Mark Murray
4cb1e53914
Recouple arc4random(9) to the entropy device. This works whether the
...
entropy device is loaded or not.
If the entropy device is NOT loaded, the the quality of perturbations
supplied by this will suffer.
2000-12-02 16:23:54 +00:00
John Baldwin
e2059d0bfb
Back out previous revision now that sys/random.h is properly fixed.
2000-09-11 19:34:04 +00:00
John Baldwin
ebbb6afce3
Add #include's of sys/proc.h and sys/param.h to silence a warning.
2000-09-11 05:51:58 +00:00
Mark Murray
bf3191e9fa
Comment out unavailable call. This needs to be revisited when the entropy
...
device is complete.
Reviewed by: dfr
2000-06-25 10:15:58 +00:00
Dan Moschuk
e6082d1936
In the extremely miniscule chance that read_random returns <= 0, don't try
...
and use that return code as a modulus (panics are bad, mmmkay?)
1999-11-29 19:23:35 +00:00
Dan Moschuk
d65b167028
Address the concerns of the ``randomness'' of the initial PRNG. Now, we
...
use bits from /dev/random to stir the S-box. Also add an internal counter to
keep the S-box stirred on a regular basis.
Reviewed by: msmith
1999-11-28 23:39:49 +00:00
Dan Moschuk
ee3fd60126
Introduce OpenBSD-like Random PIDs. Controlled by a sysctl knob
...
(kern.randompid), which is currently defaulted off. Use ARC4 (RC4) for our
random number generation, which will not get me executed for violating
crypto laws; a Good Thing(tm).
Reviewed and Approved by: bde, imp
1999-11-28 17:51:09 +00:00