From 43c12e3d4f9bbbbd4a8ba7b149686437514bc6b6 Mon Sep 17 00:00:00 2001 From: Brian Carlstrom Date: Tue, 16 Nov 2010 11:19:35 -0800 Subject: Upgrade to openssl-1.0.0b Bug: 3201137 Change-Id: I20cd6bed7717e5982abc3734e9a6522067f2908e --- crypto/rand/md_rand.c | 11 +++++++---- crypto/rand/rand_nw.c | 4 ++-- crypto/rand/randfile.c | 2 -- 3 files changed, 9 insertions(+), 8 deletions(-) (limited to 'crypto/rand') diff --git a/crypto/rand/md_rand.c b/crypto/rand/md_rand.c index 88088ce..b2f04ff 100644 --- a/crypto/rand/md_rand.c +++ b/crypto/rand/md_rand.c @@ -476,11 +476,14 @@ static int ssleay_rand_bytes(unsigned char *buf, int num) MD_Update(&m,(unsigned char *)&(md_c[0]),sizeof(md_c)); #ifndef PURIFY /* purify complains */ - /* DO NOT REMOVE THE FOLLOWING CALL TO MD_Update()! */ + /* The following line uses the supplied buffer as a small + * source of entropy: since this buffer is often uninitialised + * it may cause programs such as purify or valgrind to + * complain. So for those builds it is not used: the removal + * of such a small source of entropy has negligible impact on + * security. + */ MD_Update(&m,buf,j); - /* We know that line may cause programs such as - purify and valgrind to complain about use of - uninitialized data. */ #endif k=(st_idx+MD_DIGEST_LENGTH/2)-st_num; diff --git a/crypto/rand/rand_nw.c b/crypto/rand/rand_nw.c index f177ffb..8d5b8d2 100644 --- a/crypto/rand/rand_nw.c +++ b/crypto/rand/rand_nw.c @@ -160,8 +160,8 @@ int RAND_poll(void) rdtsc mov tsc, eax } -#else - asm volatile("rdtsc":"=A" (tsc)); +#elif defined(__GNUC__) && __GNUC__>=2 && !defined(OPENSSL_NO_ASM) && !defined(OPENSSL_NO_INLINE_ASM) + asm volatile("rdtsc":"=a"(tsc)::"edx"); #endif RAND_add(&tsc, sizeof(tsc), 1); diff --git a/crypto/rand/randfile.c b/crypto/rand/randfile.c index 4ed40b7..678b0fe 100644 --- a/crypto/rand/randfile.c +++ b/crypto/rand/randfile.c @@ -269,7 +269,6 @@ err: const char *RAND_file_name(char *buf, size_t size) { char *s=NULL; - int ok = 0; #ifdef __OpenBSD__ struct stat sb; #endif @@ -298,7 +297,6 @@ const char *RAND_file_name(char *buf, size_t size) BUF_strlcat(buf,"/",size); #endif BUF_strlcat(buf,RFILE,size); - ok = 1; } else buf[0] = '\0'; /* no file name */ -- cgit v1.1