index
:
openbsd
OPENBSD_2_0
OPENBSD_2_1
OPENBSD_2_2
OPENBSD_2_3
OPENBSD_2_4
OPENBSD_2_5
OPENBSD_2_6
OPENBSD_2_7
OPENBSD_2_8
OPENBSD_2_9
OPENBSD_3_0
OPENBSD_3_1
OPENBSD_3_2
OPENBSD_3_3
OPENBSD_3_4
OPENBSD_3_5
OPENBSD_3_6
OPENBSD_3_7
OPENBSD_3_8
OPENBSD_3_9
OPENBSD_4_0
OPENBSD_4_1
OPENBSD_4_2
OPENBSD_4_3
OPENBSD_4_4
OPENBSD_4_5
OPENBSD_4_6
OPENBSD_4_7
OPENBSD_4_8
OPENBSD_4_9
OPENBSD_5_0
OPENBSD_5_1
OPENBSD_5_2
OPENBSD_5_3
OPENBSD_5_4
OPENBSD_5_5
OPENBSD_5_6
OPENBSD_5_7
OPENBSD_5_8
OPENBSD_5_9
OPENBSD_6_0
OPENBSD_6_1
OPENBSD_6_2
OPENBSD_6_3
OPENBSD_6_4
OPENBSD_6_5
OPENBSD_6_6
OPENBSD_6_7
OPENBSD_6_8
OPENBSD_6_9
OPENBSD_7_0
OPENBSD_7_1
OPENBSD_7_2
OPENBSD_7_3
OPENBSD_7_4
OPENBSD_7_5
OPENBSD_7_6
master
A mirror of https://github.com/libressl/openbsd.git
summary
refs
log
tree
commit
diff
log msg
author
committer
range
path:
root
/
src
/
lib
/
libc
/
crypt
/
arc4random.c
(
follow
)
Commit message (
Expand
)
Author
Age
Files
Lines
*
Change arc4random_uniform() to calculate ``2**32 % upper_bound'' as
matthew
2012-06-24
1
-12
/
+3
*
remove comment that hasn't been true for quite a while now;
otto
2010-12-22
1
-6
/
+1
*
No point in refreshing the pid from inside arc4_stir() when that
guenther
2009-12-15
1
-6
/
+15
*
zap __arc4_getbyte(), it was only used by the old malloc; ok millert@
otto
2008-10-03
1
-14
/
+1
*
fix math screwup that reintroduced a bias for upper_bounds in range
djm
2008-06-04
1
-2
/
+2
*
diff from djm@ committed at his request:
otto
2008-03-16
1
-1
/
+63
*
- make arc4random*() functions thread safe. Use a custom spinlock function
kurt
2008-01-01
1
-41
/
+56
*
provide an libc internal interface to get random bytes, to be used by malloc
otto
2007-02-12
1
-3
/
+12
*
Use sysctl(KERN_ARND) to get n bytes, instead of just 4 at a time
otto
2005-11-30
1
-9
/
+2
*
Change email address for author, at his request.
kjell
2005-06-06
1
-2
/
+2
*
Change license to standard OpenBSD boilerplate, with permission
kjell
2005-06-06
1
-6
/
+15
*
use the new fat random sysctl to get initial state. (fallback to looping).
tedu
2005-06-04
1
-12
/
+14
*
kill spaces
hshoexer
2004-11-02
1
-3
/
+3
*
Discard first 256 bytes of keystream, as per recommendation in
djm
2003-11-26
1
-1
/
+10
*
just use sysctl for stirring. thread safe and can't fail.
tedu
2003-08-16
1
-23
/
+10
*
ansification; checked by pval
deraadt
2003-06-11
1
-18
/
+9
*
re-stir if pid changes; markus & me
deraadt
2003-02-14
1
-3
/
+5
*
License clarification from David Mazieres, ok deraadt@
pvalchev
2001-06-05
1
-3
/
+2
*
Set j = i after arc4random key schedule to be more like arc4 stream cipher;
deraadt
1999-09-28
1
-1
/
+2
*
if /dev/arandom is not available for seeding, use data from sysctl
provos
1999-06-29
1
-5
/
+22
*
$OpenBSD$
niklas
1998-03-22
1
-1
/
+1
*
Clean up some -Wall flowers.
millert
1997-07-09
1
-2
/
+3
*
arc4random() number generator, for use with things like RPC xid's.
dm
1996-12-28
1
-0
/
+175