openssl/providers/implementations
Pauli f000e82898 CTR, HASH and HMAC DRBGs in provider
Move the three different DRBGs to the provider.

As part of the move, the DRBG specific data was pulled out of a common
structure and into their own structures.  Only these smaller structures are
securely allocated.  This saves quite a bit of secure memory:

    +-------------------------------+
    | DRBG         | Bytes | Secure |
    +--------------+-------+--------+
    | HASH         |  376  |   512  |
    | HMAC         |  168  |   256  |
    | CTR          |  176  |   256  |
    | Common (new) |  320  |     0  |
    | Common (old) |  592  |  1024  |
    +--------------+-------+--------+

Bytes is the structure size on the X86/64.
Secure is the number of bytes of secure memory used (power of two allocator).

Reviewed-by: Matthias St. Pierre <Matthias.St.Pierre@ncp-e.com>
(Merged from https://github.com/openssl/openssl/pull/11682)
2020-06-24 20:05:42 +10:00
..
asymciphers PROV: Use rsa_padding_add_PKCS1_OAEP_mgf1_with_libctx() in RSA-OAEP 2020-05-27 12:42:20 +02:00
ciphers Allow oversized buffers for provider cipher IV fetch 2020-06-20 09:46:41 -07:00
digests Update copyright year 2020-04-23 13:55:52 +01:00
exchange Rename FIPS_MODE to FIPS_MODULE 2020-04-28 15:37:37 +02:00
include/prov share rand_pool between libcrypto and providers 2020-06-24 20:05:41 +10:00
kdfs The EVP_MAC functions have been renamed for consistency. The EVP_MAC_CTX_* 2020-06-11 11:16:37 +10:00
keymgmt Add more complete support for libctx/propq in the EC code 2020-06-19 10:34:58 +01:00
macs Update copyright year 2020-05-15 14:09:49 +01:00
rands CTR, HASH and HMAC DRBGs in provider 2020-06-24 20:05:42 +10:00
serializers Coverity 1463576: Error handling issues (CHECKED_RETURN) 2020-05-22 17:23:49 +10:00
signature Add ACVP fips module tests 2020-06-17 11:33:16 +10:00
build.info rand: set up EVP and DRBG infrastructure for RAND from providers. 2020-06-24 20:05:41 +10:00