Issue #21781: Make the ssl module "ssize_t clean" for parsing parameters.

ssl.RAND_add() now supports strings longer than 2 GB.
This commit is contained in:
Victor Stinner 2014-07-01 16:37:17 +02:00
parent 1690ed397a
commit 2e57b4e488
2 changed files with 11 additions and 2 deletions

View File

@ -27,6 +27,8 @@ Core and Builtins
Library
-------
- Issue #21781: ssl.RAND_add() now supports strings longer than 2 GB.
- Issue #11453: asyncore: emit a ResourceWarning when an unclosed file_wrapper
object is destroyed. The destructor now closes the file if needed. The
close() method can now be called twice: the second call does nothing.

View File

@ -14,6 +14,8 @@
http://bugs.python.org/issue8108#msg102867 ?
*/
#define PY_SSIZE_T_CLEAN
#include "Python.h"
#ifdef WITH_THREAD
@ -3235,12 +3237,17 @@ static PyObject *
PySSL_RAND_add(PyObject *self, PyObject *args)
{
char *buf;
int len;
Py_ssize_t len, written;
double entropy;
if (!PyArg_ParseTuple(args, "s#d:RAND_add", &buf, &len, &entropy))
return NULL;
RAND_add(buf, len, entropy);
do {
written = Py_MIN(len, INT_MAX);
RAND_add(buf, (int)written, entropy);
buf += written;
len -= written;
} while (len);
Py_INCREF(Py_None);
return Py_None;
}