@@ -827,7 +827,7 @@ static int _InitRng(WC_RNG* rng, byte* nonce, word32 nonceSz,
827827
828828#if defined(WOLFSSL_KEEP_RNG_SEED_FD_OPEN ) && !defined(USE_WINDOWS_API )
829829 if (!rng -> seed .seedFdOpen )
830- rng -> seed .fd = -1 ;
830+ rng -> seed .fd = XBADFD ;
831831#endif
832832
833833#ifdef CUSTOM_RAND_GENERATE_BLOCK
@@ -1311,9 +1311,9 @@ int wc_FreeRng(WC_RNG* rng)
13111311
13121312#if defined(WOLFSSL_KEEP_RNG_SEED_FD_OPEN ) && defined(XCLOSE ) && \
13131313 !defined(USE_WINDOWS_API )
1314- if (rng -> seed .seedFdOpen && rng -> seed .fd != -1 ) {
1314+ if (rng -> seed .seedFdOpen && rng -> seed .fd != XBADFD ) {
13151315 XCLOSE (rng -> seed .fd );
1316- rng -> seed .fd = -1 ;
1316+ rng -> seed .fd = XBADFD ;
13171317 rng -> seed .seedFdOpen = 0 ;
13181318 }
13191319#endif
@@ -3504,16 +3504,16 @@ int wc_GenerateSeed(OS_Seed* os, byte* output, word32 sz)
35043504 os -> fd = open ("/dev/urandom" , O_RDONLY );
35053505 #if defined(DEBUG_WOLFSSL )
35063506 WOLFSSL_MSG ("opened /dev/urandom." );
3507- #endif
3508- if (os -> fd == -1 )
3509- #endif
3507+ #endif /* DEBUG_WOLFSSL */
3508+ if (os -> fd == XBADFD )
3509+ #endif /* NO_DEV_URANDOM */
35103510 {
35113511 /* may still have /dev/random */
35123512 os -> fd = open ("/dev/random" , O_RDONLY );
35133513 #if defined(DEBUG_WOLFSSL )
35143514 WOLFSSL_MSG ("opened /dev/random." );
3515- #endif
3516- if (os -> fd == -1 )
3515+ #endif /* DEBUG_WOLFSSL */
3516+ if (os -> fd == XBADFD )
35173517 return OPEN_RAN_E ;
35183518 else {
35193519 os -> keepSeedFdOpen = 0 ;
@@ -3525,27 +3525,27 @@ int wc_GenerateSeed(OS_Seed* os, byte* output, word32 sz)
35253525 os -> seedFdOpen = 1 ;
35263526 }
35273527 }
3528- #else
3528+ #else /* WOLFSSL_KEEP_RNG_SEED_FD_OPEN */
35293529 #ifndef NO_DEV_URANDOM /* way to disable use of /dev/urandom */
35303530 os -> fd = open ("/dev/urandom" , O_RDONLY );
35313531 #if defined(DEBUG_WOLFSSL )
35323532 WOLFSSL_MSG ("opened /dev/urandom." );
3533- #endif
3534- if (os -> fd == -1 )
3535- #endif
3533+ #endif /* DEBUG_WOLFSSL */
3534+ if (os -> fd == XBADFD )
3535+ #endif /* !NO_DEV_URANDOM */
35363536 {
35373537 /* may still have /dev/random */
35383538 os -> fd = open ("/dev/random" , O_RDONLY );
35393539 #if defined(DEBUG_WOLFSSL )
35403540 WOLFSSL_MSG ("opened /dev/random." );
3541- #endif
3542- if (os -> fd == -1 )
3541+ #endif /* DEBUG_WOLFSSL */
3542+ if (os -> fd == XBADFD )
35433543 return OPEN_RAN_E ;
35443544 }
3545- #endif
3545+ #endif /* WOLFSSL_KEEP_RNG_SEED_FD_OPEN */
35463546 #if defined(DEBUG_WOLFSSL )
35473547 WOLFSSL_MSG ("rnd read..." );
3548- #endif
3548+ #endif /* DEBUG_WOLFSSL */
35493549 while (sz ) {
35503550 int len = (int )read (os -> fd , output , sz );
35513551 if (len == -1 ) {
@@ -3562,7 +3562,7 @@ int wc_GenerateSeed(OS_Seed* os, byte* output, word32 sz)
35623562 #else
35633563 ret = RAN_BLOCK_E ;
35643564 break ;
3565- #endif
3565+ #endif /* BLOCKING || WC_RNG_BLOCKING */
35663566 }
35673567 }
35683568 #ifdef WOLFSSL_KEEP_RNG_SEED_FD_OPEN
@@ -3574,8 +3574,8 @@ int wc_GenerateSeed(OS_Seed* os, byte* output, word32 sz)
35743574 }
35753575 #else
35763576 close (os -> fd );
3577- #endif
3578- #else
3577+ #endif /* WOLFSSL_KEEP_RNG_SEED_FD_OPEN */
3578+ #else /* NO_FILESYSTEM */
35793579 (void )output ;
35803580 (void )sz ;
35813581 ret = NOT_COMPILED_IN ;
0 commit comments