boringssl/crypto/rand
David Benjamin bc5b2a2e22 Add a deterministic PRNG for fuzzing.
If running the stack through a fuzzer, we would like execution to be
completely deterministic. This is gated on a
BORINGSSL_UNSAFE_FUZZER_MODE #ifdef.

For now, this just uses the zero ChaCha20 key and a global counter. As
needed, we can extend this to a thread-local counter and a separate
ChaCha20 stream and counter per input length.

Change-Id: Ic6c9d8a25e70d68e5dc6804e2c234faf48e51395
Reviewed-on: https://boringssl-review.googlesource.com/7286
Reviewed-by: Adam Langley <agl@google.com>
2016-03-03 01:36:19 +00:00
..
asm
CMakeLists.txt Add a deterministic PRNG for fuzzing. 2016-03-03 01:36:19 +00:00
deterministic.c Add a deterministic PRNG for fuzzing. 2016-03-03 01:36:19 +00:00
internal.h Merge hwrand.c into rand.c. 2015-09-25 22:07:42 +00:00
rand.c Add a deterministic PRNG for fuzzing. 2016-03-03 01:36:19 +00:00
urandom.c Add a deterministic PRNG for fuzzing. 2016-03-03 01:36:19 +00:00
windows.c Add a deterministic PRNG for fuzzing. 2016-03-03 01:36:19 +00:00