5f107ce4d8
This change causes FIPS mode to use RDRAND in preference to the kernel's entropy pool. This prevents issues where the ioctl that we have to do when getrandom isn't supported transiently reports that the pool is “empty” and causes us to block. Change-Id: Iad50e443d88b168bf0b85fe1e91e153d79ab3703 Reviewed-on: https://boringssl-review.googlesource.com/16466 Commit-Queue: David Benjamin <davidben@google.com> Reviewed-by: David Benjamin <davidben@google.com> CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org> |
||
---|---|---|
.. | ||
asm | ||
ctrdrbg_test.cc | ||
ctrdrbg_vector_test.cc | ||
ctrdrbg_vectors.txt | ||
ctrdrbg.c | ||
internal.h | ||
rand.c | ||
urandom.c |