diff options
author | Tomas Mraz <tomas@openssl.org> | 2023-10-11 11:20:02 +0200 |
---|---|---|
committer | Tomas Mraz <tomas@openssl.org> | 2023-10-13 15:04:42 +0200 |
commit | 3b107b86ca7d1c6309bc7071ead59acb8c098f3b (patch) | |
tree | 8440ada5ccda943d43a3ffc819ecbe57d3870eb6 | |
parent | 10767fd9db14b6eedfb0827f9e404c0d4b94424b (diff) |
Windows: use srand() instead of srandom()
This is used for memory allocation failure debugging only
Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com>
Reviewed-by: Paul Dale <pauli@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/22347)
-rw-r--r-- | crypto/mem.c | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/crypto/mem.c b/crypto/mem.c index d7aa3ab85d..eef1165708 100644 --- a/crypto/mem.c +++ b/crypto/mem.c @@ -122,12 +122,13 @@ static void parseit(void) } /* - * Windows doesn't have random(), but it has rand() + * Windows doesn't have random() and srandom(), but it has rand() and srand(). * Some rand() implementations aren't good, but we're not * dealing with secure randomness here. */ # ifdef _WIN32 # define random() rand() +# define srandom(seed) srand(seed) # endif /* * See if the current malloc should fail. |