lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 12 May 2014 00:36:01 +0200
From:	Stephan Mueller <smueller@...onox.de>
To:	Theodore Ts'o <tytso@....edu>, LKML <linux-kernel@...r.kernel.org>,
	linux-crypto@...r.kernel.org
Subject: [PATCH 0/2] Add in-kernel /dev/random equivalent

Hi,

as discussed in thread [1], an in-kernel equivalent to the blocking 
/dev/random device behavior is suggested. This in-kernel blocking access to 
the RNG can be used to seed deterministic random number generators with random 
numbers that are directly backed by the underlying noise sources.

The following patch implements this concept by adding a third output pool, the 
kernel_pool that is only accessible inside the kernel. That kernel_pool feeds 
the blocking operation API calls to obtain random numbers.

Please find a test kernel module attached. You can unload it even while the 
collection process is ongoing.

[1] https://lkml.org/lkml/2014/4/27/174

Stephan Mueller (2):
  Addition of kernel_pool
  Asynchronous and syncronous API for accessing kernel_pool

 drivers/char/random.c  | 163 
+++++++++++++++++++++++++++++++++++++++++++++----
 include/linux/random.h |  16 +++++
 2 files changed, 166 insertions(+), 13 deletions(-)

-- 
1.9.0
View attachment "lrng-asym.c" of type "text/x-csrc" (4103 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