aboutsummaryrefslogtreecommitdiffstats
path: root/crypto/rand/rand_lcl.h
Commit message (Expand)AuthorAgeFilesLines
* Reorganize local header filesDr. Matthias St. Pierre2019-09-281-360/+0
* Reorganize private crypto header filesDr. Matthias St. Pierre2019-09-281-1/+1
* drbg: ensure fork-safety without using a pthread_atfork handlerDr. Matthias St. Pierre2019-09-111-18/+5
* Add missing EBCDIC stringsopensslonzos-github2019-08-141-0/+6
* Make rand_pool buffers more dynamic in their sizing.Pauli2019-07-231-0/+19
* Allocate DRBG additional data pool from non-secure memoryBernd Edlinger2019-07-221-0/+1
* Make the RAND code available from inside the FIPS moduleMatt Caswell2019-06-281-7/+9
* Make the rand_crng code OPENSSL_CTX awareMatt Caswell2019-06-071-12/+4
* Convert drbg_lib to use OPENSSL_CTX for its global dataMatt Caswell2019-06-071-0/+2
* Squashed commit of the following:Pauli2019-04-301-2/+4
* Add the FIPS related continuous random number generator (CRNG) testing.Pauli2019-03-291-2/+27
* Following the license change, modify the boilerplates in crypto/rand/Richard Levitte2018-12-061-1/+1
* Test: link drbgtest statically against libcryptoDr. Matthias St. Pierre2018-11-081-1/+1
* Rename the rand_drbg_st data member "pool" to "seed_pool"Bernd Edlinger2018-11-071-1/+1
* Avoid two memory allocations in each RAND_DRBG_bytesBernd Edlinger2018-11-011-0/+5
* Fix data race in RAND_DRBG_generateBernd Edlinger2018-10-261-1/+3
* RAND: ensure INT32_MAX is definedRichard Levitte2018-10-231-0/+2
* DRBG: fix reseeding via RAND_add()/RAND_seed() with large inputDr. Matthias St. Pierre2018-10-161-10/+36
* Added DRBG_HMAC & DRBG_HASH + Added defaults for setting DRBG for master/publ...Shane Lontis2018-09-281-9/+40
* Make sure we use a nonce when a nonce is requiredKurt Roeckx2018-04-011-0/+21
* Document RAND_DRBG fork-safety locking modelBenjamin Kaduk2018-03-291-1/+17
* DRBG: Use the EVP layer to do AES encryptionKurt Roeckx2018-03-211-4/+3
* RAND_DRBG: add a function for setting the default DRBG type and flagsDr. Matthias St. Pierre2018-03-161-1/+1
* Publish the RAND_DRBG APIDr. Matthias St. Pierre2018-03-151-14/+2
* DRBG: make locking api truly privateDr. Matthias St. Pierre2018-02-151-0/+6
* DRBG: unify initialization and cleanup codeDr. Matthias St. Pierre2018-02-131-0/+1
* Add RAND_DRBG_bytesKurt Roeckx2018-01-291-0/+1
* Update copyright years on all files merged since Jan 1st 2018Richard Levitte2018-01-091-1/+1
* crypto/rand: restore the generic DRBG implementationDr. Matthias St. Pierre2018-01-041-16/+46
* Implement automatic reseeding of DRBG after a specified time intervalDr. Matthias St. Pierre2017-12-171-1/+13
* Add master DRBG for reseedingDr. Matthias St. Pierre2017-12-171-3/+25
* Remove unnecessary DRBG_RESEED stateDr. Matthias St. Pierre2017-10-181-1/+0
* Fix reseeding issues of the public RAND_DRBGDr. Matthias St. Pierre2017-10-181-51/+36
* Make the global DRBGs staticKurt Roeckx2017-08-281-2/+0
* DRBG: Remove 'randomness' buffer from 'RAND_DRBG'Dr. Matthias St. Pierre2017-08-281-3/+1
* RAND: Rename the RAND_poll_ex() callback and its typedefDr. Matthias St. Pierre2017-08-281-2/+2
* DRBG: clarify difference between entropy counts and buffer lengthsDr. Matthias St. Pierre2017-08-281-6/+22
* Various RAND improvementsRich Salz2017-08-071-2/+7
* Make RAND_DRBG fork-safeRich Salz2017-08-071-0/+4
* Add RAND_priv_bytes() for private keysRich Salz2017-08-031-0/+1
* Switch from ossl_rand to DRBG randRich Salz2017-08-031-38/+82
* Add --with-rand-seedRich Salz2017-07-221-9/+19
* typedef's for RAND_DRBG methodsBenjamin Kaduk2017-07-201-7/+4
* Fix faulty includeRichard Levitte2017-07-201-1/+1
* Add range-checking to RAND_DRBG_set_reseed_intervalRich Salz2017-07-201-0/+3
* Add DRBG random methodRich Salz2017-07-191-4/+82
* Start to overhaul RAND APIRich Salz2017-07-151-29/+7
* Copyright consolidation 09/10Rich Salz2016-05-171-107/+6
* Remove /* foo.c */ commentsRich Salz2016-01-261-1/+0
* OPENSSL_NO_xxx cleanup: SHARich Salz2015-01-271-11/+1