diff options
author | Nick Mathewson <nickm@torproject.org> | 2008-03-21 19:18:57 +0000 |
---|---|---|
committer | Nick Mathewson <nickm@torproject.org> | 2008-03-21 19:18:57 +0000 |
commit | b5b77f8bf37a193f23c5b68f688f6175266a612f (patch) | |
tree | 644390476138db18724699ab2f04f9c7bbe3729b /src/or/main.c | |
parent | 64f38f217ae21eaa00b48749353dad62cfcb72c6 (diff) | |
download | tor-b5b77f8bf37a193f23c5b68f688f6175266a612f.tar.gz tor-b5b77f8bf37a193f23c5b68f688f6175266a612f.zip |
r19004@catbus: nickm | 2008-03-21 15:18:43 -0400
Use RAND_poll() again: the bug that made us stop using it has been fixed.
svn:r14150
Diffstat (limited to 'src/or/main.c')
-rw-r--r-- | src/or/main.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/src/or/main.c b/src/or/main.c index 396b6f3b91..5630f4efe8 100644 --- a/src/or/main.c +++ b/src/or/main.c @@ -900,7 +900,7 @@ run_scheduled_events(time_t now) if (time_to_add_entropy < now) { if (time_to_add_entropy) { /* We already seeded once, so don't die on failure. */ - crypto_seed_rng(); + crypto_seed_rng(0); } /** How often do we add more entropy to OpenSSL's RNG pool? */ #define ENTROPY_INTERVAL (60*60) @@ -1810,7 +1810,7 @@ tor_init(int argc, char *argv[]) #endif crypto_global_init(get_options()->HardwareAccel); - if (crypto_seed_rng()) { + if (crypto_seed_rng(1)) { log_err(LD_BUG, "Unable to seed random number generator. Exiting."); return -1; } |