From 7c226dfc434dcd0c8a3240df166b7561a8b51b0f Mon Sep 17 00:00:00 2001 From: Shane Lontis Date: Wed, 25 Jul 2018 11:08:48 +1000 Subject: [PATCH] Fixed issue where DRBG_CTR fails if NO_DF is used - when entropy is called Reviewed-by: Paul Dale Reviewed-by: Tim Hudson Reviewed-by: Kurt Roeckx Reviewed-by: Matthias St. Pierre (Merged from https://github.com/openssl/openssl/pull/6778) --- crypto/rand/rand_lib.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/crypto/rand/rand_lib.c b/crypto/rand/rand_lib.c index d31735c5c4..6123d148a4 100644 --- a/crypto/rand/rand_lib.c +++ b/crypto/rand/rand_lib.c @@ -174,7 +174,7 @@ size_t rand_drbg_get_entropy(RAND_DRBG *drbg, if (RAND_DRBG_generate(drbg->parent, buffer, bytes_needed, prediction_resistance, - (unsigned char *)drbg, sizeof(*drbg)) != 0) + NULL, 0) != 0) bytes = bytes_needed; rand_drbg_unlock(drbg->parent); -- 2.25.1