History log of /openbsd-current/lib/libcrypto/arc4random/getentropy_hpux.c
Revision (<<< Hide revision tags) (Show revision tags >>>) Date Author Comments
# 1.8 24-Oct-2021 deraadt

For open/openat, if the flags parameter does not contain O_CREAT, the
3rd (variadic) mode_t parameter is irrelevant. Many developers in the past
have passed mode_t (0, 044, 0644, or such), which might lead future people
to copy this broken idiom, and perhaps even believe this parameter has some
meaning or implication or application. Delete them all.
This comes out of a conversation where tb@ noticed that a strange (but
intentional) pledge behaviour is to always knock-out high-bits from
mode_t on a number of system calls as a safety factor, and his bewilderment
that this appeared to be happening against valid modes (at least visually),
but no sorry, they are all irrelevant junk. They could all be 0xdeafbeef.
ok millert


Revision tags: OPENBSD_6_8_BASE OPENBSD_6_9_BASE OPENBSD_7_0_BASE
# 1.7 17-May-2020 deraadt

As done everywhere else, use a local version of MINIMUM() and avoid
conflict against a potential define min() from some other scope.


Revision tags: OPENBSD_6_5_BASE OPENBSD_6_6_BASE OPENBSD_6_7_BASE
# 1.6 20-Nov-2018 deraadt

Saw a mention somewhere a while back that the gotdata() function in
here could creates non-uniformity since very short fetches of 0 would
be excluded. blocks of 0 are just as random as any other data, including
blocks of 4 4 4.. This is a misguided attempt to identify errors from the
entropy churn/gather code doesn't make sense, errors don't happen.
ok bcook


Revision tags: OPENBSD_6_1_BASE OPENBSD_6_2_BASE OPENBSD_6_3_BASE OPENBSD_6_4_BASE
# 1.5 07-Aug-2016 tb

branches: 1.5.2; 1.5.8;
Update the link for the getentropy(2) manual to man.openbsd.org/

ok deraadt@


# 1.4 11-Sep-2015 deraadt

unify files further


# 1.3 25-Aug-2015 deraadt

unify versions, so they are easier to diff.


# 1.2 07-Jan-2015 bcook

mix in more virtual memory and process information


# 1.1 06-Jan-2015 bcook

add initial HP-UX getentropy/arc4random support.

patch from Kinichiro Inoguchi, tested on HP-UX 11.31

ok deraadt@


# 1.7 17-May-2020 deraadt

As done everywhere else, use a local version of MINIMUM() and avoid
conflict against a potential define min() from some other scope.


Revision tags: OPENBSD_6_5_BASE OPENBSD_6_6_BASE OPENBSD_6_7_BASE
# 1.6 20-Nov-2018 deraadt

Saw a mention somewhere a while back that the gotdata() function in
here could creates non-uniformity since very short fetches of 0 would
be excluded. blocks of 0 are just as random as any other data, including
blocks of 4 4 4.. This is a misguided attempt to identify errors from the
entropy churn/gather code doesn't make sense, errors don't happen.
ok bcook


Revision tags: OPENBSD_6_1_BASE OPENBSD_6_2_BASE OPENBSD_6_3_BASE OPENBSD_6_4_BASE
# 1.5 07-Aug-2016 tb

branches: 1.5.2; 1.5.8;
Update the link for the getentropy(2) manual to man.openbsd.org/

ok deraadt@


# 1.4 11-Sep-2015 deraadt

unify files further


# 1.3 25-Aug-2015 deraadt

unify versions, so they are easier to diff.


# 1.2 07-Jan-2015 bcook

mix in more virtual memory and process information


# 1.1 06-Jan-2015 bcook

add initial HP-UX getentropy/arc4random support.

patch from Kinichiro Inoguchi, tested on HP-UX 11.31

ok deraadt@


# 1.6 20-Nov-2018 deraadt

Saw a mention somewhere a while back that the gotdata() function in
here could creates non-uniformity since very short fetches of 0 would
be excluded. blocks of 0 are just as random as any other data, including
blocks of 4 4 4.. This is a misguided attempt to identify errors from the
entropy churn/gather code doesn't make sense, errors don't happen.
ok bcook


Revision tags: OPENBSD_6_1_BASE OPENBSD_6_2_BASE OPENBSD_6_3_BASE OPENBSD_6_4_BASE
# 1.5 07-Aug-2016 tb

Update the link for the getentropy(2) manual to man.openbsd.org/

ok deraadt@


# 1.4 11-Sep-2015 deraadt

unify files further


# 1.3 25-Aug-2015 deraadt

unify versions, so they are easier to diff.


# 1.2 07-Jan-2015 bcook

mix in more virtual memory and process information


# 1.1 06-Jan-2015 bcook

add initial HP-UX getentropy/arc4random support.

patch from Kinichiro Inoguchi, tested on HP-UX 11.31

ok deraadt@


Revision tags: OPENBSD_6_1_BASE OPENBSD_6_2_BASE
# 1.5 07-Aug-2016 tb

Update the link for the getentropy(2) manual to man.openbsd.org/

ok deraadt@


# 1.4 11-Sep-2015 deraadt

unify files further


# 1.3 25-Aug-2015 deraadt

unify versions, so they are easier to diff.


# 1.2 07-Jan-2015 bcook

mix in more virtual memory and process information


# 1.1 06-Jan-2015 bcook

add initial HP-UX getentropy/arc4random support.

patch from Kinichiro Inoguchi, tested on HP-UX 11.31

ok deraadt@