Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | another round of chemo for the RAND code to provide clarity. | tedu | 2014-04-18 | 1 | -121/+0 |
| | | | | ok deraadt | ||||
* | Replace the old OpenSSL PRNG by direct use of arc4random_buf(), keeping the | miod | 2014-04-15 | 1 | -306/+2 |
| | | | | | | | | | | | | | | | | | | | | | existing RAND interfaces unchanged. All interfaces allowing external feed or seed of the RNG (either from a file or a local entropy gathering daemon) are kept for ABI compatibility, but are no longer do anything. While the OpenSSL PRNG was required 15+ years ago when many systems lacked proper entropy collection, things have evolved and one can reasonably assume it is better to use the kernel (system global) entropy pool rather than trying to build one's own and having to compensate for thread scheduling... <RANT> Whoever thought that RAND_screen(), feeding the PRNG with the contents of the local workstation's display, under Win32, was a smart idea, ought to be banned from security programming. </RANT> ok beck@ deraadt@ tedu@ | ||||
* | OpenSSL 1.0.0f: merge | djm | 2012-01-05 | 1 | -34/+74 |
| | |||||
* | resolve conflicts, fix local changes | djm | 2010-10-01 | 1 | -5/+66 |
| | |||||
* | resolve conflicts | djm | 2009-04-06 | 1 | -1/+1 |
| | |||||
* | use one call to arc4random_buf() instead of lots of arc4random() | djm | 2008-09-10 | 1 | -8/+2 |
| | |||||
* | resolve conflicts | djm | 2008-09-06 | 1 | -35/+84 |
| | |||||
* | resolve conflicts | djm | 2005-04-29 | 1 | -9/+26 |
| | |||||
* | merge 0.9.7b with local changes; crank majors for libssl/libcrypto | markus | 2003-05-12 | 1 | -2/+9 |
| | |||||
* | use arc4random instead of /dev/arandom, | markus | 2002-09-17 | 1 | -30/+11 |
| | | | | allows RAND_poll after chroot, ok deraadt, fgsch | ||||
* | merge openssl-0.9.7-beta3, tested on vax by miod@ | markus | 2002-09-10 | 1 | -0/+2 |
| | |||||
* | OpenSSL 0.9.7 stable 2002 05 08 merge | beck | 2002-05-15 | 1 | -0/+274 |