diff --git a/lib/krb5/crypto.c b/lib/krb5/crypto.c index 4674af976..9d5368049 100644 --- a/lib/krb5/crypto.c +++ b/lib/krb5/crypto.c @@ -3991,7 +3991,7 @@ krb5_generate_random_block(void *buf, size_t len) rng_initialized = 1; } HEIMDAL_MUTEX_unlock(&crypto_mutex); - if (RAND_bytes(buf, len) != 1) + if (RAND_bytes(buf, len) <= 0) krb5_abortx(NULL, "Failed to generate random block"); } diff --git a/lib/krb5/generate_seq_number.c b/lib/krb5/generate_seq_number.c index 575f842d8..6001d6926 100644 --- a/lib/krb5/generate_seq_number.c +++ b/lib/krb5/generate_seq_number.c @@ -38,7 +38,7 @@ krb5_generate_seq_number(krb5_context context, const krb5_keyblock *key, uint32_t *seqno) { - if (RAND_bytes((void *)seqno, sizeof(*seqno)) != 1) + if (RAND_bytes((void *)seqno, sizeof(*seqno)) <= 0) krb5_abortx(context, "Failed to generate random block"); /* MIT used signed numbers, lets not stomp into that space directly */ *seqno &= 0x3fffffff;