From: Randy Dunlap <rdunlap@infradead.org> To: "Stephan Müller" <smueller@chronox.de>, "Arnd Bergmann" <arnd@arndb.de> Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>, linux-crypto@vger.kernel.org, LKML <linux-kernel@vger.kernel.org>, linux-api@vger.kernel.org, "Eric W. Biederman" <ebiederm@xmission.com>, "Alexander E. Patrakov" <patrakov@gmail.com>, "Ahmed S. Darwish" <darwish.07@gmail.com>, "Theodore Y. Ts'o" <tytso@mit.edu>, Willy Tarreau <w@1wt.eu>, Matthew Garrett <mjg59@srcf.ucam.org>, Vito Caputo <vcaputo@pengaru.com>, Andreas Dilger <adilger.kernel@dilger.ca>, Jan Kara <jack@suse.cz>, Ray Strode <rstrode@redhat.com>, William Jon McCann <mccann@jhu.edu>, zhangjs <zachary@baishancloud.com>, Andy Lutomirski <luto@kernel.org>, Florian Weimer <fweimer@redhat.com>, Lennart Poettering <mzxreary@0pointer.de>, Nicolai Stange <nstange@suse.de>, "Peter, Matthias" <matthias.peter@bsi.bund.de>, Marcelo Henrique Cerri <marcelo.cerri@canonical.com>, Roman Drahtmueller <draht@schaltsekun.de>, Neil Horman <nhorman@redhat.com>, Julia Lawall <julia.lawall@inria.fr>, Dan Carpenter <dan.carpenter@oracle.com> Subject: Re: [PATCH v28 01/12] Linux Random Number Generator Date: Wed, 15 Jan 2020 16:11:40 -0800 [thread overview] Message-ID: <3a8d5d2d-d54f-cf18-0c93-dbe8cd91ed12@infradead.org> (raw) In-Reply-To: <2211028.KG5F5qfgHC@positron.chronox.de> Hi, On 1/15/20 2:31 AM, Stephan Müller wrote: > CC: "Eric W. Biederman" <ebiederm@xmission.com> > CC: "Alexander E. Patrakov" <patrakov@gmail.com> > CC: "Ahmed S. Darwish" <darwish.07@gmail.com> > CC: "Theodore Y. Ts'o" <tytso@mit.edu> > CC: Willy Tarreau <w@1wt.eu> > CC: Matthew Garrett <mjg59@srcf.ucam.org> > CC: Vito Caputo <vcaputo@pengaru.com> > CC: Andreas Dilger <adilger.kernel@dilger.ca> > CC: Jan Kara <jack@suse.cz> > CC: Ray Strode <rstrode@redhat.com> > CC: William Jon McCann <mccann@jhu.edu> > CC: zhangjs <zachary@baishancloud.com> > CC: Andy Lutomirski <luto@kernel.org> > CC: Florian Weimer <fweimer@redhat.com> > CC: Lennart Poettering <mzxreary@0pointer.de> > CC: Nicolai Stange <nstange@suse.de> > Mathematical aspects Reviewed-by: "Peter, Matthias" <matthias.peter@bsi.bund.de> > Reviewed-by: Marcelo Henrique Cerri <marcelo.cerri@canonical.com> > Reviewed-by: Roman Drahtmueller <draht@schaltsekun.de> > Tested-by: Roman Drahtmüller <draht@schaltsekun.de> > Tested-by: Marcelo Henrique Cerri <marcelo.cerri@canonical.com> > Tested-by: Neil Horman <nhorman@redhat.com> > Signed-off-by: Stephan Mueller <smueller@chronox.de> > --- > MAINTAINERS | 7 + > drivers/char/Kconfig | 2 + > drivers/char/Makefile | 9 +- > drivers/char/lrng/Kconfig | 67 +++ > drivers/char/lrng/Makefile | 9 + > drivers/char/lrng/lrng_archrandom.c | 94 ++++ > drivers/char/lrng/lrng_aux.c | 148 +++++++ > drivers/char/lrng/lrng_chacha20.c | 265 ++++++++++++ > drivers/char/lrng/lrng_chacha20.h | 25 ++ > drivers/char/lrng/lrng_drng.c | 400 +++++++++++++++++ > drivers/char/lrng/lrng_interfaces.c | 638 ++++++++++++++++++++++++++++ > drivers/char/lrng/lrng_internal.h | 296 +++++++++++++ > drivers/char/lrng/lrng_lfsr.h | 152 +++++++ > drivers/char/lrng/lrng_pool.c | 588 +++++++++++++++++++++++++ > drivers/char/lrng/lrng_sw_noise.c | 102 +++++ > drivers/char/lrng/lrng_sw_noise.h | 57 +++ > include/linux/lrng.h | 63 +++ > 17 files changed, 2921 insertions(+), 1 deletion(-) > create mode 100644 drivers/char/lrng/Kconfig > create mode 100644 drivers/char/lrng/Makefile > create mode 100644 drivers/char/lrng/lrng_archrandom.c > create mode 100644 drivers/char/lrng/lrng_aux.c > create mode 100644 drivers/char/lrng/lrng_chacha20.c > create mode 100644 drivers/char/lrng/lrng_chacha20.h > create mode 100644 drivers/char/lrng/lrng_drng.c > create mode 100644 drivers/char/lrng/lrng_interfaces.c > create mode 100644 drivers/char/lrng/lrng_internal.h > create mode 100644 drivers/char/lrng/lrng_lfsr.h > create mode 100644 drivers/char/lrng/lrng_pool.c > create mode 100644 drivers/char/lrng/lrng_sw_noise.c > create mode 100644 drivers/char/lrng/lrng_sw_noise.h > create mode 100644 include/linux/lrng.h > > diff --git a/drivers/char/lrng/Kconfig b/drivers/char/lrng/Kconfig > new file mode 100644 > index 000000000000..56f13efd3592 > --- /dev/null > +++ b/drivers/char/lrng/Kconfig > @@ -0,0 +1,67 @@ > +# SPDX-License-Identifier: GPL-2.0 > +# > +# Linux Random Number