summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/rand/rand_unix.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
* another round of chemo for the RAND code to provide clarity.tedu2014-04-181-121/+0
| | | | ok deraadt
* Replace the old OpenSSL PRNG by direct use of arc4random_buf(), keeping themiod2014-04-151-306/+2
| | | | | | | | | | | | | | | | | | | | | existing RAND interfaces unchanged. All interfaces allowing external feed or seed of the RNG (either from a file or a local entropy gathering daemon) are kept for ABI compatibility, but are no longer do anything. While the OpenSSL PRNG was required 15+ years ago when many systems lacked proper entropy collection, things have evolved and one can reasonably assume it is better to use the kernel (system global) entropy pool rather than trying to build one's own and having to compensate for thread scheduling... <RANT> Whoever thought that RAND_screen(), feeding the PRNG with the contents of the local workstation's display, under Win32, was a smart idea, ought to be banned from security programming. </RANT> ok beck@ deraadt@ tedu@
* OpenSSL 1.0.0f: mergedjm2012-01-051-34/+74
|
* resolve conflicts, fix local changesdjm2010-10-011-5/+66
|
* resolve conflictsdjm2009-04-061-1/+1
|
* use one call to arc4random_buf() instead of lots of arc4random()djm2008-09-101-8/+2
|
* resolve conflictsdjm2008-09-061-35/+84
|
* resolve conflictsdjm2005-04-291-9/+26
|
* merge 0.9.7b with local changes; crank majors for libssl/libcryptomarkus2003-05-121-2/+9
|
* use arc4random instead of /dev/arandom,markus2002-09-171-30/+11
| | | | allows RAND_poll after chroot, ok deraadt, fgsch
* merge openssl-0.9.7-beta3, tested on vax by miod@markus2002-09-101-0/+2
|
* OpenSSL 0.9.7 stable 2002 05 08 mergebeck2002-05-151-0/+274