed02a409cfdd51671ff1d80c86cfc7d6458f201f.zip |
Merge branch 'bug16034_no_more_openssl_098_squashed'
Conflicts:
src/test/testing_common.c
Diffstat (limited to 'src/or/main.c')
-rw-r--r-- | src/or/main.c | 15 |
1 files changed, 8 insertions, 7 deletions
diff --git a/src/or/main.c b/src/or/main.c index 3fb7de6f6c..74e6b33397 100644 --- a/src/or/main.c +++ b/src/or/main.c @@ -1336,7 +1336,7 @@ run_scheduled_events(time_t now) if (time_to.add_entropy < now) { if (time_to.add_entropy) { /* We already seeded once, so don't die on failure. */ - crypto_seed_rng(0); + crypto_seed_rng(); } /** How often do we add more entropy to OpenSSL's RNG pool? */ #define ENTROPY_INTERVAL (60*60) @@ -2333,12 +2333,13 @@ dumpstats(int severity) if (conn->type == CONN_TYPE_OR) { or_connection_t *or_conn = TO_OR_CONN(conn); if (or_conn->tls) { - tor_tls_get_buffer_sizes(or_conn->tls, &rbuf_cap, &rbuf_len, - &wbuf_cap, &wbuf_len); - tor_log(severity, LD_GENERAL, - "Conn %d: %d/%d bytes used on OpenSSL read buffer; " - "%d/%d bytes used on write buffer.", - i, (int)rbuf_len, (int)rbuf_cap, (int)wbuf_len, (int)wbuf_cap); + if (tor_tls_get_buffer_sizes(or_conn->tls, &rbuf_cap, &rbuf_len, + &wbuf_cap, &wbuf_len) == 0) { + tor_log(severity, LD_GENERAL, + "Conn %d: %d/%d bytes used on OpenSSL read buffer; " + "%d/%d bytes used on write buffer.", + i, (int)rbuf_len, (int)rbuf_cap, (int)wbuf_len, (int)wbuf_cap); + } } } } |