summaryrefslogtreecommitdiff
path: root/src/lib/libc/crypt/arc4random.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* Change arc4random_uniform() to calculate ``2**32 % upper_bound'' asmatthew2012-06-241-12/+3
* remove comment that hasn't been true for quite a while now;otto2010-12-221-6/+1
* No point in refreshing the pid from inside arc4_stir() when thatguenther2009-12-151-6/+15
* zap __arc4_getbyte(), it was only used by the old malloc; ok millert@otto2008-10-031-14/+1
* fix math screwup that reintroduced a bias for upper_bounds in rangedjm2008-06-041-2/+2
* diff from djm@ committed at his request:otto2008-03-161-1/+63
* - make arc4random*() functions thread safe. Use a custom spinlock functionkurt2008-01-011-41/+56
* provide an libc internal interface to get random bytes, to be used by mallocotto2007-02-121-3/+12
* Use sysctl(KERN_ARND) to get n bytes, instead of just 4 at a timeotto2005-11-301-9/+2
* Change email address for author, at his request.kjell2005-06-061-2/+2
* Change license to standard OpenBSD boilerplate, with permissionkjell2005-06-061-6/+15
* use the new fat random sysctl to get initial state. (fallback to looping).tedu2005-06-041-12/+14
* kill spaceshshoexer2004-11-021-3/+3
* Discard first 256 bytes of keystream, as per recommendation indjm2003-11-261-1/+10
* just use sysctl for stirring. thread safe and can't fail.tedu2003-08-161-23/+10
* ansification; checked by pvalderaadt2003-06-111-18/+9
* re-stir if pid changes; markus & mederaadt2003-02-141-3/+5
* License clarification from David Mazieres, ok deraadt@pvalchev2001-06-051-3/+2
* Set j = i after arc4random key schedule to be more like arc4 stream cipher;deraadt1999-09-281-1/+2
* if /dev/arandom is not available for seeding, use data from sysctlprovos1999-06-291-5/+22
* $OpenBSD$niklas1998-03-221-1/+1
* Clean up some -Wall flowers.millert1997-07-091-2/+3
* arc4random() number generator, for use with things like RPC xid's.dm1996-12-281-0/+175