Commit 294941ae authored by Bernd Edlinger's avatar Bernd Edlinger
Browse files

Rename the rand_drbg_st data member "pool" to "seed_pool"



... to make the intended use more clear and differentiate
it from the data member "adin_pool".

Reviewed-by: default avatarPaul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/7575)

(cherry picked from commit 31f32abb8eb2a3ebd8500e6e0460b4a6791e5ed7)
parent 9bc987f0
Loading
Loading
Loading
Loading
+7 −7
Original line number Diff line number Diff line
@@ -487,11 +487,11 @@ int rand_drbg_restart(RAND_DRBG *drbg,
    const unsigned char *adin = NULL;
    size_t adinlen = 0;

    if (drbg->pool != NULL) {
    if (drbg->seed_pool != NULL) {
        RANDerr(RAND_F_RAND_DRBG_RESTART, ERR_R_INTERNAL_ERROR);
        drbg->state = DRBG_ERROR;
        rand_pool_free(drbg->pool);
        drbg->pool = NULL;
        rand_pool_free(drbg->seed_pool);
        drbg->seed_pool = NULL;
        return 0;
    }

@@ -511,8 +511,8 @@ int rand_drbg_restart(RAND_DRBG *drbg,
            }

            /* will be picked up by the rand_drbg_get_entropy() callback */
            drbg->pool = rand_pool_attach(buffer, len, entropy);
            if (drbg->pool == NULL)
            drbg->seed_pool = rand_pool_attach(buffer, len, entropy);
            if (drbg->seed_pool == NULL)
                return 0;
        } else {
            if (drbg->max_adinlen < len) {
@@ -558,8 +558,8 @@ int rand_drbg_restart(RAND_DRBG *drbg,
        }
    }

    rand_pool_free(drbg->pool);
    drbg->pool = NULL;
    rand_pool_free(drbg->seed_pool);
    drbg->seed_pool = NULL;

    return drbg->state == DRBG_READY;
}
+1 −1
Original line number Diff line number Diff line
@@ -183,7 +183,7 @@ struct rand_drbg_st {
     * with respect to how randomness is added to the RNG during reseeding
     * (see PR #4328).
     */
    struct rand_pool_st *pool;
    struct rand_pool_st *seed_pool;

    /*
     * Auxiliary pool for additional data.
+4 −4
Original line number Diff line number Diff line
@@ -146,8 +146,8 @@ size_t rand_drbg_get_entropy(RAND_DRBG *drbg,
        return 0;
    }

    if (drbg->pool != NULL) {
        pool = drbg->pool;
    if (drbg->seed_pool != NULL) {
        pool = drbg->seed_pool;
        pool->entropy_requested = entropy;
    } else {
        pool = rand_pool_new(entropy, min_len, max_len);
@@ -204,7 +204,7 @@ size_t rand_drbg_get_entropy(RAND_DRBG *drbg,
    }

 err:
    if (drbg->pool == NULL)
    if (drbg->seed_pool == NULL)
        rand_pool_free(pool);
    return ret;
}
@@ -216,7 +216,7 @@ size_t rand_drbg_get_entropy(RAND_DRBG *drbg,
void rand_drbg_cleanup_entropy(RAND_DRBG *drbg,
                               unsigned char *out, size_t outlen)
{
    if (drbg->pool == NULL)
    if (drbg->seed_pool == NULL)
        OPENSSL_secure_clear_free(out, outlen);
}