diff options
author | Shane Lontis <shane.lontis@oracle.com> | 2021-03-08 19:17:53 +1000 |
---|---|---|
committer | Shane Lontis <shane.lontis@oracle.com> | 2021-03-18 17:52:37 +1000 |
commit | 1335ca4b0799d1714a2f8e21525cb23edf660e93 (patch) | |
tree | 721491aee8abff6f8e10761bc8a1f3edaf0a3eb7 /include | |
parent | 9500c8234d8e99396717b9e43f10cc518e8bf668 (diff) |
Add ossl_rand symbols
Partial fix for #12964
Reviewed-by: Paul Dale <pauli@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/14473)
Diffstat (limited to 'include')
-rw-r--r-- | include/crypto/rand.h | 8 | ||||
-rw-r--r-- | include/crypto/rand_pool.h | 38 |
2 files changed, 23 insertions, 23 deletions
diff --git a/include/crypto/rand.h b/include/crypto/rand.h index f093356d9d..d9432b241d 100644 --- a/include/crypto/rand.h +++ b/include/crypto/rand.h @@ -71,24 +71,24 @@ # define DEVRANDOM_EGD "/var/run/egd-pool", "/dev/egd-pool", "/etc/egd-pool", "/etc/entropy" #endif -void rand_cleanup_int(void); +void ossl_rand_cleanup_int(void); /* * Initialise the random pool reseeding sources. * * Returns 1 on success and 0 on failure. */ -int rand_pool_init(void); +int ossl_rand_pool_init(void); /* * Finalise the random pool reseeding sources. */ -void rand_pool_cleanup(void); +void ossl_rand_pool_cleanup(void); /* * Control the random pool use of open file descriptors. */ -void rand_pool_keep_random_devices_open(int keep); +void ossl_rand_pool_keep_random_devices_open(int keep); /* * Configuration diff --git a/include/crypto/rand_pool.h b/include/crypto/rand_pool.h index a651d29988..f4d1d954bc 100644 --- a/include/crypto/rand_pool.h +++ b/include/crypto/rand_pool.h @@ -19,7 +19,7 @@ * * The max_len value for the buffer provided to the rand_drbg_get_entropy() * callback is currently 2^31 bytes (2 gigabytes), if a derivation function - * is used. Since this is much too large to be allocated, the rand_pool_new() + * is used. Since this is much too large to be allocated, the ossl_rand_pool_new() * function chooses more modest values as default pool length, bounded * by RAND_POOL_MIN_LENGTH and RAND_POOL_MAX_LENGTH * @@ -82,28 +82,28 @@ typedef struct rand_pool_st { size_t entropy_requested; /* requested entropy count in bits */ } RAND_POOL; -RAND_POOL *rand_pool_new(int entropy_requested, int secure, - size_t min_len, size_t max_len); -RAND_POOL *rand_pool_attach(const unsigned char *buffer, size_t len, - size_t entropy); -void rand_pool_free(RAND_POOL *pool); +RAND_POOL *ossl_rand_pool_new(int entropy_requested, int secure, + size_t min_len, size_t max_len); +RAND_POOL *ossl_rand_pool_attach(const unsigned char *buffer, size_t len, + size_t entropy); +void ossl_rand_pool_free(RAND_POOL *pool); -const unsigned char *rand_pool_buffer(RAND_POOL *pool); -unsigned char *rand_pool_detach(RAND_POOL *pool); -void rand_pool_reattach(RAND_POOL *pool, unsigned char *buffer); +const unsigned char *ossl_rand_pool_buffer(RAND_POOL *pool); +unsigned char *ossl_rand_pool_detach(RAND_POOL *pool); +void ossl_rand_pool_reattach(RAND_POOL *pool, unsigned char *buffer); -size_t rand_pool_entropy(RAND_POOL *pool); -size_t rand_pool_length(RAND_POOL *pool); +size_t ossl_rand_pool_entropy(RAND_POOL *pool); +size_t ossl_rand_pool_length(RAND_POOL *pool); -size_t rand_pool_entropy_available(RAND_POOL *pool); -size_t rand_pool_entropy_needed(RAND_POOL *pool); +size_t ossl_rand_pool_entropy_available(RAND_POOL *pool); +size_t ossl_rand_pool_entropy_needed(RAND_POOL *pool); /* |entropy_factor| expresses how many bits of data contain 1 bit of entropy */ -size_t rand_pool_bytes_needed(RAND_POOL *pool, unsigned int entropy_factor); -size_t rand_pool_bytes_remaining(RAND_POOL *pool); +size_t ossl_rand_pool_bytes_needed(RAND_POOL *pool, unsigned int entropy_factor); +size_t ossl_rand_pool_bytes_remaining(RAND_POOL *pool); -int rand_pool_add(RAND_POOL *pool, - const unsigned char *buffer, size_t len, size_t entropy); -unsigned char *rand_pool_add_begin(RAND_POOL *pool, size_t len); -int rand_pool_add_end(RAND_POOL *pool, size_t len, size_t entropy); +int ossl_rand_pool_add(RAND_POOL *pool, + const unsigned char *buffer, size_t len, size_t entropy); +unsigned char *ossl_rand_pool_add_begin(RAND_POOL *pool, size_t len); +int ossl_rand_pool_add_end(RAND_POOL *pool, size_t len, size_t entropy); #endif /* OSSL_PROVIDER_RAND_POOL_H */ |