Generator configuration > +# > + > +menuconfig LRNG > + bool "Linux Random Number Generator" This should probably depend on CRYPTO and/or some other CRYPTO_xxx symbols. Or (worst case) select them. :( This message (when CONFIG_CRYPTO is disabled and no crypto facilities are enabled) should be avoidable when the correct Kconfig entries are used: ../drivers/char/lrng/lrng_drbg.c:38:2: error: #error "Unknown DRBG in use" #error "Unknown DRBG in use" > + help > + The Linux Random Number Generator (LRNG) is the replacement > + of the existing /dev/random provided with drivers/char/random.c. > + It generates entropy from different noise sources and > + delivers significant entropy during boot. > + > +if LRNG > + > +choice > + prompt "LRNG Entropy Pool Size" > + default LRNG_POOL_SIZE_4096 > + help > + Select the size of the LRNG entropy pool. The size of the > + entropy pool is relevant for the amount of entropy that > + the LRNG can maintain as a maximum. The larger the size > + of the entropy pool is the more entropy can be maintained > + but the less often older entropic values are overwritten > + with new entropy. > + > + config LRNG_POOL_SIZE_512 > + bool "512 bits" > + > + config LRNG_POOL_SIZE_1024 > + bool "1024 bits" > + > + config LRNG_POOL_SIZE_2048 > + bool "2048 bits" > + > + config LRNG_POOL_SIZE_4096 > + bool "4096 bits (default)" > + > + config LRNG_POOL_SIZE_8192 > + bool "8192 bits" > + > + config LRNG_POOL_SIZE_16384 > + bool "16384 bits" > + > + config LRNG_POOL_SIZE_32768 > + bool "32768 bits" > + > + config LRNG_POOL_SIZE_65536 > + bool "65536 bits" > + > + config LRNG_POOL_SIZE_131072 > + bool "131072 bits" > +endchoice > + > +config LRNG_POOL_SIZE > + int > + default 0 if LRNG_POOL_SIZE_512 > + default 1 if LRNG_POOL_SIZE_1024 > + default 2 if LRNG_POOL_SIZE_2048 > + default 3 if LRNG_POOL_SIZE_4096 > + default 4 if LRNG_POOL_SIZE_8192 > + default 5 if LRNG_POOL_SIZE_16384 > + default 6 if LRNG_POOL_SIZE_32768 > + default 7 if LRNG_POOL_SIZE_65536 > + default 8 if LRNG_POOL_SIZE_131072 > + > +endif # LRNG > diff --git a/drivers/char/lrng/lrng_archrandom.c b/drivers/char/lrng/lrng_archrandom.c > new file mode 100644 > index 000000000000..eeba708d025f > --- /dev/null > +++ b/drivers/char/lrng/lrng_archrandom.c > @@ -0,0 +1,94 @@ > +// SPDX-License-Identifier: GPL-2.0 OR BSD-2-Clause > +/* > + * LRNG Fast Noise Source: CPU-based noise source > + * > + * Copyright (C) 2016 - 2020, Stephan Mueller <smueller@chronox.de> > + */ > + > +#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt > + > +#include <linux/random.h> > + > +#include "lrng_internal.h" > + > +/* > + * Estimated entropy of data is a 32th of LRNG_DRNG_SECURITY_STRENGTH_BITS. > + * As we have no ability to review the implementation of those noise sources, > + * it is prudent to have a conservative estimate here. > + */ > +#define LRNG_ARCHRANDOM_DEFAULT_STRENGTH (LRNG_DRNG_SECURITY_STRENGTH_BITS>>5) > +#define LRNG_ARCHRANDOM_TRUST_CPU_STRENGTH LRNG_DRNG_SECURITY_STRENGTH_BITS > +#ifdef CONFIG_RANDOM_TRUST_CPU > +static u32 archrandom = LRNG_ARCHRANDOM_TRUST_CPU_STRENGTH; > +#else > +static u32 archrandom = LRNG_ARCHRANDOM_DEFAULT_STRENGTH; > +#endif > +module_param(archrandom, uint, 0644); > +MODULE_PARM_DESC(archrandom, "Entropy in bits of 256 data bits from CPU noise " > + "source (e.g. RDRAND)"); Please put the string on one line like several other MODULE_PARM_DESC() are done: +MODULE_PARM_DESC(archrandom, + "Entropy in bits of 256 data bits from CPU noise source (e.g. RDRAND)"); With CONFIG_CRYPTO disabled, these warnings happen: WARNING: unmet direct dependencies detected for CRYPTO_DRBG_MENU Depends on [n]: CRYPTO [=n] Selected by [m]: - LRNG_DRBG [=m] && LRNG [=y] && LRNG_DRNG_SWITCH [=y] WARNING: unmet direct dependencies detected for CRYPTO_RNG Depends on [n]: CRYPTO [=n] Selected by [m]: - LRNG_KCAPI [=m] && LRNG [=y] && LRNG_DRNG_SWITCH [=y] ../drivers/char/lrng/lrng_drbg.c: In function ‘lrng_hash_name’: ../drivers/char/lrng/lrng_drbg.c:225:1: warning: control reaches end of non-void function [-Wreturn-type] } ^ ../drivers/char/lrng/lrng_drbg.c: In function ‘lrng_drbg_name’: ../drivers/char/lrng/lrng_drbg.c:220:1: warning: control reaches end of non-void function [-Wreturn-type] } ^ and build errors happen also, which can be prevented with Kconfig fixes. -- ~Randy Reported-by: Randy Dunlap <rdunlap@infradead.org>
