File tree 1 file changed +4
-3
lines changed
1 file changed +4
-3
lines changed Original file line number Diff line number Diff line change @@ -1083,7 +1083,8 @@ InitializeOncePerProcessInternal(const std::vector<std::string>& args,
1083
1083
}
1084
1084
1085
1085
if (!(flags & ProcessInitializationFlags::kNoInitOpenSSL )) {
1086
- #if HAVE_OPENSSL && !defined(OPENSSL_IS_BORINGSSL)
1086
+ #if HAVE_OPENSSL
1087
+ #if !defined(OPENSSL_IS_BORINGSSL)
1087
1088
auto GetOpenSSLErrorString = []() -> std::string {
1088
1089
std::string ret;
1089
1090
ERR_print_errors_cb (
@@ -1174,7 +1175,7 @@ InitializeOncePerProcessInternal(const std::vector<std::string>& args,
1174
1175
1175
1176
// Ensure CSPRNG is properly seeded.
1176
1177
CHECK (crypto::CSPRNG (nullptr , 0 ).is_ok ());
1177
-
1178
+ # endif // defined(OPENSSL_IS_BORINGSSL)
1178
1179
V8::SetEntropySource ([](unsigned char * buffer, size_t length) {
1179
1180
// V8 falls back to very weak entropy when this function fails
1180
1181
// and /dev/urandom isn't available. That wouldn't be so bad if
@@ -1189,7 +1190,7 @@ InitializeOncePerProcessInternal(const std::vector<std::string>& args,
1189
1190
if (credentials::SafeGetenv (" NODE_EXTRA_CA_CERTS" , &extra_ca_certs))
1190
1191
crypto::UseExtraCaCerts (extra_ca_certs);
1191
1192
}
1192
- #endif // HAVE_OPENSSL && !defined(OPENSSL_IS_BORINGSSL)
1193
+ #endif // HAVE_OPENSSL
1193
1194
}
1194
1195
1195
1196
if (!(flags & ProcessInitializationFlags::kNoInitializeNodeV8Platform )) {
You can’t perform that action at this time.
0 commit comments