Browse Source

A few months back there was a big community fuss regarding direct-use

of the intel RDRAND instruction.  Consensus was RDRAND should probably
only be used as an additional source of entropy in a mixer.
Guess which library bends over backwards to provide easy access to
RDRAND?  Yep.  Guess which applications are using this support?  Not
even one... but still, this is being placed as a trap for someone.
Send this support straight to the abyss.
ok kettenis
OPENBSD_5_6
deraadt 10 years ago
parent
commit
8cc9987be6
1 changed files with 2 additions and 2 deletions
  1. +2
    -2
      src/lib/libcrypto/crypto/Makefile

+ 2
- 2
src/lib/libcrypto/crypto/Makefile View File

@ -1,4 +1,4 @@
# $OpenBSD: Makefile,v 1.37 2014/05/25 17:29:51 tedu Exp $
# $OpenBSD: Makefile,v 1.38 2014/06/02 15:08:38 deraadt Exp $
LIB= crypto
@ -133,7 +133,7 @@ SRCS+= eng_table.c eng_pkey.c eng_fat.c eng_all.c
SRCS+= tb_rsa.c tb_dsa.c tb_ecdsa.c tb_dh.c tb_ecdh.c tb_rand.c tb_store.c
SRCS+= tb_cipher.c tb_digest.c tb_pkmeth.c tb_asnmth.c
SRCS+= eng_openssl.c eng_cnf.c eng_dyn.c hw_cryptodev.c
SRCS+= eng_rsax.c eng_rdrand.c
SRCS+= eng_rsax.c
# XXX unnecessary? handled in EVP now...
# SRCS+= eng_aesni.c # local addition


Loading…
Cancel
Save