Restore OPENSSL_RAND_TRUSTY With b/291102972 resolved, we can try this again. Bug: 629, b:291102972 Change-Id: Ic04d1855f185ead6ae2e151dcc56493afce40b4f Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/62105 Auto-Submit: David Benjamin <davidben@google.com> Reviewed-by: Bob Beck <bbe@google.com> Commit-Queue: Bob Beck <bbe@google.com>
diff --git a/crypto/fipsmodule/rand/internal.h b/crypto/fipsmodule/rand/internal.h index 029e0f7..91bbe58 100644 --- a/crypto/fipsmodule/rand/internal.h +++ b/crypto/fipsmodule/rand/internal.h
@@ -29,10 +29,7 @@ #if defined(BORINGSSL_UNSAFE_DETERMINISTIC_MODE) #define OPENSSL_RAND_DETERMINISTIC #elif defined(OPENSSL_TRUSTY) -// TODO(b/291102972): This should define OPENSSL_RAND_TRUSTY to activate the -// Trusty RNG implementation. However, due to a different, non-Trusty target -// incorrectly defining __TRUSTY__, things will break if we follow our standard -// pattern here. +#define OPENSSL_RAND_TRUSTY #elif defined(OPENSSL_WINDOWS) #define OPENSSL_RAND_WINDOWS #elif defined(OPENSSL_LINUX)
diff --git a/include/openssl/base.h b/include/openssl/base.h index 87ffe21..97a17bb 100644 --- a/include/openssl/base.h +++ b/include/openssl/base.h
@@ -108,7 +108,7 @@ // A consumer may use this symbol in the preprocessor to temporarily build // against multiple revisions of BoringSSL at the same time. It is not // recommended to do so for longer than is necessary. -#define BORINGSSL_API_VERSION 25 +#define BORINGSSL_API_VERSION 26 #if defined(BORINGSSL_SHARED_LIBRARY)