File tree Expand file tree Collapse file tree 1 file changed +4
-3
lines changed Expand file tree Collapse file tree 1 file changed +4
-3
lines changed Original file line number Diff line number Diff line change @@ -1083,7 +1083,8 @@ InitializeOncePerProcessInternal(const std::vector<std::string>& args,
10831083 }
10841084
10851085 if (!(flags & ProcessInitializationFlags::kNoInitOpenSSL )) {
1086- #if HAVE_OPENSSL && !defined(OPENSSL_IS_BORINGSSL)
1086+ #if HAVE_OPENSSL
1087+ #if !defined(OPENSSL_IS_BORINGSSL)
10871088 auto GetOpenSSLErrorString = []() -> std::string {
10881089 std::string ret;
10891090 ERR_print_errors_cb (
@@ -1174,7 +1175,7 @@ InitializeOncePerProcessInternal(const std::vector<std::string>& args,
11741175
11751176 // Ensure CSPRNG is properly seeded.
11761177 CHECK (crypto::CSPRNG (nullptr , 0 ).is_ok ());
1177-
1178+ # endif // defined(OPENSSL_IS_BORINGSSL)
11781179 V8::SetEntropySource ([](unsigned char * buffer, size_t length) {
11791180 // V8 falls back to very weak entropy when this function fails
11801181 // and /dev/urandom isn't available. That wouldn't be so bad if
@@ -1189,7 +1190,7 @@ InitializeOncePerProcessInternal(const std::vector<std::string>& args,
11891190 if (credentials::SafeGetenv (" NODE_EXTRA_CA_CERTS" , &extra_ca_certs))
11901191 crypto::UseExtraCaCerts (extra_ca_certs);
11911192 }
1192- #endif // HAVE_OPENSSL && !defined(OPENSSL_IS_BORINGSSL)
1193+ #endif // HAVE_OPENSSL
11931194 }
11941195
11951196 if (!(flags & ProcessInitializationFlags::kNoInitializeNodeV8Platform )) {
You can’t perform that action at this time.
0 commit comments