diff options
author | 2011-12-22 16:28:01 -0500 | |
---|---|---|
committer | 2012-01-16 11:18:21 -0800 | |
commit | 3e88bdff1c65145f7ba297ccec69c774afe4c785 (patch) | |
tree | 2d01752cdd8a5b3f1cbcad3e0ef55d6f02696efd /tools/perf/util/scripting-engines/trace-event-python.c | |
parent | random: Use arch_get_random_int instead of cycle counter if avail (diff) | |
download | wireguard-linux-3e88bdff1c65145f7ba297ccec69c774afe4c785.tar.xz wireguard-linux-3e88bdff1c65145f7ba297ccec69c774afe4c785.zip |
random: Use arch-specific RNG to initialize the entropy store
If there is an architecture-specific random number generator (such as
RDRAND for Intel architectures), use it to initialize /dev/random's
entropy stores. Even in the worst case, if RDRAND is something like
AES(NSA_KEY, counter++), it won't hurt, and it will definitely help
against any other adversaries.
Signed-off-by: "Theodore Ts'o" <tytso@mit.edu>
Link: http://lkml.kernel.org/r/1324589281-31931-1-git-send-email-tytso@mit.edu
Signed-off-by: H. Peter Anvin <hpa@linux.intel.com>
Diffstat (limited to 'tools/perf/util/scripting-engines/trace-event-python.c')
0 files changed, 0 insertions, 0 deletions