aboutsummaryrefslogtreecommitdiffstats
path: root/src/lib/entropy/getentropy
Commit message (Collapse)AuthorAgeFilesLines
* One comment fix and one formatting fix [ci skip]René Korthaus2018-02-281-1/+1
|
* Test OS features by the feature vs the OS nameJack Lloyd2017-12-301-3/+3
|
* Change header guard format to BOTAN_FOO_H_Jack Lloyd2017-09-201-2/+2
| | | | | | ISO C++ reserves names with double underscores in them Closes #512
* Remove "Dirty hack" for multiple defines in lex_me_harder()Simon Warta2017-04-021-1/+3
|
* Always poll 256 bytes from Getentropy.Alexander Bluhm2017-03-301-3/+4
| | | | | | The OpenBSD system limit for getentropy(2) is 256 bytes. It does not make sense to use the BOTAN_SYSTEM_RNG_POLL_REQUEST define here. As it is only used in one place, another define would be overkill.
* Use getentropy(2) as random source.Alexander Bluhm2017-03-293-0/+67
Gather entropy from system call getentropy(2). This is available since in OpenBSD 5.6 and Solaris 11.3. It can provide up to 256 bytes entropy from the kernel without blocking. As a system call it does not need a file descriptor and works in chroot(2) environments without device nodes.