Fixed issue where DRBG_CTR fails if NO_DF is used - when entropy is called

Reviewed-by: Paul Dale <paul.dale@oracle.com>
Reviewed-by: Tim Hudson <tjh@openssl.org>
Reviewed-by: Kurt Roeckx <kurt@roeckx.be>
Reviewed-by: Matthias St. Pierre <Matthias.St.Pierre@ncp-e.com>
(Merged from https://github.com/openssl/openssl/pull/6778)
This commit is contained in:
Shane Lontis 2018-07-25 11:08:48 +10:00 committed by Pauli
parent 037241bf04
commit 7c226dfc43

View file

@ -174,7 +174,7 @@ size_t rand_drbg_get_entropy(RAND_DRBG *drbg,
if (RAND_DRBG_generate(drbg->parent,
buffer, bytes_needed,
prediction_resistance,
(unsigned char *)drbg, sizeof(*drbg)) != 0)
NULL, 0) != 0)
bytes = bytes_needed;
rand_drbg_unlock(drbg->parent);