lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20140805225640.GA19511@thunk.org>
Date:	Tue, 5 Aug 2014 18:56:40 -0400
From:	Theodore Ts'o <tytso@....edu>
To:	Linus Torvalds <torvalds@...ux-foundation.org>
Cc:	linux-kernel@...r.kernel.org
Subject: [GIT PULL] random changes for 3.17

The following changes since commit 1795cd9b3a91d4b5473c97f491d63892442212ab:

  Linux 3.16-rc5 (2014-07-13 14:04:33 -0700)

are available in the git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/tytso/random.git tags/random_for_linus

for you to fetch changes up to e02b876597777ab26288dd2611a97b597d14d661:

  hwrng: Pass entropy to add_hwgenerator_randomness() in bits, not bytes (2014-08-05 16:50:10 -0400)

----------------------------------------------------------------
Cleanups and bug fixes to /dev/random, add a new getrandom(2) system
call, which is a superset of OpenBSD's getentropy(2) call, for use
with userspace crypto libraries such as LibreSSL.  Also add the
ability to have a kernel thread to pull entropy from hardware rng
devices into /dev/random.

----------------------------------------------------------------
Stephen Boyd (1):
      hwrng: Pass entropy to add_hwgenerator_randomness() in bits, not bytes

Theodore Ts'o (8):
      random: always update the entropy pool under the spinlock
      random: remove unneeded hash of a portion of the entropy pool
      random: only update the last_pulled time if we actually transferred entropy
      random: clean up interrupt entropy accounting for archs w/o cycle counters
      random: use an improved fast_mix() function
      random: use registers from interrupted code for CPU's w/o a cycle counter
      random: introduce getrandom(2) system call
      random: limit the contribution of the hw rng to at most half

Torsten Duwe (4):
      random: add_hwgenerator_randomness() for feeding entropy from devices
      hwrng: create filler thread
      hwrng: add per-device entropy derating
      hw_random: fix sparse warning (NULL vs 0 for pointer)

 arch/x86/syscalls/syscall_32.tbl  |   1 +
 arch/x86/syscalls/syscall_64.tbl  |   1 +
 drivers/char/hw_random/core.c     |  78 ++++++++++++++++--
 drivers/char/random.c             | 315 +++++++++++++++++++++++++++++++++++++++++++-----------------------------
 include/linux/hw_random.h         |   5 ++
 include/linux/syscalls.h          |   3 +
 include/uapi/asm-generic/unistd.h |   4 +-
 include/uapi/linux/random.h       |   9 +++
 8 files changed, 282 insertions(+), 134 deletions(-)
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