RT4545: Backport 2877 to 1.0.2
Sender verified that the fix works. This is a backport/cherry-pick
of just the bugfix part of 0f91e1dff4
Reviewed-by: Richard Levitte <levitte@openssl.org>
This commit is contained in:
parent
c144b4edda
commit
d0a2bb1f94
1 changed files with 3 additions and 3 deletions
|
@ -136,7 +136,7 @@
|
|||
/* #define PREDICT 1 */
|
||||
|
||||
#define STATE_SIZE 1023
|
||||
static int state_num = 0, state_index = 0;
|
||||
static size_t state_num = 0, state_index = 0;
|
||||
static unsigned char state[STATE_SIZE + MD_DIGEST_LENGTH];
|
||||
static unsigned char md[MD_DIGEST_LENGTH];
|
||||
static long md_count[2] = { 0, 0 };
|
||||
|
@ -336,8 +336,8 @@ static void ssleay_rand_seed(const void *buf, int num)
|
|||
int ssleay_rand_bytes(unsigned char *buf, int num, int pseudo, int lock)
|
||||
{
|
||||
static volatile int stirred_pool = 0;
|
||||
int i, j, k, st_num, st_idx;
|
||||
int num_ceil;
|
||||
int i, j, k;
|
||||
size_t num_ceil, st_idx, st_num;
|
||||
int ok;
|
||||
long md_c[2];
|
||||
unsigned char local_md[MD_DIGEST_LENGTH];
|
||||
|
|
Loading…
Reference in a new issue