Fixed error introduced in commit f2be92b94dad3c6cbdf79d99a324804094cf1617
that fixed PR#3450 where an existing cast masked an issue when i was changed from int to long in that commit Picked up on z/linux (s390) where sizeof(int)!=sizeof(long) Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (cherry picked from commit b5ff559ff90124c6fd53bbb49dae5edb4e821e0a)
This commit is contained in:
parent
dfb5de6fc0
commit
320d949781
@ -1979,6 +1979,7 @@ fprintf(stderr, "USING TLSv1.2 HASH %s\n", EVP_MD_name(md));
|
|||||||
if (pkey->type == EVP_PKEY_RSA && !SSL_USE_SIGALGS(s))
|
if (pkey->type == EVP_PKEY_RSA && !SSL_USE_SIGALGS(s))
|
||||||
{
|
{
|
||||||
int num;
|
int num;
|
||||||
|
unsigned int size;
|
||||||
|
|
||||||
j=0;
|
j=0;
|
||||||
q=md_buf;
|
q=md_buf;
|
||||||
@ -1991,9 +1992,9 @@ fprintf(stderr, "USING TLSv1.2 HASH %s\n", EVP_MD_name(md));
|
|||||||
EVP_DigestUpdate(&md_ctx,&(s->s3->client_random[0]),SSL3_RANDOM_SIZE);
|
EVP_DigestUpdate(&md_ctx,&(s->s3->client_random[0]),SSL3_RANDOM_SIZE);
|
||||||
EVP_DigestUpdate(&md_ctx,&(s->s3->server_random[0]),SSL3_RANDOM_SIZE);
|
EVP_DigestUpdate(&md_ctx,&(s->s3->server_random[0]),SSL3_RANDOM_SIZE);
|
||||||
EVP_DigestUpdate(&md_ctx,param,param_len);
|
EVP_DigestUpdate(&md_ctx,param,param_len);
|
||||||
EVP_DigestFinal_ex(&md_ctx,q,(unsigned int *)&i);
|
EVP_DigestFinal_ex(&md_ctx,q,&size);
|
||||||
q+=i;
|
q+=size;
|
||||||
j+=i;
|
j+=size;
|
||||||
}
|
}
|
||||||
i=RSA_verify(NID_md5_sha1, md_buf, j, p, n,
|
i=RSA_verify(NID_md5_sha1, md_buf, j, p, n,
|
||||||
pkey->pkey.rsa);
|
pkey->pkey.rsa);
|
||||||
|
Loading…
x
Reference in New Issue
Block a user