Propagate the request for prediction resistance to the get entropy call
[openssl.git] / crypto / rand / rand_lib.c
index 76d5767ccd769ad80f3244740c34f9a43e6bf592..1e60ec4bb6241ef4d42a7b73475f74696cd05a1d 100644 (file)
@@ -171,8 +171,9 @@ size_t rand_acquire_entropy_from_cpu(RAND_POOL *pool)
  * its entropy will be used up first.
  */
 size_t rand_drbg_get_entropy(RAND_DRBG *drbg,
-                        unsigned char **pout,
-                        int entropy, size_t min_len, size_t max_len)
+                             unsigned char **pout,
+                             int entropy, size_t min_len, size_t max_len,
+                             int prediction_resistance)
 {
     size_t ret = 0;
     size_t entropy_available = 0;