WARNING: multiple messages have this Message-ID (diff)
From: Randy Dunlap <rdunlap@infradead.org> To: "Stephan Müller" <smueller@chronox.de>, "Arnd Bergmann" <arnd@arndb.de> Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>, linux-crypto@vger.kernel.org, LKML <linux-kernel@vger.kernel.org>, linux-api@vger.kernel.org, "Eric W. Biederman" <ebiederm@xmission.com>, "Alexander E. Patrakov" <patrakov@gmail.com>, "Ahmed S. Darwish" <darwish.07@gmail.com>, "Theodore Y. Ts'o" <tytso@mit.edu>, Willy Tarreau <w@1wt.eu>, Matthew Garrett <mjg59@srcf.ucam.org>, Vito Caputo <vcaputo@pengaru.com>, Andreas Dilger <adilger.kernel@dilger.ca>, Jan Kara <jack@suse.cz>, Ray Strode <rstrode@redhat.com>, William Jon McCann <mccann@jhu.edu>, zhangjs <zachary@baishancloud.com>, Andy Lutomirski <luto@kernel.org>, Florian Weimer <fweimer@redhat.com>, Lennart Poettering <mzxreary@0pointer.de>, Nicolai Stange <nstange@suse.de>, "Peter, Matthias" <matth> Subject: Re: [PATCH v28 01/12] Linux Random Number Generator Date: Wed, 15 Jan 2020 16:11:40 -0800 [thread overview] Message-ID: <3a8d5d2d-d54f-cf18-0c93-dbe8cd91ed12@infradead.org> (raw) In-Reply-To: <2211028.KG5F5qfgHC@positron.chronox.de> Hi, On 1/15/20 2:31 AM, Stephan Müller wrote: > CC: "Eric W. Biederman" <ebiederm@xmission.com> > CC: "Alexander E. Patrakov" <patrakov@gmail.com> > CC: "Ahmed S. Darwish" <darwish.07@gmail.com> > CC: "Theodore Y. Ts'o" <tytso@mit.edu> > CC: Willy Tarreau <w@1wt.eu> > CC: Matthew Garrett <mjg59@srcf.ucam.org> > CC: Vito Caputo <vcaputo@pengaru.com> > CC: Andreas Dilger <adilger.kernel@dilger.ca> > CC: Jan Kara <jack@suse.cz> > CC: Ray Strode <rstrode@redhat.com> > CC: William Jon McCann <mccann@jhu.edu> > CC: zhangjs <zachary@baishancloud.com> > CC: Andy Lutomirski <luto@kernel.org> > CC: Florian Weimer <fweimer@redhat.com> > CC: Lennart Poettering <mzxreary@0pointer.de> > CC: Nicolai Stange <nstange@suse.de> > Mathematical aspects Reviewed-by: "Peter, Matthias" <matthias.peter@bsi.bund.de> > Reviewed-by: Marcelo Henrique Cerri <marcelo.cerri@canonical.com> > Reviewed-by: Roman Drahtmueller <draht@schaltsekun.de> > Tested-by: Roman Drahtmüller <draht@schaltsekun.de> > Tested-by: Marcelo Henrique Cerri <marcelo.cerri@canonical.com> > Tested-by: Neil Horman <nhorman@redhat.com> > Signed-off-by: Stephan Mueller <smueller@chronox.de> > --- > MAINTAINERS | 7 + > drivers/char/Kconfig | 2 + > drivers/char/Makefile | 9 +- > drivers/char/lrng/Kconfig | 67 +++ > drivers/char/lrng/Makefile | 9 + > drivers/char/lrng/lrng_archrandom.c | 94 ++++ > drivers/char/lrng/lrng_aux.c | 148 +++++++ > drivers/char/lrng/lrng_chacha20.c | 265 ++++++++++++ > drivers/char/lrng/lrng_chacha20.h | 25 ++ > drivers/char/lrng/lrng_drng.c | 400 +++++++++++++++++ > drivers/char/lrng/lrng_interfaces.c | 638 ++++++++++++++++++++++++++++ > drivers/char/lrng/lrng_internal.h | 296 +++++++++++++ > drivers/char/lrng/lrng_lfsr.h | 152 +++++++ > drivers/char/lrng/lrng_pool.c | 588 +++++++++++++++++++++++++ > drivers/char/lrng/lrng_sw_noise.c | 102 +++++ > drivers/char/lrng/lrng_sw_noise.h | 57 +++ > include/linux/lrng.h | 63 +++ > 17 files changed, 2921 insertions(+), 1 deletion(-) > create mode 100644 drivers/char/lrng/Kconfig > create mode 100644 drivers/char/lrng/Makefile > create mode 100644 drivers/char/lrng/lrng_archrandom.c > create mode 100644 drivers/char/lrng/lrng_aux.c > create mode 100644 drivers/char/lrng/lrng_chacha20.c > create mode 100644 drivers/char/lrng/lrng_chacha20.h > create mode 100644 drivers/char/lrng/lrng_drng.c > create mode 100644 drivers/char/lrng/lrng_interfaces.c > create mode 100644 drivers/char/lrng/lrng_internal.h > create mode 100644 drivers/char/lrng/lrng_lfsr.h > create mode 100644 drivers/char/lrng/lrng_pool.c > create mode 100644 drivers/char/lrng/lrng_sw_noise.c > create mode 100644 drivers/char/lrng/lrng_sw_noise.h > create mode 100644 include/linux/lrng.h > > diff --git a/drivers/char/lrng/Kconfig b/drivers/char/lrng/Kconfig > new file mode 100644 > index 000000000000..56f13efd3592 > --- /dev/null > +++ b/drivers/char/lrng/Kconfig > @@ -0,0 +1,67 @@ > +# SPDX-License-Identifier: GPL-2.0 > +# > +# Linux Random Number Generator configuration > +# > + > +menuconfig LRNG > + bool "Linux Random Number Generator" This should probably depend on CRYPTO and/or