mirror of
https://github.com/openssl/openssl.git
synced 2025-01-20 08:53:34 +08:00
This change should be suitable as a workaround for the Solaris x86
compiler bug reported in <01032110293775.22278@weba3.iname.net> (the '++seq[i]' condition is evaluated as 256 rather than 0 when the previous value is 255).
This commit is contained in:
parent
4e2a08ddd4
commit
1876cc32ae
@ -504,7 +504,10 @@ int ssl3_mac(SSL *ssl, unsigned char *md, int send)
|
||||
EVP_DigestFinal( &md_ctx,md,&md_size);
|
||||
|
||||
for (i=7; i>=0; i--)
|
||||
if (++seq[i]) break;
|
||||
{
|
||||
++seq[i];
|
||||
if (seq[i] != 0) break;
|
||||
}
|
||||
|
||||
return(md_size);
|
||||
}
|
||||
|
@ -643,7 +643,10 @@ printf("rec=");
|
||||
#endif
|
||||
|
||||
for (i=7; i>=0; i--)
|
||||
if (++seq[i]) break;
|
||||
{
|
||||
++seq[i];
|
||||
if (seq[i] != 0) break;
|
||||
}
|
||||
|
||||
#ifdef TLS_DEBUG
|
||||
{unsigned int z; for (z=0; z<md_size; z++) printf("%02X ",md[z]); printf("\n"); }
|
||||
|
Loading…
Reference in New Issue
Block a user