@@ -4971,38 +4971,6 @@ _ssl_RAND_status_impl(PyObject *module)
49714971 return PyLong_FromLong (RAND_status ());
49724972}
49734973
4974- #ifndef OPENSSL_NO_EGD
4975- /* LCOV_EXCL_START */
4976- /*[clinic input]
4977- _ssl.RAND_egd
4978- path: object(converter="PyUnicode_FSConverter")
4979- /
4980-
4981- Queries the entropy gather daemon (EGD) on the socket named by 'path'.
4982-
4983- Returns number of bytes read. Raises SSLError if connection to EGD
4984- fails or if it does not provide enough data to seed PRNG.
4985- [clinic start generated code]*/
4986-
4987- static PyObject *
4988- _ssl_RAND_egd_impl (PyObject * module , PyObject * path )
4989- /*[clinic end generated code: output=02a67c7c367f52fa input=1aeb7eb948312195]*/
4990- {
4991- int bytes = RAND_egd (PyBytes_AsString (path ));
4992- Py_DECREF (path );
4993- if (bytes == -1 ) {
4994- PyErr_SetString (PySSLErrorObject ,
4995- "EGD connection failed or EGD did not return "
4996- "enough data to seed the PRNG" );
4997- return NULL ;
4998- }
4999- return PyLong_FromLong (bytes );
5000- }
5001- /* LCOV_EXCL_STOP */
5002- #endif /* OPENSSL_NO_EGD */
5003-
5004-
5005-
50064974/*[clinic input]
50074975_ssl.get_default_verify_paths
50084976
@@ -5445,7 +5413,6 @@ static PyMethodDef PySSL_methods[] = {
54455413 _SSL_RAND_ADD_METHODDEF
54465414 _SSL_RAND_BYTES_METHODDEF
54475415 _SSL_RAND_PSEUDO_BYTES_METHODDEF
5448- _SSL_RAND_EGD_METHODDEF
54495416 _SSL_RAND_STATUS_METHODDEF
54505417 _SSL_GET_DEFAULT_VERIFY_PATHS_METHODDEF
54515418 _SSL_ENUM_CERTIFICATES_METHODDEF
0 commit comments