From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-5.5 required=3.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS, URIBL_BLOCKED,USER_AGENT_SANE_1 autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3EBD8C433E5 for ; Tue, 28 Jul 2020 20:40:48 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 2166A2065E for ; Tue, 28 Jul 2020 20:40:48 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729116AbgG1Ukr (ORCPT ); Tue, 28 Jul 2020 16:40:47 -0400 Received: from jabberwock.ucw.cz ([46.255.230.98]:50042 "EHLO jabberwock.ucw.cz" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728430AbgG1Ukr (ORCPT ); Tue, 28 Jul 2020 16:40:47 -0400 Received: by jabberwock.ucw.cz (Postfix, from userid 1017) id 3489E1C0BED; Tue, 28 Jul 2020 22:40:45 +0200 (CEST) Date: Tue, 28 Jul 2020 22:40:44 +0200 From: Pavel Machek To: Stephan M?ller Cc: Arnd Bergmann , Greg Kroah-Hartman , linux-crypto@vger.kernel.org, LKML , linux-api@vger.kernel.org, "Eric W. Biederman" , "Alexander E. Patrakov" , "Ahmed S. Darwish" , "Theodore Y. Ts'o" , Willy Tarreau , Matthew Garrett , Vito Caputo , Andreas Dilger , Jan Kara , Ray Strode , William Jon McCann , zhangjs , Andy Lutomirski , Florian Weimer , Lennart Poettering , Nicolai Stange , "Peter, Matthias" , Marcelo Henrique Cerri , Roman Drahtmueller , Neil Horman , Randy Dunlap , Julia Lawall , Dan Carpenter Subject: Re: [PATCH v31 00/12] /dev/random - a new approach with full SP800-90B Message-ID: <20200728204044.GD1012@bug> References: <2050754.Mh6RI2rZIc@positron.chronox.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <2050754.Mh6RI2rZIc@positron.chronox.de> User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Hi! > The following patch set provides a different approach to /dev/random which is called > Linux Random Number Generator (LRNG) to collect entropy within the Linux kernel. The > main improvements compared to the existing /dev/random is to provide sufficient entropy > during boot time as well as in virtual environments and when using SSDs. A secondary > design goal is to limit the impact of the entropy collection on massive parallel systems > and also allow the use accelerated cryptographic primitives. Also, all steps of the > entropic data processing are testable. That sounds good.. maybe too good. Where does LRNG get the entropy? That is the part that should be carefully documented.. Pavel -- (english) http://www.livejournal.com/~pavelmachek (cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blog.html