diff options
author | Tim Hudson <tjh@openssl.org> | 2014-09-21 21:54:31 +1000 |
---|---|---|
committer | Tim Hudson <tjh@openssl.org> | 2014-09-21 21:54:31 +1000 |
commit | b5ff559ff90124c6fd53bbb49dae5edb4e821e0a (patch) | |
tree | 3c77bccf27ff9343a476bcb8e61e19dc81a48576 /ssl | |
parent | d475b2a3bfde8d4aceefb41b21acc3711893d2a8 (diff) |
Fixed error introduced in commit f2be92b94dad3c6cbdf79d99a324804094cf1617
that fixed PR#3450 where an existing cast masked an issue when i was changed
from int to long in that commit
Picked up on z/linux (s390) where sizeof(int)!=sizeof(long)
Reviewed-by: Rich Salz <rsalz@openssl.org>
Reviewed-by: Matt Caswell <matt@openssl.org>
Diffstat (limited to 'ssl')
-rw-r--r-- | ssl/s3_clnt.c | 7 |
1 files changed, 4 insertions, 3 deletions
diff --git a/ssl/s3_clnt.c b/ssl/s3_clnt.c index c51f207b62..e8e374a0ba 100644 --- a/ssl/s3_clnt.c +++ b/ssl/s3_clnt.c @@ -2002,6 +2002,7 @@ fprintf(stderr, "USING TLSv1.2 HASH %s\n", EVP_MD_name(md)); if (pkey->type == EVP_PKEY_RSA && !SSL_USE_SIGALGS(s)) { int num; + unsigned int size; j=0; q=md_buf; @@ -2014,9 +2015,9 @@ fprintf(stderr, "USING TLSv1.2 HASH %s\n", EVP_MD_name(md)); EVP_DigestUpdate(&md_ctx,&(s->s3->client_random[0]),SSL3_RANDOM_SIZE); EVP_DigestUpdate(&md_ctx,&(s->s3->server_random[0]),SSL3_RANDOM_SIZE); EVP_DigestUpdate(&md_ctx,param,param_len); - EVP_DigestFinal_ex(&md_ctx,q,(unsigned int *)&i); - q+=i; - j+=i; + EVP_DigestFinal_ex(&md_ctx,q,&size); + q+=size; + j+=size; } i=RSA_verify(NID_md5_sha1, md_buf, j, p, n, pkey->pkey.rsa); |