This change should be suitable as a workaround for the Solaris x86
compiler bug reported in <01032110293775.22278@weba3.iname.net> (the '++seq[i]' condition is evaluated as 256 rather than 0 when the previous value is 255).
This commit is contained in:
parent
72cd659df6
commit
9a22ce66c9
2 changed files with 8 additions and 2 deletions
|
@ -504,7 +504,10 @@ int ssl3_mac(SSL *ssl, unsigned char *md, int send)
|
|||
EVP_DigestFinal( &md_ctx,md,&md_size);
|
||||
|
||||
for (i=7; i>=0; i--)
|
||||
if (++seq[i]) break;
|
||||
{
|
||||
++seq[i];
|
||||
if (seq[i] != 0) break;
|
||||
}
|
||||
|
||||
return(md_size);
|
||||
}
|
||||
|
|
|
@ -572,7 +572,10 @@ printf("rec=");
|
|||
#endif
|
||||
|
||||
for (i=7; i>=0; i--)
|
||||
if (++seq[i]) break;
|
||||
{
|
||||
++seq[i];
|
||||
if (seq[i] != 0) break;
|
||||
}
|
||||
|
||||
#ifdef TLS_DEBUG
|
||||
{unsigned int z; for (z=0; z<md_size; z++) printf("%02X ",md[z]); printf("\n"); }
|
||||
|
|
Loading…
Reference in a new issue