diff options
author | Moonchild <moonchild@palemoon.org> | 2021-01-07 21:26:47 +0000 |
---|---|---|
committer | Moonchild <moonchild@palemoon.org> | 2021-01-07 21:26:47 +0000 |
commit | c1825acab02a9eb5f80e27986fab8d02422247f9 (patch) | |
tree | 5ca810039497740dcba678859e5b562b63dfc09c /ipc | |
parent | 5af0c434b97770f38c505f03a085229a12c277d4 (diff) | |
parent | 5d95844f496166ee54838796c013d7ee5a1ec6ce (diff) | |
download | UXP-c1825acab02a9eb5f80e27986fab8d02422247f9.tar UXP-c1825acab02a9eb5f80e27986fab8d02422247f9.tar.gz UXP-c1825acab02a9eb5f80e27986fab8d02422247f9.tar.lz UXP-c1825acab02a9eb5f80e27986fab8d02422247f9.tar.xz UXP-c1825acab02a9eb5f80e27986fab8d02422247f9.zip |
Merge pull request 'Add modern FreeBSD support' (#1706) from OlCe1/UXP:FreeBSD-support-reformatted into master
Reviewed-on: https://repo.palemoon.org/MoonchildProductions/UXP/pulls/1706
Diffstat (limited to 'ipc')
-rw-r--r-- | ipc/chromium/src/third_party/libevent/evutil_rand.c | 9 | ||||
-rw-r--r-- | ipc/chromium/src/third_party/libevent/include/event2/util.h | 18 |
2 files changed, 0 insertions, 27 deletions
diff --git a/ipc/chromium/src/third_party/libevent/evutil_rand.c b/ipc/chromium/src/third_party/libevent/evutil_rand.c index 7c92bae23..3f5c05b34 100644 --- a/ipc/chromium/src/third_party/libevent/evutil_rand.c +++ b/ipc/chromium/src/third_party/libevent/evutil_rand.c @@ -138,12 +138,3 @@ evutil_secure_rng_get_bytes(void *buf, size_t n) { ev_arc4random_buf(buf, n); } - -#if !defined(__OpenBSD__) && !defined(ANDROID) && !defined(__sun__) -void -evutil_secure_rng_add_bytes(const char *buf, size_t n) -{ - arc4random_addrandom((unsigned char*)buf, - n>(size_t)INT_MAX ? INT_MAX : (int)n); -} -#endif diff --git a/ipc/chromium/src/third_party/libevent/include/event2/util.h b/ipc/chromium/src/third_party/libevent/include/event2/util.h index 78516c156..0f9212af1 100644 --- a/ipc/chromium/src/third_party/libevent/include/event2/util.h +++ b/ipc/chromium/src/third_party/libevent/include/event2/util.h @@ -672,24 +672,6 @@ void evutil_secure_rng_get_bytes(void *buf, size_t n); */ int evutil_secure_rng_init(void); -#if !defined(__OpenBSD__) && !defined(ANDROID) && !defined(__sun__) -/** Seed the random number generator with extra random bytes. - - You should almost never need to call this function; it should be - sufficient to invoke evutil_secure_rng_init(), or let Libevent take - care of calling evutil_secure_rng_init() on its own. - - If you call this function as a _replacement_ for the regular - entropy sources, then you need to be sure that your input - contains a fairly large amount of strong entropy. Doing so is - notoriously hard: most people who try get it wrong. Watch out! - - @param dat a buffer full of a strong source of random numbers - @param datlen the number of bytes to read from datlen - */ -void evutil_secure_rng_add_bytes(const char *dat, size_t datlen); -#endif - #ifdef __cplusplus } #endif |