From a62f8ced7af51d1c4fd8abceb521bd24f362ab14 Mon Sep 17 00:00:00 2001 From: nia Date: Mon, 21 Oct 2019 20:33:48 +0100 Subject: netbsd: use KERN_ARND sysctl to get entropy MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit PR-URL: https://github.com/libuv/libuv/pull/2528 Reviewed-By: Ben Noordhuis Reviewed-By: Saúl Ibarra Corretgé Reviewed-By: Colin Ihrig Reviewed-By: Santiago Gimeno --- src/unix/random-devurandom.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) (limited to 'src/unix/random-devurandom.c') diff --git a/src/unix/random-devurandom.c b/src/unix/random-devurandom.c index bfc40d20..9aa762e3 100644 --- a/src/unix/random-devurandom.c +++ b/src/unix/random-devurandom.c @@ -74,10 +74,10 @@ int uv__random_readpath(const char* path, void* buf, size_t buflen) { static void uv__random_devurandom_init(void) { char c; - /* Linux's and NetBSD's random(4) man page suggests applications should read - * at least once from /dev/random before switching to /dev/urandom in order - * to seed the system RNG. Reads from /dev/random can of course block - * indefinitely until entropy is available but that's the point. + /* Linux's random(4) man page suggests applications should read at least + * once from /dev/random before switching to /dev/urandom in order to seed + * the system RNG. Reads from /dev/random can of course block indefinitely + * until entropy is available but that's the point. */ status = uv__random_readpath("/dev/random", &c, 1); } -- cgit v1.2.3