boringssl/crypto/fipsmodule/rand
Adam Langley 5ede28c8a4 Tighten up getrandom handling.
While I don't believe EINTR can occur with a non-blocking getrandom call
when talking to the kernel directly, that may not be true when certain
sandboxing systems are being used.

Additionally, with this change we will no longer silently ignore errors
other than ENOSYS.

Update-Note: update internal bug 115344138.

Change-Id: I952c132cf325dcc17dc38e68f054abc41de1f8b0
Reviewed-on: https://boringssl-review.googlesource.com/32006
Reviewed-by: David Benjamin <davidben@google.com>
2018-09-20 16:15:51 +00:00
..
asm Update several assembly files from upstream. 2018-08-07 18:57:17 +00:00
ctrdrbg_test.cc
ctrdrbg_vectors.txt
ctrdrbg.c
internal.h
rand.c Use a pool of |rand_state| objects. 2018-07-06 21:25:37 +00:00
urandom.c Tighten up getrandom handling. 2018-09-20 16:15:51 +00:00