summaryrefslogtreecommitdiffstats
path: root/sys/dev/rnd.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* Change arc4random_uniform() to calculate ``2**32 % upper_bound'' asmatthew2012-06-241-12/+3
* Add a new kqfilter for random which returns ARC4_MAIN_MAX_BYTES for readnicm2011-07-061-4/+50
* bring back carrying over state from the previous RC4 instance whendjm2011-01-111-1/+7
* all the bzeros in rnd are important, use explicit_bzerotedu2011-01-111-10/+10
* update the documentation regarding the *4 vs *6 decision for early RC4deraadt2011-01-101-7/+11
* move comment block regarding ARC4_MAIN_MAX_BYTESderaadt2011-01-101-8/+8
* randomread does its own rekeying now, so we don't need the large buf function.tedu2011-01-101-27/+1
* OK, this is getting silly, but we might as well zero the entropy bufferderaadt2011-01-101-1/+2
* zero another intermediate key storage areaderaadt2011-01-101-1/+2
* be more careful with nanotime() calls in early entropy storage, sincederaadt2011-01-091-7/+9
* split randomattach into random_init() and random_start(), so that wederaadt2011-01-081-3/+19
* spacesderaadt2011-01-081-7/+7
* switch back from PAGE_SIZE for the sake of sparcderaadt2011-01-081-4/+4
* destatic. ok deraadttedu2011-01-081-12/+13
* some minor improvements to rnd.tedu2011-01-071-61/+28
* substantial rewrite. put a very thin mutex at the entropy-collectionderaadt2011-01-071-327/+228
* since randomwrite() also has no blocking operations at all, we need toderaadt2011-01-071-1/+3
* For very large operations in randomread(), use a local rc4 instancederaadt2011-01-061-6/+22
* make all /dev/*random nodes respond; in fact, don't even worry aboutderaadt2011-01-061-23/+7
* in arc4_stir() only grab 64 bytes from the MD5 output. Grabbing morederaadt2011-01-041-2/+2
* Do not fold the MD5 in half. This might have made sense to someone whenderaadt2011-01-011-18/+2
* comment cleanupderaadt2011-01-011-24/+3
* make randomattach do the parts of it's job in the right order, then movederaadt2010-12-311-25/+28
* cleanup the ioctl functionderaadt2010-12-311-9/+4
* delete includes we do not needderaadt2010-12-311-3/+1
* further improvements describing what we are doingderaadt2010-12-311-22/+14
* all random nodes have been arc4-based for a while, so none of them everderaadt2010-12-311-92/+1
* be more cynical about boot-time entropy, and fold time and entropy data in.deraadt2010-12-301-13/+24
* knfderaadt2010-12-291-5/+5
* Since there is only one random_state, we can access it directly withoutderaadt2010-12-291-20/+18
* arc4random_count is not used; other things inside rndstats do the accountingderaadt2010-12-291-6/+1
* the rnd_debug stuff was not usefulderaadt2010-12-291-19/+2
* kill RND_ARND_OLD, and decrease RND_NODEV to account for it; ok djmderaadt2010-12-291-2/+1
* Remove the get_random_bytes() API.deraadt2010-12-291-16/+2
* the random ioctl stuff is not very useful. I want to see all thederaadt2010-12-291-49/+1
* try to update the monster comment at the top of this file to explainderaadt2010-12-241-84/+17
* rewrite randomwrite() for clarity after discussion with mikebderaadt2010-12-221-10/+14
* adding timer randomness in ioctl doesn't really help and looks suspicious.tedu2010-11-211-4/+1
* remove support for srandom and urandom. direct everyone to arandom instead.tedu2010-10-021-42/+4
* remove proc.h include from uvm_map.h. This has far reaching effects, astedu2010-04-201-2/+1
* Every selwakeup() should have a matching KNOTE() (even if kqueue isn'tnicm2009-11-091-2/+1
* Sanity check: we overrun the rnd_ed[] array if nbits is 32, but thatguenther2009-06-051-1/+5
* remove i386-only inline assembler roll() function; gcc optimises thedjm2008-12-151-14/+3
* extra decl not needed; spotted by djmderaadt2008-11-241-3/+1
* allow entropy to be queued before randomattach() is calledderaadt2008-11-241-9/+16
* Seed the random pool with the dmesg buffer at randomattach().mpf2008-11-241-6/+8
* kernel/5592: yield() between copying out large chunks of random data todjm2008-10-151-2/+5
* minor 3 was /dev/prandom, which used random(). make that use thederaadt2008-10-101-10/+6
* Convert timeout_add() calls using multiples of hz to timeout_add_sec()blambert2008-09-101-3/+2
* correct long since bitrotted commentsdjm2008-06-111-24/+23