boringssl/crypto/rand
Adam Langley 2d58482004 Call __msan_unpoison on the output of getrandom.
MSAN doesn't hook |syscall| and thus doesn't know that the kernel has
filled the output buffer when |getrandom| is called.

This change tells MSAN to trust that the memory that |getrandom| writes
to has been initialised. This should avoid false-positives when code
operates on |RAND_bytes| output.

Change-Id: I0a74ebb21bcd1de1f28eda69558ee27f82db807a
Reviewed-on: https://boringssl-review.googlesource.com/12903
Reviewed-by: Adam Langley <alangley@gmail.com>
Commit-Queue: Adam Langley <alangley@gmail.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
2016-12-16 18:59:27 +00:00
..
asm
CMakeLists.txt Add a deterministic PRNG for fuzzing. 2016-03-03 01:36:19 +00:00
deterministic.c Add corpora for fuzzers with fuzzer mode disabled. 2016-11-09 16:53:37 +00:00
internal.h Merge hwrand.c into rand.c. 2015-09-25 22:07:42 +00:00
rand.c Add corpora for fuzzers with fuzzer mode disabled. 2016-11-09 16:53:37 +00:00
urandom.c Call __msan_unpoison on the output of getrandom. 2016-12-16 18:59:27 +00:00
windows.c Add corpora for fuzzers with fuzzer mode disabled. 2016-11-09 16:53:37 +00:00