As learned on someone else's mistakes, I'd like to ask for a review of those changes related to random data handling:
http://people.freebsd.org/~pjd/patches/libc_arc4random.c.patch http://people.freebsd.org/~pjd/patches/openssl_rand_unix.c.patch The first patch changes arc4random() to use sysctl to obtain random data instead of opening /dev/random. The main reason here is to make it more sandbox-friendly. Once closed in sandbox, a process can no longer open files, so it has no access to proper random data. As a side-effect it should be a bit faster as instead of three system calls (open, read and close) we use only one (__sysctl). The second patch enables the use of libc's arc4random(3) in OpenSSL. After implementing the first one I found that OpenBSD's arc4random(3) also uses sysctl, but without fall back to /dev/random. -- Pawel Jakub Dawidek http://www.wheelsystems.com FreeBSD committer http://www.FreeBSD.org Am I Evil? Yes, I Am! http://tupytaj.pl
pgpwGvX16lbao.pgp
Description: PGP signature