summaryrefslogtreecommitdiff
path: root/src/test/test_crypto.c
diff options
context:
space:
mode:
authorNick Mathewson <nickm@torproject.org>2015-05-19 16:17:03 -0400
committerNick Mathewson <nickm@torproject.org>2015-05-20 15:27:36 -0400
commitf8f407d66a4389035852a229a6945cc08a64b198 (patch)
tree527054f001d4f1ab0f6ddcbd4727a2a5333debef /src/test/test_crypto.c
parent971f0f8e18c0f3ea9f2aa74a54951235269a1cd1 (diff)
downloadtor-f8f407d66a4389035852a229a6945cc08a64b198.tar.gz
tor-f8f407d66a4389035852a229a6945cc08a64b198.zip
Now that OpenSSL 0.9.8 is dead, crypto_seed_rng() needs no args
It needed an argument before because it wasn't safe to call RAND_poll() on openssl 0.9.8c if you had already opened more fds than would fit in fd_set.
Diffstat (limited to 'src/test/test_crypto.c')
-rw-r--r--src/test/test_crypto.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/src/test/test_crypto.c b/src/test/test_crypto.c
index e9fb8bf084..5c263baf51 100644
--- a/src/test/test_crypto.c
+++ b/src/test/test_crypto.c
@@ -72,7 +72,7 @@ test_crypto_rng(void *arg)
/* Try out RNG. */
(void)arg;
- tt_assert(! crypto_seed_rng(0));
+ tt_assert(! crypto_seed_rng());
crypto_rand(data1, 100);
crypto_rand(data2, 100);
tt_mem_op(data1,OP_NE, data2,100);