summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorTomas Mraz <tomas@openssl.org>2023-10-11 11:20:02 +0200
committerTomas Mraz <tomas@openssl.org>2023-10-13 15:04:42 +0200
commit3b107b86ca7d1c6309bc7071ead59acb8c098f3b (patch)
tree8440ada5ccda943d43a3ffc819ecbe57d3870eb6
parent10767fd9db14b6eedfb0827f9e404c0d4b94424b (diff)
Windows: use srand() instead of srandom()
This is used for memory allocation failure debugging only Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22347)
-rw-r--r--crypto/mem.c3
1 files changed, 2 insertions, 1 deletions
diff --git a/crypto/mem.c b/crypto/mem.c
index d7aa3ab85d..eef1165708 100644
--- a/crypto/mem.c
+++ b/crypto/mem.c
@@ -122,12 +122,13 @@ static void parseit(void)
}
/*
- * Windows doesn't have random(), but it has rand()
+ * Windows doesn't have random() and srandom(), but it has rand() and srand().
* Some rand() implementations aren't good, but we're not
* dealing with secure randomness here.
*/
# ifdef _WIN32
# define random() rand()
+# define srandom(seed) srand(seed)
# endif
/*
* See if the current malloc should fail.