summaryrefslogtreecommitdiffstats
path: root/sys/dev/random
Commit message (Expand)AuthorAgeFilesLines
* Don't repeat the the word 'the'eadler2016-05-171-1/+1
* dev/random: minor spelling fixes in comments.pfg2016-05-022-4/+4
* dev/random: use our roundup() macro instead of re-implementing it.pfg2016-04-253-7/+4
* Fix rdrand_rng.ko and padlock_rng.ko dependencies, making moduleskib2016-04-162-2/+2
* Don't start the random harvester process until timers are working.jhb2016-03-281-1/+2
* Add missing braces.glebius2016-02-171-1/+2
* Replace sys/crypto/sha2/sha2.c with lib/libmd/sha512c.callanjude2015-12-277-10/+8
* Fix printf-like formats for KASSERT.markm2015-10-051-1/+1
* It appears that under some circumstances, like virtualisiation, themarkm2015-10-051-1/+10
* Make the UMA harvesting go away completely if not wanted. Default to "not wan...markm2015-08-225-29/+19
* Add DEV_RANDOM pseudo-option and use it to "include out" random(4)markm2015-08-1711-331/+574
* Fix some untidy logic. I committed the wrong local fix; please pass the point...markm2015-07-191-1/+1
* Remove out-of-date comments.markm2015-07-192-2/+0
* Fix the read blocking so that it is interruptable and slow down the rate of c...markm2015-07-191-4/+10
* Optimise the buffer-size calculation. It was possible to get one block too many.markm2015-07-191-19/+16
* Fix the build after breaking it in r285549.ed2015-07-141-1/+1
* Implement the CloudABI random_get() system call.ed2015-07-141-0/+7
* Rework the read routines to keep the PRNG sources happy. These workmarkm2015-07-131-7/+24
* * Address review (and add a bit myself).markm2015-07-129-196/+147
* Huge cleanup of random(4) code.markm2015-06-3023-2159/+1435
* - fortuna.c: catch up with r278927 and fix a buffer overflow by using thedelphij2015-02-182-1/+7
* Fix a bug where this function overflowed it's buffer... This wasjmg2015-02-171-2/+10
* When the new random adaptor code was brought it in r273872, a call tojmg2015-02-174-15/+16
* Update comment.kib2014-11-111-1/+1
* Constify the AES code and propagate to consumers. This allows us todes2014-11-103-18/+13
* Fix random.ko module.kib2014-11-074-23/+7
* Simplify assembler in ivy.c. Move the copying of the random bits intokib2014-11-071-12/+11
* When reseeding the DPRNG, we're supposed to hash the current key anddes2014-11-041-10/+20
* Don't assert random_adaptors_lock in random_adaptor_read_rate().delphij2014-11-031-4/+0
* - Make sure random_adaptor accesses happen only whendelphij2014-11-021-22/+39
* Restore the auto-reseed logic, but move it to a much later point,des2014-11-022-26/+5
* This is the much-discussed major upgrade to the random(4) device, known to yo...markm2014-10-3025-1381/+2308
* Make sure correct object code is generated at -O0.np2014-10-131-1/+1
* Use Intel's official name (Secure Key) per IntelĀ® Digital Random Numberdelphij2014-06-271-1/+1
* Correctly set the sysctl format to Alphanumeric, rather than letting it default.markm2014-04-261-2/+2
* Convert the random entropy harvesting code to use a const void * pointeradrian2013-11-011-1/+1
* Utilize the stronger guarantees on the call arguments from thekib2013-10-171-32/+25
* There is an issue (not seen in our testing) where "yarrow" andmarkm2013-10-134-7/+19
* Merge from project branch. Uninteresting commits are trimmed.markm2013-10-1219-501/+866
|\
| * Add a RANDOM_RWFILE option and hide the entropy cache code behind it.des2013-10-094-19/+36
| * Sigh. I can't even get a single #ifdef right. Who's got the hat?markm2013-10-091-1/+1
| * staticize struct random_hardware_sourcedes2013-10-092-2/+2
| * Wrap some policy-rich code in 'if NOTYET' until we can thresh out what it rea...markm2013-10-091-0/+2
| * Re-add /dev/urandom for compatibility purposes.des2013-10-091-0/+1
| * comment nitdes2013-10-091-1/+1
| * Add missing include guards and move the existing ones out of thedes2013-10-098-9/+34
| * Fix some just-noticed problems:markm2013-10-087-24/+11
| * MFC - tracking commit.markm2013-10-081-2/+2
| * Time to eat crow for me.markm2013-10-081-13/+12
| * Add YARROW_RNG and FORTUNA_RNG to sys/conf/options.des2013-10-083-0/+33
OpenPOWER on IntegriCloud