lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <1379882338-7209-1-git-send-email-tytso@mit.edu>
Date:	Sun, 22 Sep 2013 16:38:46 -0400
From:	Theodore Ts'o <tytso@....edu>
To:	Linux Kernel Developers List <linux-kernel@...r.kernel.org>
Cc:	hpa@...or.com, joern@...fs.org, macro@...ux-mips.org,
	ralf@...ux-mips.org, dave.taht@...il.com, blogic@...nwrt.org,
	andrewmcgr@...il.com, smueller@...onox.de, geert@...ux-m68k.org,
	tg@...bsd.de, Theodore Ts'o <tytso@....edu>
Subject: [PATCH, RFC 00/12] random driver changes

Recent events have inspired me to take a closer look at the /dev/random
driver and make a number of changes to improve it.  The changes reflect
relatively minor changes across the entire /dev/random architecture,
including:

* how we collect entropy on non-x86 architectures
* optimizing the CPU overhead when we collect entropy
* improving our entropy accumulation estimates
* small changes to the mixing function suggested by researchers who have
	been analyzing the /dev/random driver

I would appreciate folks taking a look at the changes and making any
comments, asking questions, etc.

Cheers!

						- Ted

H. Peter Anvin (3):
  random: Statically compute poolbitshift, poolbytes, poolbits
  random: Allow fractional bits to be tracked
  random: Account for entropy loss due to overwrites

Theodore Ts'o (9):
  random: run random_int_secret_init() run after all late_initcalls
  random: fix the tracepoint for get_random_bytes(_arch)
  random: optimize spinlock use in add_device_randomness()
  random: allow architectures to optionally define random_get_entropy()
  random: mix in architectural randomness earlier in extract_buf()
  random: optimize the entropy_store structure
  random: cap the rate which the /dev/urandom pool gets reseeded
  random: speed up the fast_mix function by a factor of four
  random: adjust the generator polynomials in the mixing function
    slightly

 drivers/char/random.c         | 419 +++++++++++++++++++++++++++---------------
 include/linux/random.h        |   1 +
 include/linux/timex.h         |  17 ++
 include/trace/events/random.h |  33 +++-
 init/main.c                   |   2 +
 5 files changed, 321 insertions(+), 151 deletions(-)

-- 
1.7.12.rc0.22.gcdd159b

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