Check selftest in rand too.
authorDr. Stephen Henson <steve@openssl.org>
Mon, 2 Jul 2007 11:27:52 +0000 (11:27 +0000)
committerDr. Stephen Henson <steve@openssl.org>
Mon, 2 Jul 2007 11:27:52 +0000 (11:27 +0000)
fips-1.0/rand/fips_rand.c

index 153e8a1c461c61440ad4f71e94180f9d1348e5eb..9735394aafdf88b0a46f763b479eb9bb9cd1d850 100644 (file)
@@ -76,6 +76,7 @@
 # endif
 #endif
 #include <string.h>
+#include <openssl/fips.h>
 
 #ifdef OPENSSL_FIPS
 
@@ -120,6 +121,7 @@ void fips_rand_prng_reset(FIPS_PRNG_CTX *ctx)
 static int fips_set_prng_key(FIPS_PRNG_CTX *ctx,
                        const unsigned char *key, FIPS_RAND_SIZE_T keylen)
        {
+       FIPS_selftest_check();
        if (keylen != 16 && keylen != 24 && keylen != 32)
                {
                /* error: invalid key size */