It includes the following policy changes:
- All GetRand* functions seed the stack pointer and rdrand result (in addition to the performance counter)
- The periodic entropy added by the idle scheduler now seeds stack pointer, rdrand and perfmon data (once every 10 minutes) in addition to just a sleep timing.
- The entropy added when calling GetStrongRandBytes no longer includes the once-per-10-minutes perfmon data on windows (it is moved to the idle scheduler instead, where latency matters less).
Other changes:
- OpenSSL is no longer seeded directly anywhere. Instead, any generated randomness through our own RNG is fed back to OpenSSL (after an additional hashing step to prevent leaking our RNG state).
- Seeding that was previously done directly in RandAddSeedSleep is now moved to SeedSleep(), which is indirectly invoked through ProcRand from RandAddSeedSleep.
- Seeding that was previously done directly in GetStrongRandBytes() is now moved to SeedSlow(), which is indirectly invoked through ProcRand from GetStrongRandBytes().
Partial backport of Core PR14955
https://github.com/bitcoin/bitcoin/pull/14955/commits/9d7032e4f066777c97c58b1394884716e213790a
Depends on D4394