summaryrefslogtreecommitdiffstats
path: root/sys/libkern/arc4random.c
Commit message (Collapse)AuthorAgeFilesLines
* Recouple arc4random(9) to the entropy device. This works whether themarkm2000-12-021-2/+4
| | | | | | | entropy device is loaded or not. If the entropy device is NOT loaded, the the quality of perturbations supplied by this will suffer.
* Back out previous revision now that sys/random.h is properly fixed.jhb2000-09-111-2/+0
|
* Add #include's of sys/proc.h and sys/param.h to silence a warning.jhb2000-09-111-0/+2
|
* Comment out unavailable call. This needs to be revisited when the entropymarkm2000-06-251-3/+4
| | | | | device is complete. Reviewed by: dfr
* In the extremely miniscule chance that read_random returns <= 0, don't trydan1999-11-291-2/+6
| | | | and use that return code as a modulus (panics are bad, mmmkay?)
* Address the concerns of the ``randomness'' of the initial PRNG. Now, wedan1999-11-281-14/+32
| | | | | | | use bits from /dev/random to stir the S-box. Also add an internal counter to keep the S-box stirred on a regular basis. Reviewed by: msmith
* Introduce OpenBSD-like Random PIDs. Controlled by a sysctl knobdan1999-11-281-0/+89
(kern.randompid), which is currently defaulted off. Use ARC4 (RC4) for our random number generation, which will not get me executed for violating crypto laws; a Good Thing(tm). Reviewed and Approved by: bde, imp
OpenPOWER on IntegriCloud