openssl/crypto/rand
Richard Levitte ce147f7333 VMS: modernise rand_pool_acquire_entropy, step 1
Stop redefining structures that are already defined in system
headers.  This also means we can stop setting the pointer size
globally, because the system structures will have the correct pointer
sizes either way.  The only exception is passing the right pointer
size to a function.

Stop trying to twist things around with rand(), that's the job of the
DRBG that we feed.

Stop assuming the location of the JPI$_FINALEXC item, look it up
instead.

Signal an exception if the sys$getjpiw call fails (it means the item
list isn't set up right, so works as an assertion, but using VMS
methodology).

Reviewed-by: Andy Polyakov <appro@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/6151)
2018-05-03 15:13:15 +02:00
..
build.info crypto/rand: rename drbg_rand.c to drbg_ctr.c 2018-01-04 11:47:30 +10:00
drbg_ctr.c DRBG: Use the EVP layer to do AES encryption 2018-03-21 21:32:47 +01:00
drbg_lib.c Don't cleanup uninitialized thread local slots 2018-04-28 19:09:55 +02:00
rand_egd.c opensslconf.h inclusion cleanup 2018-05-02 23:42:21 +02:00
rand_err.c make update 2018-04-13 23:48:41 +02:00
rand_lcl.h Make sure we use a nonce when a nonce is required 2018-04-01 21:11:26 +02:00
rand_lib.c Change rand_pool_bytes_needed to handle less entropy than 1 per 8 bits 2018-05-02 10:18:29 +02:00
rand_unix.c Change rand_pool_bytes_needed to handle less entropy than 1 per 8 bits 2018-05-02 10:18:29 +02:00
rand_vms.c VMS: modernise rand_pool_acquire_entropy, step 1 2018-05-03 15:13:15 +02:00
rand_win.c Change rand_pool_bytes_needed to handle less entropy than 1 per 8 bits 2018-05-02 10:18:29 +02:00
randfile.c rand/randfile.c: fix potential resource leak in RAND_load_file. 2018-04-04 20:27:59 +02:00