boringssl/crypto/rand
Adam Langley bc7daec4d8 In FIPS mode, block at start up until the kernel has sufficient entropy.
We already do this in the case that getrandom is supported. This change
adds a polling loop for the case where we are using /dev/urandom.

This makes FIPS imply Linux, which I think is fine for the time being.

Change-Id: I9bf5c0f51a908621655cbcc47fc86b0366168b97
Reviewed-on: https://boringssl-review.googlesource.com/14925
Reviewed-by: Adam Langley <agl@google.com>
2017-04-14 16:56:09 +00:00
..
asm Add missing comma in .type pragma for rdrand code. 2015-06-23 15:01:45 -07:00
CMakeLists.txt Make fork-unsafe buffering act via CTR-DRBG. 2017-04-14 16:55:49 +00:00
ctrdrbg_test.cc Add CTR-DRBG. 2017-04-14 16:54:40 +00:00
ctrdrbg_vector_test.cc Add CTR-DRBG. 2017-04-14 16:54:40 +00:00
ctrdrbg_vectors.txt Add CTR-DRBG. 2017-04-14 16:54:40 +00:00
ctrdrbg.c Add CTR-DRBG. 2017-04-14 16:54:40 +00:00
deterministic.c Remove TODO. 2017-03-25 16:29:04 +00:00
forkunsafe.c Make fork-unsafe buffering act via CTR-DRBG. 2017-04-14 16:55:49 +00:00
fuchsia.c Add support for Fuchsia in crypto/rand. 2017-01-13 21:47:11 +00:00
internal.h Make fork-unsafe buffering act via CTR-DRBG. 2017-04-14 16:55:49 +00:00
rand.c Make fork-unsafe buffering act via CTR-DRBG. 2017-04-14 16:55:49 +00:00
urandom.c In FIPS mode, block at start up until the kernel has sufficient entropy. 2017-04-14 16:56:09 +00:00
windows.c Add corpora for fuzzers with fuzzer mode disabled. 2016-11-09 16:53:37 +00:00