boringssl/crypto/rand_extra
David Benjamin 632d1127df Add some RAND_bytes tests.
We're a far cry from the good old days when we just read from /dev/urandom
without any fuss...

In particular, the threading logic is slightly non-trivial and probably worth
some basic sanity checks. Also write a fork-safety test, and test the
fork-unsafe-buffering path.

The last one is less useful right now, since fork-unsafe-buffering is a no-op
with RDRAND enabled (although we do have an SDE bot...), but it's probably
worth exercising the code in
https://boringssl-review.googlesource.com/c/boringssl/+/31564.

Change-Id: I14b1fc5216f2a93183286aa9b35f5f2309107fb2
Reviewed-on: https://boringssl-review.googlesource.com/31684
Reviewed-by: Adam Langley <agl@google.com>
Commit-Queue: David Benjamin <davidben@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
2018-09-06 23:54:57 +00:00
..
deterministic.c Run the comment converter on libcrypto. 2017-08-18 21:49:04 +00:00
forkunsafe.c Run the comment converter on libcrypto. 2017-08-18 21:49:04 +00:00
fuchsia.c [fuchsia] Update to zx_cprng_draw 2018-06-28 21:08:18 +00:00
rand_extra.c Run the comment converter on libcrypto. 2017-08-18 21:49:04 +00:00
rand_test.cc Add some RAND_bytes tests. 2018-09-06 23:54:57 +00:00
windows.c Run the comment converter on libcrypto. 2017-08-18 21:49:04 +00:00