aboutsummaryrefslogtreecommitdiff
path: root/crypto/rand/rand_lib.c
AgeCommit message (Expand)AuthorFilesLines
2018-12-06Following the license change, modify the boilerplates in crypto/rand/Richard Levitte1-1/+1
2018-12-06Refactor the computation of API version limitsRichard Levitte1-1/+1
2018-11-09Fix issues with do_rand_init/rand_cleanup_intBernd Edlinger1-4/+8
2018-11-08Add missing RAND initialisation call.Pauli1-1/+2
2018-11-07Rename the rand_drbg_st data member "pool" to "seed_pool"Bernd Edlinger1-4/+4
2018-11-01Avoid two memory allocations in each RAND_DRBG_bytesBernd Edlinger1-12/+25
2018-10-29Rework and simplify resource flow in drbg_addBernd Edlinger1-7/+4
2018-10-26Fix data race in RAND_DRBG_generateBernd Edlinger1-0/+2
2018-10-26Fix a possible crash in rand_drbg_get_entropyBernd Edlinger1-0/+2
2018-10-22RAND_add(): fix heap corruption in error pathDr. Matthias St. Pierre1-0/+4
2018-10-16DRBG: fix reseeding via RAND_add()/RAND_seed() with large inputDr. Matthias St. Pierre1-21/+58
2018-08-22rand_lib.c: Don't open random devices while cleaning up.Dr. Matthias St. Pierre1-2/+6
2018-07-26Fixed issue where DRBG_CTR fails if NO_DF is used - when entropy is calledShane Lontis1-1/+1
2018-06-27Modify the DEVRANDOM source so that the files are kept open persistently.Pauli1-0/+15
2018-05-11Use void in all function definitions that do not take any argumentsKurt Roeckx1-1/+1
2018-05-02Change rand_pool_bytes_needed to handle less entropy than 1 per 8 bitsRichard Levitte1-10/+10
2018-05-01Improve error handling in rand_init functionBernd Edlinger1-6/+21
2018-04-13DRBG: implement a get_nonce() callbackDr. Matthias St. Pierre1-135/+65
2018-04-10DRBG: fix memory leak on error in rand_drbg_get_entropy()Dr. Matthias St. Pierre1-1/+2
2018-04-04Remove ambiguity in rand_pool_add[_end] return valueRichard Levitte1-24/+18
2018-04-01Make sure we use a nonce when a nonce is requiredKurt Roeckx1-21/+0
2018-03-19Make the public and private DRBG thread localKurt Roeckx1-3/+0
2018-03-17Return error when trying to use prediction resistanceKurt Roeckx1-1/+12
2018-03-17Propagate the request for prediction resistance to the get entropy callKurt Roeckx1-2/+3
2018-03-15Publish the RAND_DRBG APIDr. Matthias St. Pierre1-55/+55
2018-03-06Check the parent DRBG's strengthKurt Roeckx1-1/+11
2018-02-21Check return value of time() when getting additional data for the DRBGKurt Roeckx1-4/+12
2018-02-15DRBG: make locking api truly privateDr. Matthias St. Pierre1-6/+6
2018-02-13DRBG: add locking apiDr. Matthias St. Pierre1-9/+8
2018-02-09Fix glibc version detection.Pauli1-5/+34
2018-02-07Fix glibc specific conditional for Mac OS/XPauli1-1/+2
2018-02-07Unify timer codePauli1-21/+71
2018-02-05Use RAND_DRBG_bytes() for RAND_bytes() and RAND_priv_bytes()Dr. Matthias St. Pierre1-2/+2
2018-01-31Revert the crypto "global lock" implementationBenjamin Kaduk1-2/+2
2018-01-31crypto/rand/rand_lib.c: fix undefined reference to `clock_gettime'Dr. Matthias St. Pierre1-6/+6
2018-01-29Add RAND_DRBG_bytesKurt Roeckx1-0/+74
2017-12-17Add master DRBG for reseedingDr. Matthias St. Pierre1-3/+3
2017-10-18Add missing RAND_DRBG lockingBenjamin Kaduk1-2/+15
2017-10-18Fix reseeding issues of the public RAND_DRBGDr. Matthias St. Pierre1-111/+409
2017-08-31Add CRYPTO_thread_glock_newRich Salz1-3/+3
2017-08-28Don't auto-instantiate a DRBG when trying to use it and it's notKurt Roeckx1-34/+5
2017-08-28DRBG: Remove 'randomness' buffer from 'RAND_DRBG'Dr. Matthias St. Pierre1-23/+15
2017-08-28RAND: Rename the RAND_poll_ex() callback and its typedefDr. Matthias St. Pierre1-5/+5
2017-08-22Move randomness to allocated bufferRich Salz1-10/+13
2017-08-07Various RAND improvementsRich Salz1-29/+33
2017-08-07Make RAND_DRBG fork-safeRich Salz1-1/+6
2017-08-06Use passed drbg, not global oneDr. Stephen Henson1-2/+2
2017-08-05Set randomness buffer pointer in get_entropy calls.Dr. Stephen Henson1-0/+2
2017-08-03Add RAND_priv_bytes() for private keysRich Salz1-16/+55
2017-08-03Switch from ossl_rand to DRBG randRich Salz1-8/+128