aboutsummaryrefslogtreecommitdiff
path: root/crypto/rand/md_rand.c
diff options
context:
space:
mode:
authorBodo Möller <bodo@openssl.org>2000-01-14 09:08:39 +0000
committerBodo Möller <bodo@openssl.org>2000-01-14 09:08:39 +0000
commit2f878669b7d1a22e52fa8ab86cf6a6095a9fad03 (patch)
treecc7e027c83216c4c4515224246cf12f864f2ebf2 /crypto/rand/md_rand.c
parentf2b86c955cb6c3c3864b38850d573e3aa6659a33 (diff)
downloadopenssl-2f878669b7d1a22e52fa8ab86cf6a6095a9fad03.zip
openssl-2f878669b7d1a22e52fa8ab86cf6a6095a9fad03.tar.gz
openssl-2f878669b7d1a22e52fa8ab86cf6a6095a9fad03.tar.bz2
Avoid shadowing variables,
and re-enable seeding with more data than read from DEVRANDOM -- just don't pretend it contains entropy.
Diffstat (limited to 'crypto/rand/md_rand.c')
-rw-r--r--crypto/rand/md_rand.c10
1 files changed, 5 insertions, 5 deletions
diff --git a/crypto/rand/md_rand.c b/crypto/rand/md_rand.c
index 5eef93d..dbed1dc 100644
--- a/crypto/rand/md_rand.c
+++ b/crypto/rand/md_rand.c
@@ -144,7 +144,7 @@ const char *RAND_version="RAND" OPENSSL_VERSION_PTEXT;
static void ssleay_rand_cleanup(void);
static void ssleay_rand_seed(const void *buf, int num);
-static void ssleay_rand_add(const void *buf, int num, int entropy);
+static void ssleay_rand_add(const void *buf, int num, int add_entropy);
static int ssleay_rand_bytes(unsigned char *buf, int num);
RAND_METHOD rand_ssleay_meth={
@@ -361,12 +361,12 @@ static int ssleay_rand_bytes(unsigned char *buf, int num)
if ((fh = fopen(DEVRANDOM, "r")) != NULL)
{
unsigned char tmpbuf[ENTROPY_NEEDED];
- int i;
+ int n;
- i=fread((unsigned char *)tmpbuf,1,ENTROPY_NEEDED,fh);
+ n=fread((unsigned char *)tmpbuf,1,ENTROPY_NEEDED,fh);
fclose(fh);
- RAND_seed(tmpbuf,i);
- memset(tmpbuf,0,i);
+ RAND_add(tmpbuf,sizeof tmpbuf,n);
+ memset(tmpbuf,0,n);
}
#endif
#ifdef PURIFY