openssl/crypto/rand
Richard Levitte 6ebb49f3f9 Change rand_pool_bytes_needed to handle less entropy than 1 per 8 bits
rand_pool_bytes_needed() was constructed in such a way that the
smallest acceptable entropy factor was 1 entropy bits per 8 bits of
data.  At the same time, we have a DRBG_MINMAX_FACTOR that allows
weaker source, as small as 1 bit of entropy per 128 bits of data.
The conclusion is that rand_pool_bytes_needed() needs to change to
support weaker entropy sources.  We therefore change the input of
entropy per byte to be an entropy factor instead.  This entropy factor
expresses how many bits of data it takes (on average) to get 1 bit of
entropy.

Reviewed-by: Matthias St. Pierre <Matthias.St.Pierre@ncp-e.com>
(Merged from https://github.com/openssl/openssl/pull/6150)
2018-05-02 10:18:29 +02:00
..
build.info crypto/rand: rename drbg_rand.c to drbg_ctr.c 2018-01-04 11:47:30 +10:00
drbg_ctr.c DRBG: Use the EVP layer to do AES encryption 2018-03-21 21:32:47 +01:00
drbg_lib.c Don't cleanup uninitialized thread local slots 2018-04-28 19:09:55 +02:00
rand_egd.c Switch from ossl_rand to DRBG rand 2017-08-03 09:23:28 -04:00
rand_err.c make update 2018-04-13 23:48:41 +02:00
rand_lcl.h Make sure we use a nonce when a nonce is required 2018-04-01 21:11:26 +02:00
rand_lib.c Change rand_pool_bytes_needed to handle less entropy than 1 per 8 bits 2018-05-02 10:18:29 +02:00
rand_unix.c Change rand_pool_bytes_needed to handle less entropy than 1 per 8 bits 2018-05-02 10:18:29 +02:00
rand_vms.c Change rand_pool_bytes_needed to handle less entropy than 1 per 8 bits 2018-05-02 10:18:29 +02:00
rand_win.c Change rand_pool_bytes_needed to handle less entropy than 1 per 8 bits 2018-05-02 10:18:29 +02:00
randfile.c rand/randfile.c: fix potential resource leak in RAND_load_file. 2018-04-04 20:27:59 +02:00