|
c0720c1b
|
2012-08-02T11:38:32
|
|
Fix an unused variable warning on *BSD.
|
|
fcec3e80
|
2012-06-01T05:23:29
|
|
Correctly check for arc4random_buf
Apparently it's necssary to do an explicit comparison with NULL here.
This also gets rid of a compile warning
|
|
bff5f940
|
2012-05-29T12:39:12
|
|
check for arc4random_buf at runtime, on OS X
(Tweaked by nickm: Fix up the arcr4andom_buf OSX hack so that the
fallback case isn't compiled into the code when we have
arc4random_buf() and we are not on OSX. Also add a comment
explaining what's up.)
|
|
e49e2891
|
2012-02-10T17:29:53
|
|
Update copyright notices to 2012
|
|
3c824bd3
|
2011-10-24T13:18:09
|
|
Update copyright dates to 2011.
|
|
b4423029
|
2011-08-08T17:06:46
|
|
Allow OS-neutral builds for platforms where some versions have arc4random_buf
|
|
00a7a0e4
|
2011-07-17T21:48:38
|
|
Fix a warning in evutil_rand when building with threads disabled
|
|
b683cae3
|
2011-04-22T12:01:25
|
|
Avoid race-condition when initializing global locks
Previously, we did stuff like
if (!lock)
EVTHREAD_ALLOC_LOCK(lock,0);
for the evsig base global lock, the arc4random lock, and the debug_map
lock. But that's potentially racy! Instead, we move the
responisiblity for global lock initialization to the functions where
we set up the lock callbacks.
(Rationale: We already require that you set up the locking callbacks
before you create any event_base, and that you do so exatly once.)
|
|
7484df61
|
2010-11-01T13:43:43
|
|
Fix even more win64 warnings
|
|
598d1336
|
2010-10-27T22:57:53
|
|
Try to clear up more size_t vs int/long issues.
|
|
ec347b92
|
2010-07-07T16:45:03
|
|
Move event-config.h to include/event2
This change means that all required include files are in event2, and
all files not in event2/* are optional.
|
|
f9807167
|
2010-04-23T15:17:10
|
|
Make evutil_secure_rng_init() work even with builtin arc4random
|
|
4ec8fea6
|
2010-02-13T00:11:44
|
|
Make RNG work when we have arc4random() but not arc4random_buf()
|
|
d4de062e
|
2010-02-10T17:19:18
|
|
Add an arc4random implementation for use by evdns
Previously, evdns was at the mercy of the user for providing a good
entropy source; without one, it would be vulnerable to various
active attacks.
This patch adds a port of OpenBSD's arc4random() calls to Libevent
[port by Chris Davis], and wraps it up a little bit so we can use it
more safely.
|