Remove seed_rng calls from scp, sftp, sftp-server.
These binaries don't use OpenSSL's random functions. The next step will be to stop linking them against libcrypto. ok djm@
This commit is contained in:
parent
d73f77b8cb
commit
1bdf86725b
2
scp.c
2
scp.c
|
@ -455,8 +455,6 @@ main(int argc, char **argv)
|
|||
/* Ensure that fds 0, 1 and 2 are open or directed to /dev/null */
|
||||
sanitise_stdfd();
|
||||
|
||||
seed_rng();
|
||||
|
||||
msetlocale();
|
||||
|
||||
/* Copy argv, because we modify it */
|
||||
|
|
|
@ -42,8 +42,6 @@ main(int argc, char **argv)
|
|||
/* Ensure that fds 0, 1 and 2 are open or directed to /dev/null */
|
||||
sanitise_stdfd();
|
||||
|
||||
seed_rng();
|
||||
|
||||
if ((user_pw = getpwuid(getuid())) == NULL) {
|
||||
fprintf(stderr, "No user found for uid %lu\n",
|
||||
(u_long)getuid());
|
||||
|
|
Loading…
Reference in New Issue