Loading FAQ +3 −3 Original line number Diff line number Diff line Loading @@ -901,10 +901,10 @@ When OpenSSL's PRNG routines are called to generate random numbers the supplied buffer contents are mixed into the entropy pool: so it technically does not matter whether the buffer is initialized at this point or not. Valgrind (and other test tools) will complain about this. When using Valgrind, make sure the OpenSSL library has been compiled with the PEDANTIC macro defined (-DPEDANTIC) to get rid of these warnings. Compling with -DPURIFY will help as well. OpenSSL library has been compiled with the PURIFY macro defined (-DPURIFY) to get rid of these warnings The use of PEDANTIC with the PRNG was added in OpenSSL 0.9.8f. The use of PURIFY with the PRNG was added in OpenSSL 0.9.8f. =============================================================================== Loading crypto/rand/rand_lib.c +2 −2 Original line number Diff line number Diff line Loading @@ -154,7 +154,7 @@ void RAND_add(const void *buf, int num, double entropy) int RAND_bytes(unsigned char *buf, int num) { const RAND_METHOD *meth = RAND_get_rand_method(); #ifdef PEDANTIC #ifdef PURIFY memset(buf, 0, num); #endif if (meth && meth->bytes) Loading @@ -165,7 +165,7 @@ int RAND_bytes(unsigned char *buf, int num) int RAND_pseudo_bytes(unsigned char *buf, int num) { const RAND_METHOD *meth = RAND_get_rand_method(); #ifdef PEDANTIC #ifdef PURIFY memset(buf, 0, num); #endif if (meth && meth->pseudorand) Loading Loading
FAQ +3 −3 Original line number Diff line number Diff line Loading @@ -901,10 +901,10 @@ When OpenSSL's PRNG routines are called to generate random numbers the supplied buffer contents are mixed into the entropy pool: so it technically does not matter whether the buffer is initialized at this point or not. Valgrind (and other test tools) will complain about this. When using Valgrind, make sure the OpenSSL library has been compiled with the PEDANTIC macro defined (-DPEDANTIC) to get rid of these warnings. Compling with -DPURIFY will help as well. OpenSSL library has been compiled with the PURIFY macro defined (-DPURIFY) to get rid of these warnings The use of PEDANTIC with the PRNG was added in OpenSSL 0.9.8f. The use of PURIFY with the PRNG was added in OpenSSL 0.9.8f. =============================================================================== Loading
crypto/rand/rand_lib.c +2 −2 Original line number Diff line number Diff line Loading @@ -154,7 +154,7 @@ void RAND_add(const void *buf, int num, double entropy) int RAND_bytes(unsigned char *buf, int num) { const RAND_METHOD *meth = RAND_get_rand_method(); #ifdef PEDANTIC #ifdef PURIFY memset(buf, 0, num); #endif if (meth && meth->bytes) Loading @@ -165,7 +165,7 @@ int RAND_bytes(unsigned char *buf, int num) int RAND_pseudo_bytes(unsigned char *buf, int num) { const RAND_METHOD *meth = RAND_get_rand_method(); #ifdef PEDANTIC #ifdef PURIFY memset(buf, 0, num); #endif if (meth && meth->pseudorand) Loading