summaryrefslogtreecommitdiffstats
path: root/crypto/include
diff options
context:
space:
mode:
authorKurt Roeckx <kurt@roeckx.be>2018-02-18 19:26:55 +0100
committerKurt Roeckx <kurt@roeckx.be>2018-03-17 11:35:33 +0100
commiteb238134e0a0fb5ac5c8239ade1dfe77a815aba5 (patch)
treed4d25057d1c5fb2532f0c1e2d8a05924ebe970cb /crypto/include
parenta080c3e816e923680e57e647b5cbc3896e8e8106 (diff)
Propagate the request for prediction resistance to the get entropy call
Reviewed-by: Dr. Matthias St. Pierre <Matthias.St.Pierre@ncp-e.com> GH: #5402
Diffstat (limited to 'crypto/include')
-rw-r--r--crypto/include/internal/rand_int.h3
1 files changed, 2 insertions, 1 deletions
diff --git a/crypto/include/internal/rand_int.h b/crypto/include/internal/rand_int.h
index d90d9c5f63..27ca703fcf 100644
--- a/crypto/include/internal/rand_int.h
+++ b/crypto/include/internal/rand_int.h
@@ -34,7 +34,8 @@ size_t rand_acquire_entropy_from_cpu(RAND_POOL *pool);
/* DRBG entropy callbacks. */
size_t rand_drbg_get_entropy(RAND_DRBG *drbg,
unsigned char **pout,
- int entropy, size_t min_len, size_t max_len);
+ int entropy, size_t min_len, size_t max_len,
+ int prediction_resistance);
void rand_drbg_cleanup_entropy(RAND_DRBG *drbg,
unsigned char *out, size_t outlen);
size_t rand_drbg_get_additional_data(unsigned char **pout, size_t max_len);