<feed xmlns='http://www.w3.org/2005/Atom'>
<title>wireguard-openbsd/lib/libc/stdlib/random.3, branch jd/queueboosts</title>
<subtitle>WireGuard implementation for the OpenBSD kernel</subtitle>
<id>https://git.zx2c4.com/wireguard-openbsd/atom/lib/libc/stdlib/random.3?h=jd%2Fqueueboosts</id>
<link rel='self' href='https://git.zx2c4.com/wireguard-openbsd/atom/lib/libc/stdlib/random.3?h=jd%2Fqueueboosts'/>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/'/>
<updated>2014-12-09T21:55:39Z</updated>
<entry>
<title>Xr and Ox fixes;</title>
<updated>2014-12-09T21:55:39Z</updated>
<author>
<name>jmc</name>
<email>jmc@openbsd.org</email>
</author>
<published>2014-12-09T21:55:39Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=851f8e6038dcb4cf75f22929b912230b3f6ff19a'/>
<id>urn:sha1:851f8e6038dcb4cf75f22929b912230b3f6ff19a</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Change rand(), random(), drand48(), lrand48(), mrand48(), and srand48()</title>
<updated>2014-12-08T21:45:19Z</updated>
<author>
<name>deraadt</name>
<email>deraadt@openbsd.org</email>
</author>
<published>2014-12-08T21:45:19Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=f7510a6ece7d11f60752a2ac701b127e460d8361'/>
<id>urn:sha1:f7510a6ece7d11f60752a2ac701b127e460d8361</id>
<content type='text'>
to returning strong random by default, source from arc4random(3).
Parameters to the seeding functions are ignored, and the subsystems remain
in strong random mode.  If you wish the standardized deterministic mode,
call srand_deterministic(), srandom_determistic(), srand48_deterministic(),
seed48_deterministic() or lcong48_deterministic() instead.
The re-entrant functions rand_r(), erand48(), nrand48(), jrand48() are
unaffected by this change and remain in deterministic mode (for now).

Verified as a good roadmap forward by auditing 8800 pieces of software.
Roughly 60 pieces of software will need adaptation to request the
deterministic mode.

Violates POSIX and C89, which violate best practice in this century.
ok guenther tedu millert
</content>
</entry>
<entry>
<title>Don't describe random() as "better".</title>
<updated>2014-11-25T17:40:38Z</updated>
<author>
<name>millert</name>
<email>millert@openbsd.org</email>
</author>
<published>2014-11-25T17:40:38Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=224c67f89b14f144df66cf369a89ee29b28b212d'/>
<id>urn:sha1:224c67f89b14f144df66cf369a89ee29b28b212d</id>
<content type='text'>
Remove the bug about rand() being faster.
Add a bug about historical implementations seeding very poorly.
</content>
</entry>
<entry>
<title>zap trailing whitespace;</title>
<updated>2014-07-18T06:20:36Z</updated>
<author>
<name>jmc</name>
<email>jmc@openbsd.org</email>
</author>
<published>2014-07-18T06:20:36Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=f5a76d7e3c14b1af2bdc940aac6d5434b2b4141f'/>
<id>urn:sha1:f5a76d7e3c14b1af2bdc940aac6d5434b2b4141f</id>
<content type='text'>
</content>
</entry>
<entry>
<title>it is 2014, and we still need to encourage people away from srand()</title>
<updated>2014-07-17T23:12:28Z</updated>
<author>
<name>deraadt</name>
<email>deraadt@openbsd.org</email>
</author>
<published>2014-07-17T23:12:28Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=659ea642727a3b08e65eb38c1b2b3ca3eb4f0aca'/>
<id>urn:sha1:659ea642727a3b08e65eb38c1b2b3ca3eb4f0aca</id>
<content type='text'>
and random().  Sigh.
</content>
</entry>
<entry>
<title>oops, i deleted the wrong word</title>
<updated>2014-07-13T14:25:00Z</updated>
<author>
<name>tedu</name>
<email>tedu@openbsd.org</email>
</author>
<published>2014-07-13T14:25:00Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=a3102f6ac6608ec1670c640c963bb124a92ad8be'/>
<id>urn:sha1:a3102f6ac6608ec1670c640c963bb124a92ad8be</id>
<content type='text'>
</content>
</entry>
<entry>
<title>remove a lie spotted by guenther</title>
<updated>2014-07-13T14:24:23Z</updated>
<author>
<name>tedu</name>
<email>tedu@openbsd.org</email>
</author>
<published>2014-07-13T14:24:23Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=4d745e0e211ff15037b4fc6773276ee46799aeea'/>
<id>urn:sha1:4d745e0e211ff15037b4fc6773276ee46799aeea</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Use the fancy .In macro for includes. From Jan Klemkow. ok jmc schwarze</title>
<updated>2013-06-05T03:39:22Z</updated>
<author>
<name>tedu</name>
<email>tedu@openbsd.org</email>
</author>
<published>2013-06-05T03:39:22Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=64d4e9871d1af4e50715ace8f2f237ff8e4d36e0'/>
<id>urn:sha1:64d4e9871d1af4e50715ace8f2f237ff8e4d36e0</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Improve standards conformance: ecvt(), fcvt(), gcvt(), mktemp(), ttyslot(),</title>
<updated>2012-06-01T01:01:57Z</updated>
<author>
<name>guenther</name>
<email>guenther@openbsd.org</email>
</author>
<published>2012-06-01T01:01:57Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=b10cd18816ef05a64b29120c243bb2006d9f7465'/>
<id>urn:sha1:b10cd18816ef05a64b29120c243bb2006d9f7465</id>
<content type='text'>
and valloc() are not in the current version, while posix_memalign() mkstemp(),
and mkdtemp() are, and setstate()'s argument has lost a bogus 'const'.

ok millert@ jmc@ espie@ kettenis@; ports build testing by naddy@
</content>
</entry>
<entry>
<title>convert to new .Dd format;</title>
<updated>2007-05-31T19:19:00Z</updated>
<author>
<name>jmc</name>
<email>jmc@openbsd.org</email>
</author>
<published>2007-05-31T19:19:00Z</published>
<link rel='alternate' type='text/html' href='https://git.zx2c4.com/wireguard-openbsd/commit/?id=9490d37cb6a2f9c8feb8d4b7f9c43b2ac41784aa'/>
<id>urn:sha1:9490d37cb6a2f9c8feb8d4b7f9c43b2ac41784aa</id>
<content type='text'>
</content>
</entry>
</feed>
