summaryrefslogtreecommitdiffstats
path: root/ssl
diff options
context:
space:
mode:
authorTim Hudson <tjh@openssl.org>2014-09-21 21:54:31 +1000
committerTim Hudson <tjh@openssl.org>2014-09-22 06:31:05 +1000
commitcf4b01a766f5e0f5a7e270c43aac76defb972ebd (patch)
tree1d061a8e347bf9add66f37c6e94801ff49dc74eb /ssl
parent45d129511ff0b43be9a4271133c9ee22658ff07e (diff)
Fixed error introduced in commit f2be92b94dad3c6cbdf79d99a324804094cf1617
that fixed PR#3450 where an existing cast masked an issue when i was changed from int to long in that commit Picked up on z/linux (s390) where sizeof(int)!=sizeof(long) Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org> (cherry picked from commit b5ff559ff90124c6fd53bbb49dae5edb4e821e0a)
Diffstat (limited to 'ssl')
-rw-r--r--ssl/s3_clnt.c7
1 files changed, 4 insertions, 3 deletions
diff --git a/ssl/s3_clnt.c b/ssl/s3_clnt.c
index 99de1bf608..4828937566 100644
--- a/ssl/s3_clnt.c
+++ b/ssl/s3_clnt.c
@@ -1487,6 +1487,7 @@ int ssl3_get_key_exchange(SSL *s)
if (pkey->type == EVP_PKEY_RSA)
{
int num;
+ unsigned int size;
j=0;
q=md_buf;
@@ -1499,9 +1500,9 @@ int ssl3_get_key_exchange(SSL *s)
EVP_DigestUpdate(&md_ctx,&(s->s3->client_random[0]),SSL3_RANDOM_SIZE);
EVP_DigestUpdate(&md_ctx,&(s->s3->server_random[0]),SSL3_RANDOM_SIZE);
EVP_DigestUpdate(&md_ctx,param,param_len);
- EVP_DigestFinal_ex(&md_ctx,q,(unsigned int *)&i);
- q+=i;
- j+=i;
+ EVP_DigestFinal_ex(&md_ctx,q,&size);
+ q+=size;
+ j+=size;
}
i=RSA_verify(NID_md5_sha1, md_buf, j, p, n,
pkey->pkey.rsa);