openssl/crypto/rand
Pauli b4b42d441d Make rand_pool buffers more dynamic in their sizing.
The rand pool support allocates maximal sized buffers -- this is typically
12288 bytes in size.  These pools are allocated in secure memory which is a
scarse resource.  They are also allocated per DRBG of which there are up to two
per thread.

This change allocates 64 byte pools and grows them dynamically if required.
64 is chosen to be sufficiently large so that pools do not normally need to
grow.

Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de>
(Merged from https://github.com/openssl/openssl/pull/9428)

(cherry picked from commit a6a66e4511)
2019-07-23 23:30:12 +10:00
..
build.info crypto/rand: rename drbg_rand.c to drbg_ctr.c 2018-01-04 11:47:30 +10:00
drbg_ctr.c DRBG: fix reseeding via RAND_add()/RAND_seed() with large input 2018-10-16 22:32:42 +02:00
drbg_lib.c Allocate DRBG additional data pool from non-secure memory 2019-07-23 23:14:14 +10:00
rand_egd.c Update copyright year 2018-05-29 13:16:04 +01:00
rand_err.c Make rand_pool buffers more dynamic in their sizing. 2019-07-23 23:30:12 +10:00
rand_lcl.h Make rand_pool buffers more dynamic in their sizing. 2019-07-23 23:30:12 +10:00
rand_lib.c Make rand_pool buffers more dynamic in their sizing. 2019-07-23 23:30:12 +10:00
rand_unix.c Fix UEFI build on FreeBSD by not including system headers 2019-06-19 14:39:45 +02:00
rand_vms.c Update copyright year 2019-05-28 14:49:38 +02:00
rand_win.c Update copyright year 2019-05-28 14:49:38 +02:00
randfile.c Update copyright year 2019-05-28 14:49:38 +02:00