Skip to content

Commit 248c632

Browse files
committed
crypto: BoringSSL can work with NODE_EXTRA_CA_CERTS
1 parent f1635f4 commit 248c632

File tree

1 file changed

+4
-3
lines changed

1 file changed

+4
-3
lines changed

src/node.cc

+4-3
Original file line numberDiff line numberDiff line change
@@ -1083,7 +1083,8 @@ InitializeOncePerProcessInternal(const std::vector<std::string>& args,
10831083
}
10841084

10851085
if (!(flags & ProcessInitializationFlags::kNoInitOpenSSL)) {
1086-
#if HAVE_OPENSSL && !defined(OPENSSL_IS_BORINGSSL)
1086+
#if HAVE_OPENSSL
1087+
#if !defined(OPENSSL_IS_BORINGSSL)
10871088
auto GetOpenSSLErrorString = []() -> std::string {
10881089
std::string ret;
10891090
ERR_print_errors_cb(
@@ -1174,7 +1175,7 @@ InitializeOncePerProcessInternal(const std::vector<std::string>& args,
11741175

11751176
// Ensure CSPRNG is properly seeded.
11761177
CHECK(crypto::CSPRNG(nullptr, 0).is_ok());
1177-
1178+
#endif // defined(OPENSSL_IS_BORINGSSL)
11781179
V8::SetEntropySource([](unsigned char* buffer, size_t length) {
11791180
// V8 falls back to very weak entropy when this function fails
11801181
// and /dev/urandom isn't available. That wouldn't be so bad if
@@ -1189,7 +1190,7 @@ InitializeOncePerProcessInternal(const std::vector<std::string>& args,
11891190
if (credentials::SafeGetenv("NODE_EXTRA_CA_CERTS", &extra_ca_certs))
11901191
crypto::UseExtraCaCerts(extra_ca_certs);
11911192
}
1192-
#endif // HAVE_OPENSSL && !defined(OPENSSL_IS_BORINGSSL)
1193+
#endif // HAVE_OPENSSL
11931194
}
11941195

11951196
if (!(flags & ProcessInitializationFlags::kNoInitializeNodeV8Platform)) {

0 commit comments

Comments
 (0)