openssl/crypto/rand
Dr. Matthias St. Pierre 8164d91d18 DRBG: make the derivation function the default for ctr_drbg
The NIST standard presents two alternative ways for seeding the
CTR DRBG, depending on whether a derivation function is used or not.
In Section 10.2.1 of NIST SP800-90Ar1 the following is assessed:

  The use of the derivation function is optional if either an
  approved RBG or an entropy source provides full entropy output
  when entropy input is requested by the DRBG mechanism.
  Otherwise, the derivation function shall be used.

Since the OpenSSL DRBG supports being reseeded from low entropy random
sources (using RAND_POOL), the use of a derivation function is mandatory.
For that reason we change the default and replace the opt-in flag
RAND_DRBG_FLAG_CTR_USE_DF with an opt-out flag RAND_DRBG_FLAG_CTR_NO_DF.
This change simplifies the RAND_DRBG_new() calls.

Reviewed-by: Rich Salz <rsalz@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/5294)
2018-02-13 17:32:54 +01:00
..
build.info crypto/rand: rename drbg_rand.c to drbg_ctr.c 2018-01-04 11:47:30 +10:00
drbg_ctr.c DRBG: make the derivation function the default for ctr_drbg 2018-02-13 17:32:54 +01:00
drbg_lib.c DRBG: make the derivation function the default for ctr_drbg 2018-02-13 17:32:54 +01:00
rand_egd.c Switch from ossl_rand to DRBG rand 2017-08-03 09:23:28 -04:00
rand_err.c DRBG: add locking api 2018-02-13 17:32:54 +01:00
rand_lcl.h DRBG: unify initialization and cleanup code 2018-02-13 17:32:54 +01:00
rand_lib.c DRBG: add locking api 2018-02-13 17:32:54 +01:00
rand_unix.c Fix reseeding issues of the public RAND_DRBG 2017-10-18 08:39:20 -05:00
rand_vms.c Fix reseeding issues of the public RAND_DRBG 2017-10-18 08:39:20 -05:00
rand_win.c Fix reseeding issues of the public RAND_DRBG 2017-10-18 08:39:20 -05:00
randfile.c Resolve warnings in VC-WIN32 build, which allows to add /WX. 2017-11-13 10:58:57 +01:00