openssl/crypto/rsa
Rich Salz 75e2c87765 Switch from ossl_rand to DRBG rand
If RAND_add wraps around, XOR with existing. Add test to drbgtest that
does the wrap-around.

Re-order seeding and stop after first success.

Add RAND_poll_ex()

Use the DF and therefore lower RANDOMNESS_NEEDED.  Also, for child DRBG's,
mix in the address as the personalization bits.

Centralize the entropy callbacks, from drbg_lib to rand_lib.
(Conceptually, entropy is part of the enclosing application.)
Thanks to Dr. Matthias St Pierre for the suggestion.

Various code cleanups:
    -Make state an enum; inline RANDerr calls.
    -Add RAND_POLL_RETRIES (thanks Pauli for the idea)
    -Remove most RAND_seed calls from rest of library
    -Rename DRBG_CTX to RAND_DRBG, etc.
    -Move some code from drbg_lib to drbg_rand; drbg_lib is now only the
     implementation of NIST DRBG.
    -Remove blocklength

Reviewed-by: Paul Dale <paul.dale@oracle.com>
(Merged from https://github.com/openssl/openssl/pull/4019)
2017-08-03 09:23:28 -04:00
..
build.info
rsa_ameth.c
rsa_asn1.c
rsa_chk.c
rsa_crpt.c Switch from ossl_rand to DRBG rand 2017-08-03 09:23:28 -04:00
rsa_depr.c
rsa_err.c
rsa_gen.c
rsa_lib.c
rsa_locl.h
rsa_meth.c
rsa_none.c
rsa_oaep.c Fix an information leak in the RSA padding check code. 2017-07-31 21:47:52 +02:00
rsa_ossl.c
rsa_pk1.c Fix an information leak in the RSA padding check code. 2017-07-31 21:47:52 +02:00
rsa_pmeth.c Typo: should check mgf1md 2017-07-19 14:02:20 +01:00
rsa_prn.c
rsa_pss.c
rsa_saos.c
rsa_sign.c
rsa_ssl.c
rsa_x931.c
rsa_x931g.c