| commit | baaf868e6e8fa45396070cd8d32d196c404d9ff3 | [log] [tgz] |
|---|---|---|
| author | David Benjamin <davidben@google.com> | Fri Nov 07 09:53:11 2025 -0500 |
| committer | Boringssl LUCI CQ <boringssl-scoped@luci-project-accounts.iam.gserviceaccount.com> | Mon Nov 10 17:10:41 2025 -0800 |
| tree | a7a7d0ced79fc7c32a1eb908fbc8917274a23211 | |
| parent | 0f9f945bf0611922c33b14a543e5935c954eaa65 [diff] |
Unwind wait_for_entropy diagnostic function in getrandom code In non-FIPS config, getrandom's blocking behavior has stuck for many, many years now. In the FIPS config, we've had the logging for as long, and as of 63f42a00cf28e3b5d2c5eddfa06ed16f532bde88, will be as visible as in the FIPS config. That all has stuck without much trouble, so start cleaning this code up. This change does not impact whether we block on getrandom because we already pass a flags of 0 into the actual getrandom call. The wait_for_entropy machinery was diagnostic-only. Also inline some helper functions now that we only have one entrypoint into the OS PRNG. Bug: 446280903 Change-Id: I3cd735046df9b2c662a695f35f0d1c9c5acecef6 Reviewed-on: https://boringssl-review.googlesource.com/c/boringssl/+/83728 Commit-Queue: David Benjamin <davidben@google.com> Reviewed-by: Adam Langley <agl@google.com> Reviewed-by: Lily Chen <chlily@google.com>
BoringSSL is a fork of OpenSSL that is designed to meet Google's needs.
Although BoringSSL is an open source project, it is not intended for general use, as OpenSSL is. We don't recommend that third parties depend upon it. Doing so is likely to be frustrating because there are no guarantees of API or ABI stability.
Programs ship their own copies of BoringSSL when they use it and we update everything as needed when deciding to make API changes. This allows us to mostly avoid compromises in the name of compatibility. It works for us, but it may not work for you.
BoringSSL arose because Google used OpenSSL for many years in various ways and, over time, built up a large number of patches that were maintained while tracking upstream OpenSSL. As Google's product portfolio became more complex, more copies of OpenSSL sprung up and the effort involved in maintaining all these patches in multiple places was growing steadily.
Currently BoringSSL is the SSL library in Chrome/Chromium, Android (but it's not part of the NDK) and a number of other apps/programs.
Project links:
To file a security issue, use the Chromium process and mention in the report this is for BoringSSL. You can ignore the parts of the process that are specific to Chromium/Chrome.
There are other files in this directory which might be helpful: