summaryrefslogtreecommitdiffstats
path: root/sys/dev/rnd.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* ansijsg2021-03-061-2/+2
* slight copyright update regarding recent workderaadt2020-06-151-2/+2
* introduce "cpu_rnd_messybits" for use instead of nanotime in dev/rnd.c.dlg2020-05-311-4/+2
* dev/rndvar.h no longer has statistical interfaces (removed during variousderaadt2020-05-291-2/+1
* 3 includes not neededderaadt2020-05-291-5/+1
* Update comment block at the top to describe (a) the ring damage logic,deraadt2020-05-271-5/+8
* Rewrite the entropy enqueue ring to collect damage asyncronously, and adapt thederaadt2020-05-261-72/+60
* For large reads from /dev/random, use the arc4random_ctx_*() functionsnaddy2020-05-251-19/+13
* Pass bootblock indicator RB_GOODRANDOM to random_start(). Future workderaadt2020-05-251-2/+9
* During the rekey operation, we feedback 1 word to the lowest level.deraadt2020-05-181-2/+2
* entropy_add_ptr and entropy_input_rotate are only used insidederaadt2020-05-161-3/+3
* be more consistant about with using sizeof(object) rather than the constantderaadt2020-05-161-14/+14
* Describe the purpose of add_entropy_words() in simpler terms.deraadt2020-05-151-12/+3
* The description of the enqueue_randomness() input parameter was crazy untrue.deraadt2020-05-151-6/+2
* Explain enqueue_randomness() better. It is the supply-entropy function,deraadt2020-05-151-2/+2
* The long explanation for CRC stirring isn't helping. If anythingderaadt2020-05-151-34/+1
* The main comment block from 1996 has become highly inaccurate andderaadt2020-05-151-64/+17
* remove unneccessary include filesderaadt2020-05-151-5/+1
* Make sure 'ts' is initialized.tobhe2020-03-061-1/+2
* previous commit accidentally aliased two unique timeoutsderaadt2020-03-021-4/+4
* rename functions and types unrelated to the higher-level arc4 APIderaadt2020-03-011-16/+16
* Replace field f_isfd with field f_flags in struct filterops to allowvisa2020-02-201-3/+3
* Use C99 designated initializers with struct filterops. In addition,visa2019-12-311-5/+14
* replace add_*_randomness with enqueue_randomness()jasper2018-04-281-15/+8
* Situation occur where bootloader cannot supply kernel with earlyderaadt2018-02-091-1/+5
* Do not hardcode key length. Pointed out by jsing@mortimer2018-02-081-2/+2
* Use a temporary chacha instance to fill large randomdata sections. Avoidsmortimer2018-02-081-1/+36
* Don't mention XOR as a mix-in function since addition is done since 1.180mikeb2017-11-261-2/+2
* Remove interlocks between producers and consumers of randomness datamikeb2017-11-191-38/+33
* clang (and newer gcc at high -O) are unaware that objects placed in strangederaadt2017-07-301-3/+3
* spelling and whitespacederaadt2017-03-151-3/+3
* fix spelling errors and typos, from Michael W. Bombardierideraadt2016-12-081-4/+3
* when openbsd.randomdata was made readonly, the proto seed copy got donederaadt2016-10-181-10/+6
* another unused variable bites the dust. spotted by deraadttedu2016-10-071-4/+1
* the old time delta code is no longer used. nothing reads these values.tedu2016-10-071-74/+2
* kern.arandom no longer existsderaadt2016-09-231-4/+3
* Stop pushing version & cfdata into as entropy, since the contents arederaadt2016-09-221-9/+1
* Rototil the _rs_clearseed() function once more such that we don't map pageskettenis2016-09-041-20/+22
* Since the initial entropy pool is 8192 bytes, we need three pages to createkettenis2016-09-031-13/+18
* openbsd.randomdata became RO in userland due to the RELRO work. We shouldderaadt2016-09-011-3/+48
* Remove unused re_nbits from dev/rnd.ctom2016-07-151-5/+1
* remove the sysctl kern.random counters, since none of the remainingderaadt2016-05-231-12/+1
* Change the random event buffer from a queue to an endless ring. This waytedu2016-05-171-25/+17
* Right shift by an amount larger than width of type is undefined behavior.stefan2016-02-191-2/+2
* Use uiomove() instead of uiomovei().stefan2016-01-081-5/+5
* use ulmin when looking at uio_resid to prevent wrapping around.tedu2015-12-281-3/+3
* Sync chacha_ivsetup to the version in ssh so that we couldmikeb2015-10-271-5/+5
* missing word in comment; Kyle Milzderaadt2015-05-251-2/+2
* use the size of the buffer not the pointer in resume_randomness()jsg2015-05-041-2/+2
* Remove some includes include-what-you-use claims don'tjsg2015-03-141-2/+1