X-Git-Url: https://git.openssl.org/?p=openssl.git;a=blobdiff_plain;f=crypto%2Frand%2Frand_local.h;h=ce1689253190e1b0a500dd53e38d152132cbf9dc;hp=7817df80d06c0596ee2e584bee6de9543354a131;hb=30a9d5d1a72149c4eb2b8e5aa83f509344c80232;hpb=ae4186b00487762f581b2276ba83e5214e0e7ee1 diff --git a/crypto/rand/rand_local.h b/crypto/rand/rand_local.h index 7817df80d0..ce16892531 100644 --- a/crypto/rand/rand_local.h +++ b/crypto/rand/rand_local.h @@ -99,7 +99,7 @@ * Typically, the DRBGs will set a minimum larger than this so optimal * allocation ought to take place (for full quality seed material). * - * The normal value has been chosed by noticing that the rand_drbg_get_nonce + * The normal value has been chosen by noticing that the rand_drbg_get_nonce * function is usually the largest of the built in allocation (twenty four * bytes and then appending another sixteen bytes). This means the buffer ends * with 40 bytes. The value of forty eight is comfortably above this which @@ -308,8 +308,10 @@ struct rand_drbg_st { size_t seedlen; DRBG_STATUS state; +#ifndef FIPS_MODE /* Application data, mainly used in the KATs. */ CRYPTO_EX_DATA ex_data; +#endif /* Implementation specific data */ union { @@ -326,6 +328,8 @@ struct rand_drbg_st { RAND_DRBG_cleanup_entropy_fn cleanup_entropy; RAND_DRBG_get_nonce_fn get_nonce; RAND_DRBG_cleanup_nonce_fn cleanup_nonce; + + void *callback_data; }; /* The global RAND method, and the global buffer and DRBG instance. */