lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sun, 14 May 2017 16:28:00 +0200 From: Stephan Müller <smueller@...onox.de> To: linux-kernel@...r.kernel.org Cc: linux-crypto@...r.kernel.org, "Jason A. Donenfeld" <Jason@...c4.com> Subject: [PATCH v11 2/5] random: conditionally compile code depending on LRNG When selecting the LRNG for compilation, disable the legacy /dev/random implementation. The LRNG is a drop-in replacement for the legacy /dev/random which implements the same in-kernel and user space API. Only the hooks of /dev/random into other parts of the kernel need to be disabled. Signed-off-by: Stephan Mueller <smueller@...onox.de> --- include/linux/genhd.h | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/include/linux/genhd.h b/include/linux/genhd.h index acff943..2a8d748 100644 --- a/include/linux/genhd.h +++ b/include/linux/genhd.h @@ -428,8 +428,13 @@ extern void disk_flush_events(struct gendisk *disk, unsigned int mask); extern unsigned int disk_clear_events(struct gendisk *disk, unsigned int mask); /* drivers/char/random.c */ +#ifdef CONFIG_LRNG +#define add_disk_randomness(disk) do {} while (0) +#define rand_initialize_disk(disk) do {} while (0) +#else extern void add_disk_randomness(struct gendisk *disk) __latent_entropy; extern void rand_initialize_disk(struct gendisk *disk); +#endif static inline sector_t get_start_sect(struct block_device *bdev) { -- 2.9.3
Powered by blists - more mailing lists