freebsd-dev/sys/netkey
rwatson 1842dbb56e The KAME IPSEC implementation at one point used its own pseudo-random
number generator, which was re-seeded via a timeout.  Now centralized
randomness/entropy is used, we can garbage collect the timeout and
re-seeding code (which was largely a no-op).

Discussed with:	itojun, suz, JINMEI Tatuya < jinmei at isl dot rdc dot toshiba dot co dot jp >
2004-09-02 20:14:03 +00:00
..
key_debug.c - cleanup SP refcnt issue. 2003-11-04 16:02:05 +00:00
key_debug.h Reduce diffs against KAME. No functional change. 2003-09-30 09:06:58 +00:00
key_var.h nuke unused ICMPV6CTL_NAMES and KEYCTL_NAMES macros. 2003-10-07 15:14:33 +00:00
key.c The KAME IPSEC implementation at one point used its own pseudo-random 2004-09-02 20:14:03 +00:00
key.h - cleanup SP refcnt issue. 2003-11-04 16:02:05 +00:00
keydb.c - cleanup SP refcnt issue. 2003-11-04 16:02:05 +00:00
keydb.h - cleanup SP refcnt issue. 2003-11-04 16:02:05 +00:00
keysock.c Semi-gratuitous white space synchronization with KAME tree: to reduce 2004-08-27 18:41:41 +00:00
keysock.h - do not quit from key_sendup() even if writes to non-target 2003-11-02 09:13:33 +00:00