some other CRYPTO_xxx symbols. Or (worst case) select them. :( This message (when CONFIG_CRYPTO is disabled and no crypto facilities are enabled) should be avoidable when the correct Kconfig entries are used: ../drivers/char/lrng/lrng_drbg.c:38:2: error: #error "Unknown DRBG in use" #error "Unknown DRBG in use" > + help > + The Linux Random Number Generator (LRNG) is the replacement > + of the existing /dev/random provided with drivers/char/random.c. > + It generates entropy from different noise sources and > + delivers significant entropy during boot. > + > +if LRNG > + > +choice > + prompt "LRNG Entropy Pool Size" > + default LRNG_POOL_SIZE_4096 > + help > + Select the size of the LRNG entropy pool. The size of the > + entropy pool is relevant for the amount of entropy that > + the LRNG can maintain as a maximum. The larger the size > + of the entropy pool is the more entropy can be maintained > + but the less often older entropic values are overwritten > + with new entropy. > + > + config LRNG_POOL_SIZE_512 > + bool "512 bits" > + > + config LRNG_POOL_SIZE_1024 > + bool "1024 bits" > + > + config LRNG_POOL_SIZE_2048 > + bool "2048 bits" > + > + config LRNG_POOL_SIZE_4096 > + bool "4096 bits (default)" > + > + config LRNG_POOL_SIZE_8192 > + bool "8192 bits" > + > + config LRNG_POOL_SIZE_16384 > + bool "16384 bits" > + > + config LRNG_POOL_SIZE_32768 > + bool "32768 bits" > + > + config LRNG_POOL_SIZE_65536 > + bool "65536 bits" > + > + config LRNG_POOL_SIZE_131072 > + bool "131072 bits" > +endchoice > + > +config LRNG_POOL_SIZE > + int > + default 0 if LRNG_POOL_SIZE_512 > + default 1 if LRNG_POOL_SIZE_1024 > + default 2 if LRNG_POOL_SIZE_2048 > + default 3 if LRNG_POOL_SIZE_4096 > + default 4 if LRNG_POOL_SIZE_8192 > + default 5 if LRNG_POOL_SIZE_16384 > + default 6 if LRNG_POOL_SIZE_32768 > + default 7 if LRNG_POOL_SIZE_65536 > + default 8 if LRNG_POOL_SIZE_131072 > + > +endif # LRNG > diff --git a/drivers/char/lrng/lrng_archrandom.c b/drivers/char/lrng/lrng_archrandom.c > new file mode 100644 > index 000000000000..eeba708d025f > --- /dev/null > +++ b/drivers/char/lrng/lrng_archrandom.c > @@ -0,0 +1,94 @@ > +// SPDX-License-Identifier: GPL-2.0 OR BSD-2-Clause > +/* > + * LRNG Fast Noise Source: CPU-based noise source > + * > + * Copyright (C) 2016 - 2020, Stephan Mueller <smueller@chronox.de> > + */ > + > +#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt > + > +#include <linux/random.h> > + > +#include "lrng_internal.h" > + > +/* > + * Estimated entropy of data is a 32th of LRNG_DRNG_SECURITY_STRENGTH_BITS. > + * As we have no ability to review the implementation of those noise sources, > + * it is prudent to have a conservative estimate here. > + */ > +#define LRNG_ARCHRANDOM_DEFAULT_STRENGTH (LRNG_DRNG_SECURITY_STRENGTH_BITS>>5) > +#define LRNG_ARCHRANDOM_TRUST_CPU_STRENGTH LRNG_DRNG_SECURITY_STRENGTH_BITS > +#ifdef CONFIG_RANDOM_TRUST_CPU > +static u32 archrandom = LRNG_ARCHRANDOM_TRUST_CPU_STRENGTH; > +#else > +static u32 archrandom = LRNG_ARCHRANDOM_DEFAULT_STRENGTH; > +#endif > +module_param(archrandom, uint, 0644); > +MODULE_PARM_DESC(archrandom, "Entropy in bits of 256 data bits from CPU noise " > + "source (e.g. RDRAND)"); Please put the string on one line like several other MODULE_PARM_DESC() are done: +MODULE_PARM_DESC(archrandom, + "Entropy in bits of 256 data bits from CPU noise source (e.g. RDRAND)"); With CONFIG_CRYPTO disabled, these warnings happen: WARNING: unmet direct dependencies detected for CRYPTO_DRBG_MENU Depends on [n]: CRYPTO [=n] Selected by [m]: - LRNG_DRBG [=m] && LRNG [=y] && LRNG_DRNG_SWITCH [=y] WARNING: unmet direct dependencies detected for CRYPTO_RNG Depends on [n]: CRYPTO [=n] Selected by [m]: - LRNG_KCAPI [=m] && LRNG [=y] && LRNG_DRNG_SWITCH [=y] ../drivers/char/lrng/lrng_drbg.c: In function ‘lrng_hash_name’: ../drivers/char/lrng/lrng_drbg.c:225:1: warning: control reaches end of non-void function [-Wreturn-type] } ^ ../drivers/char/lrng/lrng_drbg.c: In function ‘lrng_drbg_name’: ../drivers/char/lrng/lrng_drbg.c:220:1: warning: control reaches end of non-void function [-Wreturn-type] } ^ and build errors happen also, which can be prevented with Kconfig fixes. -- ~Randy Reported-by: Randy Dunlap <rdunlap@infradead.org>
