summaryrefslogtreecommitdiff
path: root/src/lib/libcrypto/rand/rc4_rand.c (follow)
Commit message (Collapse)AuthorAgeFilesLines
* another round of chemo for the RAND code to provide clarity.tedu2014-04-181-52/+0
| | | | ok deraadt
* Some software expects RAND_status() to return 1 for success, so alwaysreyk2014-04-161-2/+10
| | | | | | | return 1 in the arc4random backend because there is no possible error condition. Unbreaks lynx, git and friends. ok miod@ dcoppa@
* Replace the old OpenSSL PRNG by direct use of arc4random_buf(), keeping themiod2014-04-151-0/+44
existing RAND interfaces unchanged. All interfaces allowing external feed or seed of the RNG (either from a file or a local entropy gathering daemon) are kept for ABI compatibility, but are no longer do anything. While the OpenSSL PRNG was required 15+ years ago when many systems lacked proper entropy collection, things have evolved and one can reasonably assume it is better to use the kernel (system global) entropy pool rather than trying to build one's own and having to compensate for thread scheduling... <RANT> Whoever thought that RAND_screen(), feeding the PRNG with the contents of the local workstation's display, under Win32, was a smart idea, ought to be banned from security programming. </RANT> ok beck@ deraadt@ tedu@