summaryrefslogtreecommitdiff
path: root/src/lib/libc/crypt/arc4random.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* In the incredibly unbelievable circumstance where _rs_init() fails toderaadt2019-03-241-2/+2
* Wrap <stdlib.h> so that calls go direct and the symbols not in theguenther2015-09-131-1/+3
* Add support for building arc4random with MSVC.bcook2015-09-101-7/+8
* Move to the <limits.h> universe.deraadt2015-01-161-2/+1
* back in september I did the large abstraction refactoring to allow thesederaadt2015-01-151-1/+2
* missing newlinederaadt2014-07-211-1/+2
* Move more OS-specific functionality to arc4random.h headers.bcook2014-07-201-5/+2
* Change _rs_allocate so it can combine the two regions (rs and rsx)deraadt2014-07-191-14/+8
* Seperate arc4random's os-dependent parts into static inline functions,deraadt2014-07-181-36/+11
* "Race-free because we're running single-threaded in a newderaadt2014-07-171-1/+5
* #ifdef wrap the _rs_forkhandlerderaadt2014-07-161-1/+3
* added handler for an atfork hook from kettenis@bcook2014-07-161-1/+10
* While we thought this would make portable life easier it actuallybeck2014-07-131-3/+1
* Wrap "thread_private.h" with #ifdef __OpenBSD__ so that other systemsderaadt2014-07-121-1/+3
* Split arc4random_uniform into it's own file, to assist other projectsderaadt2014-07-121-37/+1
* changes to improve portabilitybcook2014-07-091-10/+11
* re-init and init code paths are now more shared, so the getpid()-basedderaadt2014-06-271-2/+3
* Add back an #ifndef MAP_INHERIT_ZERO chunk to support the old getpid()deraadt2014-06-261-1/+13
* document why we explicit_bzeroderaadt2014-06-251-2/+2
* arc4random: hard fail with raise(SIGKILL) if getentropy() returns -1matthew2014-06-201-3/+4
* Move rs_chacha and rs_buf into the same memory page and don't mark itmatthew2014-06-191-22/+31
* Use MAP_INHERIT_ZERO in arc4random(3)matthew2014-06-171-37/+44
* For now... assume success of getentropy() just like we assumed successderaadt2014-06-131-3/+3
* use getgentropy() call. If it fails, things are pretty bad --deraadt2014-06-131-8/+3
* Delete the extraneous "return" statement at the end of a void function.jca2014-05-311-2/+1
* missing NULL checks to see if init is needed. found hard way by deraadt.tedu2014-05-061-3/+3
* clear a stack buffer with explicit_bzerotedu2014-05-061-2/+2
* move chacha context and buffer out of bss and allow mmap to place themtedu2014-05-061-6/+16
* delete useless test codederaadt2014-05-041-23/+1
* Remove arc4random_stir() and arc4random_addrandom(), which none shouldderaadt2013-10-211-26/+1
* replace rc4 with ChaCha20; inspired by Nick Mathewson's work on libottery;markus2013-10-011-98/+106
* spacingderaadt2013-06-111-3/+2
* Change arc4random_uniform() to calculate ``2**32 % upper_bound'' asmatthew2012-06-241-12/+3
* remove comment that hasn't been true for quite a while now;otto2010-12-221-6/+1
* No point in refreshing the pid from inside arc4_stir() when thatguenther2009-12-151-6/+15
* zap __arc4_getbyte(), it was only used by the old malloc; ok millert@otto2008-10-031-14/+1
* fix math screwup that reintroduced a bias for upper_bounds in rangedjm2008-06-041-2/+2
* diff from djm@ committed at his request:otto2008-03-161-1/+63
* - make arc4random*() functions thread safe. Use a custom spinlock functionkurt2008-01-011-41/+56
* provide an libc internal interface to get random bytes, to be used by mallocotto2007-02-121-3/+12
* Use sysctl(KERN_ARND) to get n bytes, instead of just 4 at a timeotto2005-11-301-9/+2
* Change email address for author, at his request.kjell2005-06-061-2/+2
* Change license to standard OpenBSD boilerplate, with permissionkjell2005-06-061-6/+15
* use the new fat random sysctl to get initial state. (fallback to looping).tedu2005-06-041-12/+14
* kill spaceshshoexer2004-11-021-3/+3
* Discard first 256 bytes of keystream, as per recommendation indjm2003-11-261-1/+10
* just use sysctl for stirring. thread safe and can't fail.tedu2003-08-161-23/+10
* ansification; checked by pvalderaadt2003-06-111-18/+9
* re-stir if pid changes; markus & mederaadt2003-02-141-3/+5
* License clarification from David Mazieres, ok deraadt@pvalchev2001-06-051-3/+2