boringssl/crypto/fipsmodule/rand
Adam Langley 5f107ce4d8 Prefer RDRAND in FIPS mode.
This change causes FIPS mode to use RDRAND in preference to the kernel's
entropy pool. This prevents issues where the ioctl that we have to do
when getrandom isn't supported transiently reports that the pool is
“empty” and causes us to block.

Change-Id: Iad50e443d88b168bf0b85fe1e91e153d79ab3703
Reviewed-on: https://boringssl-review.googlesource.com/16466
Commit-Queue: David Benjamin <davidben@google.com>
Reviewed-by: David Benjamin <davidben@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
2017-05-18 20:32:45 +00:00
..
asm Move much of rand/ into the FIPS module. 2017-04-21 22:03:18 +00:00
ctrdrbg_test.cc Move much of rand/ into the FIPS module. 2017-04-21 22:03:18 +00:00
ctrdrbg_vector_test.cc Move much of rand/ into the FIPS module. 2017-04-21 22:03:18 +00:00
ctrdrbg_vectors.txt Move much of rand/ into the FIPS module. 2017-04-21 22:03:18 +00:00
ctrdrbg.c Move cipher/ into crypto/fipsmodule/ 2017-05-05 22:39:40 +00:00
internal.h Move much of rand/ into the FIPS module. 2017-04-21 22:03:18 +00:00
rand.c Prefer RDRAND in FIPS mode. 2017-05-18 20:32:45 +00:00
urandom.c crypto/fipsmodule: Allow breaking CRNG self-test. 2017-05-12 18:43:09 +00:00