Fixed issue where DRBG_CTR fails if NO_DF is used - when entropy is called
Reviewed-by: Paul Dale <paul.dale@oracle.com> Reviewed-by: Tim Hudson <tjh@openssl.org> Reviewed-by: Kurt Roeckx <kurt@roeckx.be> Reviewed-by: Matthias St. Pierre <Matthias.St.Pierre@ncp-e.com> (Merged from https://github.com/openssl/openssl/pull/6778)
This commit is contained in:
parent
037241bf04
commit
7c226dfc43
1 changed files with 1 additions and 1 deletions
|
@ -174,7 +174,7 @@ size_t rand_drbg_get_entropy(RAND_DRBG *drbg,
|
|||
if (RAND_DRBG_generate(drbg->parent,
|
||||
buffer, bytes_needed,
|
||||
prediction_resistance,
|
||||
(unsigned char *)drbg, sizeof(*drbg)) != 0)
|
||||
NULL, 0) != 0)
|
||||
bytes = bytes_needed;
|
||||
rand_drbg_unlock(drbg->parent);
|
||||
|
||||
|
|
Loading…
Reference in a new issue