summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorTomas Mraz <tomas@openssl.org>2023-10-11 11:20:02 +0200
committerTomas Mraz <tomas@openssl.org>2023-10-13 15:08:11 +0200
commit77ce9ea496f5bc8fc513082c74c207a3240febb0 (patch)
tree2a7687f88640ae84b515def19107038158503a48
parent59efa32937ae5e8bcad5ad587ff4aac27810468f (diff)
Windows: use srand() instead of srandom()
This is used for memory allocation failure debugging only Reviewed-by: Tom Cosgrove <tom.cosgrove@arm.com> Reviewed-by: Paul Dale <pauli@openssl.org> (Merged from https://github.com/openssl/openssl/pull/22347) (cherry picked from commit 3b107b86ca7d1c6309bc7071ead59acb8c098f3b)
-rw-r--r--crypto/mem.c3
1 files changed, 2 insertions, 1 deletions
diff --git a/crypto/mem.c b/crypto/mem.c
index 76779a461f..cc19856771 100644
--- a/crypto/mem.c
+++ b/crypto/mem.c
@@ -122,12 +122,13 @@ static void parseit(void)
}
/*
- * Windows doesn't have random(), but it has rand()
+ * Windows doesn't have random() and srandom(), but it has rand() and srand().
* Some rand() implementations aren't good, but we're not
* dealing with secure randomness here.
*/
# ifdef _WIN32
# define random() rand()
+# define srandom(seed) srand(seed)
# endif
/*
* See if the current malloc should fail.