next prev parent reply other threads:[~2020-01-16 0:12 UTC|newest] Thread overview: 339+ messages / expand[flat|nested] mbox.gz Atom feed top 2019-11-11 18:17 [PATCH v24 00/12] /dev/random - a new approach with full SP800-90B compliance Stephan Müller 2019-11-11 18:17 ` Stephan Müller 2019-11-11 18:18 ` [PATCH v24 01/12] Linux Random Number Generator Stephan Müller 2019-11-11 18:18 ` Stephan Müller 2019-11-11 23:54 ` Thomas Gleixner 2019-11-11 23:54 ` Thomas Gleixner 2019-11-12 2:25 ` Stephan Müller 2019-11-12 2:25 ` Stephan Müller 2019-11-12 10:16 ` Thomas Gleixner 2019-11-12 10:16 ` Thomas Gleixner 2019-11-12 22:30 ` kbuild test robot 2019-11-12 22:30 ` kbuild test robot 2019-11-12 22:30 ` kbuild test robot 2019-11-12 23:15 ` Stephan Müller 2019-11-12 23:15 ` Stephan Müller 2019-11-12 23:15 ` Stephan Müller 2019-11-13 0:14 ` kbuild test robot 2019-11-13 0:14 ` kbuild test robot 2019-11-13 0:14 ` kbuild test robot 2019-11-13 0:25 ` Stephan Müller 2019-11-13 0:25 ` Stephan Müller 2019-11-13 0:25 ` Stephan Müller 2019-11-24 4:51 ` Sandy Harris 2019-11-24 4:51 ` Sandy Harris 2019-11-24 9:02 ` Stephan Mueller 2019-11-24 9:02 ` Stephan Mueller 2019-11-11 18:19 ` [PATCH v24 02/12] LRNG - allocate one SDRNG instance per NUMA node Stephan Müller 2019-11-11 18:19 ` Stephan Müller 2019-11-11 18:20 ` [PATCH v24 03/12] LRNG - /proc interface Stephan Müller 2019-11-11 18:20 ` Stephan Müller 2019-11-11 18:20 ` [PATCH v24 04/12] LRNG - add switchable DRNG support Stephan Müller 2019-11-11 18:20 ` Stephan Müller 2019-11-11 18:21 ` [PATCH v24 05/12] crypto: DRBG - externalize DRBG functions for LRNG Stephan Müller 2019-11-11 18:21 ` Stephan Müller 2019-11-11 18:21 ` [PATCH v24 06/12] LRNG - add SP800-90A DRBG extension Stephan Müller 2019-11-11 18:21 ` Stephan Müller 2019-11-11 18:22 ` [PATCH v24 07/12] LRNG - add kernel crypto API PRNG extension Stephan Müller 2019-11-11 18:22 ` Stephan Müller 2019-11-11 18:23 ` [PATCH v24 08/12] crypto: provide access to a static Jitter RNG state Stephan Müller 2019-11-11 18:23 ` Stephan Müller 2019-11-11 18:23 ` [PATCH v24 09/12] LRNG - add Jitter RNG fast noise source Stephan Müller 2019-11-11 18:23 ` Stephan Müller 2019-11-11 18:24 ` [PATCH v24 10/12] LRNG - add TRNG support Stephan Müller 2019-11-11 18:24 ` Stephan Müller 2019-11-11 18:26 ` [PATCH v24 11/12] LRNG - add SP800-90B compliant health tests Stephan Müller 2019-11-11 18:26 ` Stephan Müller 2019-11-12 19:58 ` Alexander E. Patrakov 2019-11-12 19:58 ` Alexander E. Patrakov 2019-11-12 23:11 ` Stephan Müller 2019-11-12 23:11 ` Stephan Müller 2019-11-13 0:36 ` Stephan Müller 2019-11-13 0:36 ` Stephan Müller 2019-11-13 6:02 ` Alexander E. Patrakov 2019-11-13 6:02 ` Alexander E. Patrakov 2019-11-14 1:46 ` Stephan Müller 2019-11-14 1:46 ` Stephan Müller 2019-11-11 18:26 ` [PATCH v24 12/12] LRNG - add interface for gathering of raw entropy Stephan Müller 2019-11-11 18:26 ` Stephan Müller 2019-11-12 20:55 ` kbuild test robot 2019-11-12 20:55 ` kbuild test robot 2019-11-12 20:55 ` kbuild test robot 2019-11-12 23:13 ` Stephan Müller 2019-11-12 23:13 ` Stephan Müller 2019-11-12 23:13 ` Stephan Müller 2019-11-12 13:23 ` [PATCH v24 00/12] /dev/random - a new approach with full SP800-90B compliance Florian Weimer 2019-11-12 13:23 ` Florian Weimer 2019-11-12 22:43 ` Stephan Müller 2019-11-12 22:43 ` Stephan Müller 2019-11-12 15:33 ` Andy Lutomirski 2019-11-12 15:33 ` Andy Lutomirski 2019-11-12 23:03 ` Stephan Müller 2019-11-12 23:03 ` Stephan Müller 2019-11-12 23:26 ` Stephan Müller 2019-11-12 23:26 ` Stephan Müller 2019-11-13 4:24 ` Stephan Müller 2019-11-13 4:24 ` Stephan Müller 2019-11-13 4:48 ` Andy Lutomirski 2019-11-13 4:48 ` Andy Lutomirski 2019-11-13 12:16 ` Stephan Müller 2019-11-13 12:16 ` Stephan Müller 2019-11-16 9:32 ` [PATCH v25 00/12] /dev/random - a new approach with full SP800-90B Stephan Müller 2019-11-16 9:32 ` Stephan Müller 2019-11-16 9:33 ` [PATCH v25 01/12] Linux Random Number Generator Stephan Müller 2019-11-16 9:33 ` Stephan Müller 2019-11-16 11:25 ` Thomas Gleixner 2019-11-16 11:25 ` Thomas Gleixner 2019-11-17 10:30 ` Stephan Müller 2019-11-17 10:30 ` Stephan Müller 2019-11-16 18:13 ` Nicolai Stange 2019-11-16 18:13 ` Nicolai Stange 2019-11-17 11:01 ` Stephan Müller 2019-11-17 11:01 ` Stephan Müller 2019-11-16 9:33 ` [PATCH v25 02/12] LRNG - allocate one SDRNG instance per NUMA node Stephan Müller 2019-11-16 9:33 ` Stephan Müller 2019-11-16 9:34 ` [PATCH v25 03/12] LRNG - /proc interface Stephan Müller 2019-11-16 9:34 ` Stephan Müller 2019-11-16 16:39 ` Andy Lutomirski 2019-11-16 16:39 ` Andy Lutomirski 2019-11-17 12:16 ` Stephan Müller 2019-11-17 12:16 ` Stephan Müller 2019-11-19 10:06 ` Andy Lutomirski 2019-11-19 10:06 ` Andy Lutomirski 2019-11-19 10:55 ` Stephan Mueller 2019-11-19 10:55 ` Stephan Mueller 2019-11-19 17:40 ` Andy Lutomirski 2019-11-19 17:40 ` Andy Lutomirski 2019-11-16 23:36 ` Eric W. Biederman 2019-11-16 23:36 ` Eric W. Biederman 2019-11-17 11:37 ` Stephan Müller 2019-11-17 11:37 ` Stephan Müller 2019-11-16 9:34 ` [PATCH v25 04/12] LRNG - add switchable DRNG support Stephan Müller 2019-11-16 9:34 ` Stephan Müller 2019-11-16 9:35 ` [PATCH v25 05/12] crypto: DRBG - externalize DRBG functions for LRNG Stephan Müller 2019-11-16 9:35 ` Stephan Müller 2019-11-16 9:35 ` [PATCH v25 06/12] LRNG - add SP800-90A DRBG extension Stephan Müller 2019-11-16 9:35 ` Stephan Müller 2019-11-16 9:35 ` [PATCH v25 07/12] LRNG - add kernel crypto API PRNG extension Stephan Müller 2019-11-16 9:35 ` Stephan Müller 2019-11-16 9:36 ` [PATCH v25 08/12] crypto: provide access to a static Jitter RNG state Stephan Müller 2019-11-16 9:36 ` Stephan Müller 2019-11-16 9:36 ` [PATCH v25 09/12] LRNG - add Jitter RNG fast noise source Stephan Müller 2019-11-16 9:36 ` Stephan Müller 2019-11-20 13:33 ` Neil Horman 2019-11-20 13:33 ` Neil Horman 2019-11-20 20:07 ` Stephan Müller 2019-11-20 20:07 ` Stephan Müller 2019-11-21 14:19 ` Neil Horman 2019-11-21 14:19 ` Neil Horman 2019-11-21 14:33 ` Stephan Mueller 2019-11-21 14:33 ` Stephan Mueller 2019-11-16 9:37 ` [PATCH v25 10/12] LRNG - add TRNG support Stephan Müller 2019-11-16 9:37 ` Stephan Müller 2019-11-16 16:09 ` Andy Lutomirski 2019-11-16 16:09 ` Andy Lutomirski 2019-11-17 11:10 ` Stephan Müller 2019-11-17 11:10 ` Stephan Müller 2019-11-19 10:07 ` Andy Lutomirski 2019-11-19 10:07 ` Andy Lutomirski 2019-11-19 10:46 ` Stephan Mueller 2019-11-19 10:46 ` Stephan Mueller 2019-11-19 12:41 ` Greg Kroah-Hartman 2019-11-19 12:41 ` Greg Kroah-Hartman 2019-11-20 8:58 ` Stephan Müller 2019-11-20 8:58 ` Stephan Müller 2019-11-20 9:55 ` Alexander E. Patrakov 2019-11-20 9:55 ` Alexander E. Patrakov 2019-11-20 13:29 ` Greg Kroah-Hartman 2019-11-20 13:29 ` Greg Kroah-Hartman 2019-11-20 19:51 ` Stephan Müller 2019-11-20 19:51 ` Stephan Müller 2019-11-20 19:57 ` Alexander E. Patrakov 2019-11-20 19:57 ` Alexander E. Patrakov 2019-11-20 20:32 ` Greg Kroah-Hartman 2019-11-20 20:32 ` Greg Kroah-Hartman 2019-11-21 13:06 ` Stephan Müller 2019-11-21 13:06 ` Stephan Müller 2019-11-16 9:37 ` [PATCH v25 11/12] LRNG - add SP800-90B compliant health tests Stephan Müller 2019-11-16 9:37 ` Stephan Müller 2019-11-16 9:38 ` [PATCH v25 12/12] LRNG - add interface for gathering of raw entropy Stephan Müller 2019-11-16 9:38 ` Stephan Müller 2019-11-16 16:51 ` Andy Lutomirski 2019-11-16 16:51 ` Andy Lutomirski 2019-11-17 22:55 ` Stephan Müller 2019-11-17 22:55 ` Stephan Müller 2019-11-19 10:04 ` Andy Lutomirski 2019-11-19 10:04 ` Andy Lutomirski 2019-11-19 17:17 ` Randy Dunlap 2019-11-19 17:17 ` Randy Dunlap 2019-11-20 9:01 ` Stephan Müller 2019-11-20 9:01 ` Stephan Müller 2019-11-21 12:18 ` Nicolai Stange 2019-11-21 12:18 ` Nicolai Stange 2019-11-21 15:18 ` Stephan Müller 2019-11-21 15:18 ` Stephan Müller 2019-11-23 20:08 ` [PATCH v26 00/12] /dev/random - a new approach with full SP800-90B Stephan Müller 2019-11-23 20:08 ` Stephan Müller 2019-11-23 20:10 ` [PATCH v26 01/12] Linux Random Number Generator Stephan Müller 2019-11-23 20:10 ` Stephan Müller 2019-11-24 22:44 ` kbuild test robot 2019-11-24 22:44 ` kbuild test robot 2019-11-24 22:44 ` kbuild test robot 2019-11-25 6:29 ` Stephan Mueller 2019-11-25 6:29 ` Stephan Mueller 2019-11-25 6:29 ` Stephan Mueller 2019-11-23 20:10 ` [PATCH v26 02/12] LRNG - allocate one SDRNG instance per NUMA node Stephan Müller 2019-11-23 20:10 ` Stephan Müller 2019-11-23 20:11 ` [PATCH v26 03/12] LRNG - sysctls and /proc interface Stephan Müller 2019-11-23 20:11 ` Stephan Müller 2019-11-23 20:11 ` [PATCH v26 04/12] LRNG - add switchable DRNG support Stephan Müller 2019-11-23 20:11 ` Stephan Müller 2019-11-23 20:31 ` [PATCH v26 05/12] crypto: DRBG - externalize DRBG functions for LRNG Stephan Müller 2019-11-23 20:31 ` Stephan Müller 2019-11-23 20:32 ` [PATCH v26 