#
b7041c07 |
| 24-Oct-2021 |
deraadt <deraadt@openbsd.org> |
For open/openat, if the flags parameter does not contain O_CREAT, the 3rd (variadic) mode_t parameter is irrelevant. Many developers in the past have passed mode_t (0, 044, 0644, or such), which mig
For open/openat, if the flags parameter does not contain O_CREAT, the 3rd (variadic) mode_t parameter is irrelevant. Many developers in the past have passed mode_t (0, 044, 0644, or such), which might lead future people to copy this broken idiom, and perhaps even believe this parameter has some meaning or implication or application. Delete them all. This comes out of a conversation where tb@ noticed that a strange (but intentional) pledge behaviour is to always knock-out high-bits from mode_t on a number of system calls as a safety factor, and his bewilderment that this appeared to be happening against valid modes (at least visually), but no sorry, they are all irrelevant junk. They could all be 0xdeafbeef. ok millert
show more ...
|
#
557f50be |
| 17-May-2020 |
deraadt <deraadt@openbsd.org> |
As done everywhere else, use a local version of MINIMUM() and avoid conflict against a potential define min() from some other scope.
|
#
03b209d2 |
| 20-Nov-2018 |
deraadt <deraadt@openbsd.org> |
Saw a mention somewhere a while back that the gotdata() function in here could creates non-uniformity since very short fetches of 0 would be excluded. blocks of 0 are just as random as any other dat
Saw a mention somewhere a while back that the gotdata() function in here could creates non-uniformity since very short fetches of 0 would be excluded. blocks of 0 are just as random as any other data, including blocks of 4 4 4.. This is a misguided attempt to identify errors from the entropy churn/gather code doesn't make sense, errors don't happen. ok bcook
show more ...
|
#
b8461433 |
| 07-Aug-2016 |
tb <tb@openbsd.org> |
Update the link for the getentropy(2) manual to man.openbsd.org/
ok deraadt@
|
#
044fc755 |
| 11-Sep-2015 |
deraadt <deraadt@openbsd.org> |
unify files further
|
#
092b0306 |
| 25-Aug-2015 |
deraadt <deraadt@openbsd.org> |
unify versions, so they are easier to diff.
|
#
5fd8226c |
| 21-Jul-2014 |
guenther <guenther@openbsd.org> |
Use explicit_bzero() instead of memset() on buffers going out of scope. Also, zero the SHA256 context.
suggested by "eric" in a comment on an opensslrampage.org post ok miod@ deraadt@
|
#
e7bb830c |
| 19-Jul-2014 |
deraadt <deraadt@openbsd.org> |
remove disabled main hook; we use phdr now; ok bcook
|
#
5a30a5b2 |
| 13-Jul-2014 |
deraadt <deraadt@openbsd.org> |
Use dl_iterate_phdr() to iterate over the segments and throw the addresses into the hash; hoping the system has some ASLR or PIE. This replaces and substantially improves upon &main which proved pro
Use dl_iterate_phdr() to iterate over the segments and throw the addresses into the hash; hoping the system has some ASLR or PIE. This replaces and substantially improves upon &main which proved problematic with some picky linkers. Work with kettenis, testing by beck
show more ...
|
#
b5f12122 |
| 13-Jul-2014 |
deraadt <deraadt@openbsd.org> |
Provide a link to the canonical API specification. ok beck
|
#
94379de9 |
| 13-Jul-2014 |
beck <beck@openbsd.org> |
Take away the use of the address of main as a source of entropy. Causes distractions to people testing and seeing link errors in some setups. This will come back in another form ok deraadt@
|
#
54dec340 |
| 12-Jul-2014 |
wouter <wouter@openbsd.org> |
Remove signed/unsigned warning, statement before declaration and add a function to use function pointers that does not take sizeof(fptr).
OK beck@
|
#
190c328c |
| 12-Jul-2014 |
deraadt <deraadt@openbsd.org> |
remove gratuitous differences, ok beck bcook
|
#
399b1dc5 |
| 12-Jul-2014 |
beck <beck@openbsd.org> |
Solaris uses a symbolic link for /dev/urandom which harms best practice of using O_NOFOLLOW - cope with it as best as possible by trying two different paths. - written by deraadt@ and kettenis@
|
#
3f84b207 |
| 08-Jul-2014 |
beck <beck@openbsd.org> |
getentropy for osx and solaris. will be needed for a portable release
|