diff options
author | Daniel Stenberg <daniel@haxx.se> | 2014-03-20 11:17:40 +0100 |
---|---|---|
committer | Daniel Stenberg <daniel@haxx.se> | 2014-06-11 23:15:48 +0200 |
commit | e95ca7cec9c8907646a2bf87e295a638d5b518fc (patch) | |
tree | 62a7b361221a967288d0e0e83bda9d876ed1e232 /lib/vtls/vtls.c | |
parent | ceacbacd149aa64612968d41c03d0577d427f075 (diff) | |
download | curl-e95ca7cec9c8907646a2bf87e295a638d5b518fc.tar.gz |
NTLM: set a fake entropy for debug builds with CURL_ENTROPY set
Curl_rand() will return a dummy and repatable random value for this
case. Makes it possible to write test cases that verify output.
Also, fake timestamp with CURL_FORCETIME set.
Only when built debug enabled of course.
Curl_ssl_random() was not used anymore so it has been
removed. Curl_rand() is enough.
create_digest_md5_message: generate base64 instead of hex string
curl_sasl: also fix memory leaks in some OOM situations
Diffstat (limited to 'lib/vtls/vtls.c')
-rw-r--r-- | lib/vtls/vtls.c | 14 |
1 files changed, 1 insertions, 13 deletions
diff --git a/lib/vtls/vtls.c b/lib/vtls/vtls.c index 58295a4de..6c2295a45 100644 --- a/lib/vtls/vtls.c +++ b/lib/vtls/vtls.c @@ -209,7 +209,6 @@ unsigned int Curl_rand(struct SessionHandle *data) } else randseed++; - return randseed; } #endif @@ -218,7 +217,7 @@ unsigned int Curl_rand(struct SessionHandle *data) (void)data; #else if(data) { - Curl_ssl_random(data, (unsigned char *)&r, sizeof(r)); + curlssl_random(data, (unsigned char *)&r, sizeof(r)); return r; } #endif @@ -682,17 +681,6 @@ CURLcode Curl_ssl_push_certinfo(struct SessionHandle *data, return Curl_ssl_push_certinfo_len(data, certnum, label, value, valuelen); } -/* these functions are only provided by some SSL backends */ - -#ifdef have_curlssl_random -void Curl_ssl_random(struct SessionHandle *data, - unsigned char *entropy, - size_t length) -{ - curlssl_random(data, entropy, length); -} -#endif - #ifdef have_curlssl_md5sum void Curl_ssl_md5sum(unsigned char *tmp, /* input */ size_t tmplen, |