| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
| |
conversion steps). it only contains kernel prototypes for 4 interfaces,
all of which legitimately belong in sys/systm.h, which are already included
by all enqueue_randomness() users.
|
|
|
|
|
| |
will frantically compensate.
ok kettenis
|
|
|
|
|
|
|
|
|
| |
this gets rid of the source annotation which doesn't really add
anything other than adding complexitiy. randomess is generally
good enough that the few extra bits that the source type would
add are not worth it.
ok mikeb@ deraadt@
|
|
|
|
|
| |
ones are capable of giving valuable works vs does-not-work evidence.
ok tedu
|
|
|
|
|
|
|
|
|
| |
we don't drop any events when the queue is full. They are instead mixed
into previous events.
The mixing function selected is addition instead of xor to reduce the
possibility that new values effectively erase existing ones.
Convert some types to u_int to ensure defined overflow.
ok deraadt djm
|
|
|
|
|
| |
boot.
ok mlarkin
|
|
|
|
|
|
|
|
| |
process all queued entropy and create a brand new pool to prevent
backtracking upon resume. At resume time, process the entropy queue
(since other resume code paths which run earlier can enqueue entropy)
and force all higher to reseed.
ok reyk djm
|
|
|
|
| |
to include that than rdnvar.h. ok deraadt dlg
|
|
|
|
|
|
|
| |
on first call, very early on, from boot-supplied entropy, then feed from
that. Later when we have more subsystems ready, the main() can properly
initialize the entropy-driven model. Lots of discussion with mikeb.
ok kettenis markus mikeb
|
|
|
|
|
|
| |
is no longer providing significant value. The random subsystem is in
pretty good state, and moments later userland will feed the dmesg.
ok jsing
|
|
|
|
| |
print labels before stats so people can tell what's what.
|
|
|
|
| |
from hshoexer@; ok tedu@, "looks good" deraadt@
|
|
|
|
|
| |
can make attempts to load 'entropy' into the RC4.
ok miod ariane
|
|
|
|
|
|
|
|
|
| |
1. only support pool words == 2048.
2. define the amount of key we use.
3. define the amount of rc4 we skip.
4. use arc4random_buf instead of reimplementing inline.
5. bzero some more "secrets".
ok deraadt djm
|
|
|
|
|
|
|
|
|
|
|
| |
side so that entropy events can come in from any kernel context. place
a 2nd very thin mutex at the call-down path as well, so that any context can
request random data. in the middle, meet with a bcopy that has no mutex,
but copying unlocked data is actually a benefit.
move the pool->MD5->RC4init sequence into a workq driven from a timeout,
so that we can do all the heavy work without any mutex held or IPL; only
grab the 2nd mutex to swap to a new RC4 state. (this workq design from tedu)
ok dlg tedu
|
|
|
|
|
|
|
| |
the minor number at all. The chances of an application ignoring the
error on /dev/random are *greater* than the risk of an application
getting bad data from it.
ok dlg tedu kjell
|
| |
|
| |
|
|
|
|
| |
ok kjell djm
|
|
|
|
|
| |
arandom code, just like minor 4. in fact, make them act exactly
the same.
|
|
|
|
| |
ok deraadt@
|
|
|
|
|
|
|
|
|
|
| |
in the range 0 <= x < upper_bound
Please use this new API instead of "arc4random() % upper_bound", as it
avoids the "modulo bias" that favours small results when upper_bound is
not a power of two.
feedback deraadt@ mcbride@; ok deraadt@
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
bigger pool (4k).
|
|
|
|
|
|
| |
make it easy to add more in the future.
make extract_entropy() faster.
more accurate stats.
|
| |
|
| |
|
| |
|
|
|
|
| |
last one doesn't point off the end.
|
| |
|
|
|
|
|
| |
bigger queue
use queue overflows for arc4_stir()
|
|
|
|
|
|
|
|
| |
event_q by flipk@
spl fix by deraadt@
gother statistics about whole processing
use 'sysctl kern.random' to view what had happened
also fix wrong vm.psstrings description
|
|
|
|
|
|
|
| |
ever used. Now a single state is kept for net, tty and disk events resp.
Also, call the randomness from disk_unbusy instead of biodone, as biodone
gets a lot of virtual events (from virtual filesystems etc), and as a bonus:
feed xfer time and size into the entropy pool too.
|
|
|
|
|
|
| |
remove keyboard randomness entry point.
make Free ppl happy, remove suspicious piece.
missed: SHA neede in libkern, why not to put aRC4 there too?
|
| |
|
| |
|
|
Initial commit.
|