06/12] LRNG - add SP800-90A DRBG extension Stephan Müller 2019-11-23 20:32 ` Stephan Müller 2019-11-23 20:32 ` [PATCH v26 07/12] LRNG - add kernel crypto API PRNG extension Stephan Müller 2019-11-23 20:32 ` Stephan Müller 2019-11-23 20:33 ` [PATCH v26 08/12] crypto: provide access to a static Jitter RNG state Stephan Müller 2019-11-23 20:33 ` Stephan Müller 2019-11-23 20:34 ` [PATCH v26 09/12] LRNG - add Jitter RNG fast noise source Stephan Müller 2019-11-23 20:34 ` Stephan Müller 2019-11-23 20:34 ` [PATCH v26 10/12] LRNG - add TRNG support Stephan Müller 2019-11-23 20:34 ` Stephan Müller 2019-11-23 20:34 ` [PATCH v26 11/12] LRNG - add SP800-90B compliant health tests Stephan Müller 2019-11-23 20:34 ` Stephan Müller 2019-11-23 20:35 ` [PATCH v26 12/12] LRNG - add interface for gathering of raw entropy Stephan Müller 2019-11-23 20:35 ` Stephan Müller 2020-01-09 8:29 ` [PATCH v27 00/12] /dev/random - a new approach with full SP800-90B Stephan Müller 2020-01-09 8:29 ` Stephan Müller 2020-01-09 8:30 ` [PATCH v27 01/12] Linux Random Number Generator Stephan Müller 2020-01-09 8:30 ` Stephan Müller 2020-01-16 6:09 ` kbuild test robot 2020-01-16 6:09 ` kbuild test robot 2020-01-16 6:09 ` kbuild test robot 2020-01-16 6:41 ` Stephan Mueller 2020-01-16 6:41 ` Stephan Mueller 2020-01-16 6:41 ` Stephan Mueller 2020-01-09 8:31 ` [PATCH v27 02/12] LRNG - allocate one DRNG instance per NUMA node Stephan Müller 2020-01-09 8:31 ` Stephan Müller 2020-01-09 8:31 ` [PATCH v27 03/12] LRNG - sysctls and /proc interface Stephan Müller 2020-01-09 8:31 ` Stephan Müller 2020-01-09 8:32 ` [PATCH v27 04/12] LRNG - add switchable DRNG support Stephan Müller 2020-01-09 8:32 ` Stephan Müller 2020-01-11 7:09 ` kbuild test robot 2020-01-11 7:09 ` kbuild test robot 2020-01-11 7:09 ` kbuild test robot 2020-01-12 10:12 ` Stephan Müller 2020-01-12 10:12 ` Stephan Müller 2020-01-12 10:12 ` Stephan Müller 2020-01-09 8:32 ` [PATCH v27 05/12] crypto: DRBG - externalize DRBG functions for LRNG Stephan Müller 2020-01-09 8:32 ` Stephan Müller 2020-01-09 8:32 ` [PATCH v27 06/12] LRNG - add SP800-90A DRBG extension Stephan Müller 2020-01-09 8:32 ` Stephan Müller 2020-01-09 8:33 ` [PATCH v27 07/12] LRNG - add kernel crypto API PRNG extension Stephan Müller 2020-01-09 8:33 ` Stephan Müller 2020-01-09 8:33 ` [PATCH v27 08/12] crypto: provide access to a static Jitter RNG state Stephan Müller 2020-01-09 8:33 ` Stephan Müller 2020-01-09 8:34 ` [PATCH v27 09/12] LRNG - add Jitter RNG fast noise source Stephan Müller 2020-01-09 8:34 ` Stephan Müller 2020-01-10 0:24 ` Randy Dunlap 2020-01-10 0:24 ` Randy Dunlap 2020-01-10 7:45 ` Stephan Mueller 2020-01-10 7:45 ` Stephan Mueller 2020-01-09 8:34 ` [PATCH v27 10/12] LRNG - add SP800-90B compliant health tests Stephan Müller 2020-01-09 8:34 ` Stephan Müller 2020-01-10 0:20 ` Randy Dunlap 2020-01-10 0:20 ` Randy Dunlap 2020-01-10 8:27 ` Stephan Mueller 2020-01-10 8:27 ` Stephan Mueller 2020-01-09 8:35 ` [PATCH v27 11/12] LRNG - add interface for gathering of raw entropy Stephan Müller 2020-01-09 8:35 ` Stephan Müller 2020-01-09 8:35 ` [PATCH v27 12/12] LRNG - add power-on and runtime self-tests Stephan Müller 2020-01-09 8:35 ` Stephan Müller 2020-01-10 0:22 ` Randy Dunlap 2020-01-10 0:22 ` Randy Dunlap 2020-01-10 7:48 ` Stephan Mueller 2020-01-10 7:48 ` Stephan Mueller 2020-01-13 10:39 ` Dan Carpenter 2020-01-13 10:39 ` Dan Carpenter 2020-01-13 10:39 ` Dan Carpenter 2020-01-13 10:39 ` Dan Carpenter 2020-01-13 10:46 ` Stephan Mueller 2020-01-13 10:46 ` Stephan Mueller 2020-01-13 10:46 ` Stephan Mueller 2020-01-15 10:31 ` [PATCH v28 00/12] /dev/random - a new approach with full SP800-90B Stephan Müller 2020-01-15 10:31 ` Stephan Müller 2020-01-15 10:31 ` [PATCH v28 01/12] Linux Random Number Generator Stephan Müller 2020-01-15 10:31 ` Stephan Müller 2020-01-16 0:11 ` Randy Dunlap [this message] 2020-01-16 0:11 ` Randy Dunlap 2020-01-16 7:22 ` Stephan Mueller 2020-01-16 7:22 ` Stephan Mueller 2020-01-15 10:32 ` [PATCH v28 02/12] LRNG - allocate one DRNG instance per NUMA node Stephan Müller 2020-01-15 10:32 ` Stephan Müller 2020-01-15 10:32 ` [PATCH v28 03/12] LRNG - sysctls and /proc interface Stephan Müller 2020-01-15 10:32 ` Stephan Müller 2020-01-15 10:32 ` [PATCH v28 04/12] LRNG - add switchable DRNG support Stephan Müller 2020-01-15 10:32 ` Stephan Müller 2020-01-15 