[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <34197429.2CvoIfft9B@positron.chronox.de>
Date: Fri, 05 Aug 2016 17:08:14 +0200
From: Stephan Mueller <smueller@...onox.de>
To: Ted Tso <tytso@....edu>, herbert@...dor.apana.org.au
Cc: linux-kernel@...r.kernel.org, linux-crypto@...r.kernel.org,
ath9k-devel@....qualcomm.com, linux-wireless@...r.kernel.org,
ath9k-devel@...ts.ath9k.org, Kalle Valo <kvalo@...eaurora.org>
Subject: [RFC][PATCH] RANDOM: ATH9K RNG delivers zero bits of entropy
Hi Ted, Herbert,
I sent a question to the ATH9K RNG some time ago to the developers.
See https://www.mail-archive.com/linux-crypto@vger.kernel.org/msg19115.html
I have not yet received a word and I think this issue should be resolved.
Thanks
Stephan
---8<---
The ATH9K driver implements an RNG which is completely bypassing the
standard Linux HW generator logic.
The RNG may or may not deliver entropy. Considering the conservative
approach in treating entropy with respect to non-auditable sources, this
patch changes the delivered entropy value to zero. The RNG still feeds
data into the input_pool but it is assumed to have no entropy.
When the ATH9K RNG changes to use the HW RNG framework, it may re-enable
the entropy estimation considering that a user can change that value at
boot and runtime.
Signed-off-by: Stephan Mueller <smueller@...onox.de>
---
drivers/net/wireless/ath/ath9k/rng.c | 3 +--
1 file changed, 1 insertion(+), 2 deletions(-)
diff --git a/drivers/net/wireless/ath/ath9k/rng.c b/drivers/net/wireless/ath/ath9k/rng.c
index d38e50f..d63dc48 100644
--- a/drivers/net/wireless/ath/ath9k/rng.c
+++ b/drivers/net/wireless/ath/ath9k/rng.c
@@ -92,8 +92,7 @@ static int ath9k_rng_kthread(void *data)
fail_stats = 0;
/* sleep until entropy bits under write_wakeup_threshold */
- add_hwgenerator_randomness((void *)rng_buf, bytes_read,
- ATH9K_RNG_ENTROPY(bytes_read));
+ add_hwgenerator_randomness((void *)rng_buf, bytes_read, 0);
}
kfree(rng_buf);
--
2.7.4
Powered by blists - more mailing lists