-
Robert Langhammer authored
We do not use encrypted tunnels, so we can use urandom generating the keys to prevent blocking due to low entropy. Signed-off-by:
Robert Langhammer <[email protected]> Tested-by:
Adrian Schmutzler <[email protected]> Reviewed-by:
Fabian Bläse <[email protected]>
95507d17
Loading