This change adds the option to calculate (EC)DSA nonces by hashing the message and private key along with entropy to avoid leaking the private key if the PRNG fails.
Note that this depends on the build fixes in http://rt.openssl.org/Ticket/Display.html?id=3051
dsa_nonce.patch
Description: Binary data