10:33 ` [PATCH v28 05/12] crypto: DRBG - externalize DRBG functions for LRNG Stephan Müller 2020-01-15 10:33 ` Stephan Müller 2020-01-15 10:33 ` [PATCH v28 06/12] LRNG - add SP800-90A DRBG extension Stephan Müller 2020-01-15 10:33 ` Stephan Müller 2020-01-16 0:14 ` Randy Dunlap 2020-01-16 0:14 ` Randy Dunlap 2020-01-16 6:55 ` Stephan Mueller 2020-01-16 6:55 ` Stephan Mueller 2020-01-15 10:34 ` [PATCH v28 07/12] LRNG - add kernel crypto API PRNG extension Stephan Müller 2020-01-15 10:34 ` Stephan Müller 2020-01-16 0:15 ` Randy Dunlap 2020-01-16 0:15 ` Randy Dunlap 2020-01-16 6:54 ` Stephan Mueller 2020-01-16 6:54 ` Stephan Mueller 2020-01-15 10:34 ` [PATCH v28 08/12] crypto: provide access to a static Jitter RNG state Stephan Müller 2020-01-15 10:34 ` Stephan Müller 2020-01-15 10:34 ` [PATCH v28 09/12] LRNG - add Jitter RNG fast noise source Stephan Müller 2020-01-15 10:34 ` Stephan Müller 2020-01-16 0:17 ` Randy Dunlap 2020-01-16 0:17 ` Randy Dunlap 2020-01-16 6:51 ` Stephan Mueller 2020-01-16 6:51 ` Stephan Mueller 2020-01-15 10:35 ` [PATCH v28 10/12] LRNG - add SP800-90B compliant health tests Stephan Müller 2020-01-15 10:35 ` Stephan Müller 2020-01-15 10:35 ` [PATCH v28 11/12] LRNG - add interface for gathering of raw entropy Stephan Müller 2020-01-15 10:35 ` Stephan Müller 2020-01-16 0:18 ` Randy Dunlap 2020-01-16 0:18 ` Randy Dunlap 2020-01-16 6:43 ` Stephan Mueller 2020-01-16 6:43 ` Stephan Mueller 2020-01-16 6:48 ` Randy Dunlap 2020-01-16 6:48 ` Randy Dunlap 2020-01-16 6:52 ` Stephan Mueller 2020-01-16 6:52 ` Stephan Mueller 2020-01-15 10:36 ` [PATCH v28 12/12] LRNG - add power-on and runtime self-tests Stephan Müller 2020-01-15 10:36 ` Stephan Müller 2020-01-19 21:12 ` [PATCH v29 00/12] /dev/random - a new approach with full SP800-90B Stephan Müller 2020-01-19 21:12 ` Stephan Müller 2020-01-19 21:13 ` [PATCH v29 01/12] Linux Random Number Generator Stephan Müller 2020-01-19 21:13 ` Stephan Müller 2020-01-19 21:13 ` [PATCH v29 02/12] LRNG - allocate one DRNG instance per NUMA node Stephan Müller 2020-01-19 21:13 ` Stephan Müller 2020-01-19 21:14 ` [PATCH v29 03/12] LRNG - sysctls and /proc interface Stephan Müller 2020-01-19 21:14 ` Stephan Müller 2020-01-19 21:14 ` [PATCH v29 04/12] LRNG - add switchable DRNG support Stephan Müller 2020-01-19 21:14 ` Stephan Müller 2020-01-19 21:15 ` [PATCH v29 05/12] crypto: DRBG - externalize DRBG functions for LRNG Stephan Müller 2020-01-19 21:15 ` Stephan Müller 2020-01-19 21:16 ` [PATCH v29 06/12] LRNG - add SP800-90A DRBG extension Stephan Müller 2020-01-19 21:16 ` Stephan Müller 2020-01-19 21:16 ` [PATCH v29 07/12] LRNG - add kernel crypto API PRNG extension Stephan Müller 2020-01-19 21:16 ` Stephan Müller 2020-01-19 21:17 ` [PATCH v29 08/12] crypto: provide access to a static Jitter RNG state Stephan Müller 2020-01-19 21:17 ` Stephan Müller 2020-01-19 21:18 ` [PATCH v29 09/12] LRNG - add Jitter RNG fast noise source Stephan Müller 2020-01-19 21:18 ` Stephan Müller 2020-01-19 21:18 ` [PATCH v29 10/12] LRNG - add SP800-90B compliant health tests Stephan Müller 2020-01-19 21:18 ` Stephan Müller 2020-01-19 21:19 ` [PATCH v29 11/12] LRNG - add interface for gathering of raw entropy Stephan Müller 2020-01-19 21:19 ` Stephan Müller 2020-01-19 21:20 ` [PATCH v29 12/12] LRNG - add power-on and runtime self-tests Stephan Müller 2020-01-19 21:20 ` Stephan Müller
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=3a8d5d2d-d54f-cf18-0c93-dbe8cd91ed12@infradead.org \ --to=rdunlap@infradead.org \ --cc=adilger.kernel@dilger.ca \ --cc=arnd@arndb.de \ --cc=dan.carpenter@oracle.com \ --cc=darwish.07@gmail.com \ --cc=draht@schaltsekun.de \ --cc=ebiederm@xmission.com \ --cc=fweimer@redhat.com \ --cc=gregkh@linuxfoundation.org \ --cc=jack@suse.cz \ --cc=julia.lawall@inria.fr \ --cc=linux-api@vger.kernel.org \ --cc=linux-crypto@vger.kernel.org \ --cc=linux-kernel@vger.kernel.org \ --cc=luto@kernel.org \ --cc=marcelo.cerri@canonical.com \ --cc=matthias.peter@bsi.bund.de \ --cc=mccann@jhu.edu \ --cc=mjg59@srcf.ucam.org \ --cc=mzxreary@0pointer.de \ --cc=nhorman@redhat.com \ --cc=nstange@suse.de \ --cc=patrakov@gmail.com \ --cc=rstrode@redhat.com \ --cc=smueller@chronox.de \ --cc=tytso@mit.edu \ --cc=vcaputo@pengaru.com \ --cc=w@1wt.eu \ --cc=zachary@baishancloud.com \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.