| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <20150820141221.GC2567@codeblueprint.co.uk> Date: Thu, 20 Aug 2015 15:12:21 +0100 From: Matt Fleming <matt@...eblueprint.co.uk> To: "Lee, Chun-Yi" <joeyli.kernel@...il.com> Cc: linux-kernel@...r.kernel.org, linux-efi@...r.kernel.org, linux-pm@...r.kernel.org, "Rafael J. Wysocki" <rjw@...ysocki.net>, Matthew Garrett <matthew.garrett@...ula.com>, Len Brown <len.brown@...el.com>, Pavel Machek <pavel@....cz>, Josh Boyer <jwboyer@...hat.com>, Vojtech Pavlik <vojtech@...e.cz>, Matt Fleming <matt.fleming@...el.com>, Jiri Kosina <jkosina@...e.cz>, "H. Peter Anvin" <hpa@...or.com>, Ingo Molnar <mingo@...hat.com>, "Lee, Chun-Yi" <jlee@...e.com> Subject: Re: [PATCH v2 04/16] x86/efi: Generating random number in EFI stub On Tue, 11 Aug, at 02:16:24PM, Lee, Chun-Yi wrote: > This patch adds the codes for generating random number array as the > HMAC key that will used by later EFI stub codes. > > The original codes in efi_random copied from aslr and add the codes > to accept input entropy and EFI debugging. In later patch will add > the codes to get random number by EFI protocol. The separate codes > can avoid impacting aslr function. Is there some way we can share the code between aslr and the EFI boot stub? People may not review both files when making changes and so bug fixes to one might not appear in the other. -- Matt Fleming, Intel Open Source Technology Center -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists