summaryrefslogtreecommitdiff
path: root/src/or/rendclient.c
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2015-11-25 10:42:00 -0500
committerNick Mathewson <nickm@torproject.org>2015-11-25 22:29:59 -0500
commitddcbe264745a0c10d80d8ad74125d23eb251662d (patch)
treeb522f4302d71982a38ad0caf34b77b6c675103c2 /src/or/rendclient.c
parent10fdee628552bca65ddb86b17e0b057628ad3703 (diff)
downloadtor-ddcbe264745a0c10d80d8ad74125d23eb251662d.tar.gz
tor-ddcbe264745a0c10d80d8ad74125d23eb251662d.zip
Now that crypto_rand() cannot fail, it should return void.
Diffstat (limited to 'src/or/rendclient.c')
-rw-r--r--src/or/rendclient.c6
1 files changed, 1 insertions, 5 deletions
diff --git a/src/or/rendclient.c b/src/or/rendclient.c
index a39e518e99..11e940ce85 100644
--- a/src/or/rendclient.c
+++ b/src/or/rendclient.c
@@ -65,11 +65,7 @@ rend_client_send_establish_rendezvous(origin_circuit_t *circ)
tor_assert(circ->rend_data);
log_info(LD_REND, "Sending an ESTABLISH_RENDEZVOUS cell");
- if (crypto_rand(circ->rend_data->rend_cookie, REND_COOKIE_LEN) < 0) {
- log_warn(LD_BUG, "Internal error: Couldn't produce random cookie.");
- circuit_mark_for_close(TO_CIRCUIT(circ), END_CIRC_REASON_INTERNAL);
- return -1;
- }
+ crypto_rand(circ->rend_data->rend_cookie, REND_COOKIE_LEN);
/* Set timestamp_dirty, because circuit_expire_building expects it,
* and the rend cookie also means we've used the circ. */