The NetBSD Project

CVS log for src/sys/kern/subr_prf.c

[BACK] Up to [cvs.NetBSD.org] / src / sys / kern

Request diff between arbitrary revisions


Default branch: MAIN
Current tag: tls-earlyentropy


Revision 1.153.2.4 / (download) - annotate - [select for diffs], Sun Aug 10 08:10:31 2014 UTC (9 years, 8 months ago) by tls
Branch: tls-earlyentropy
Changes since 1.153.2.3: +20 -5 lines
Diff to previous 1.153.2.3 (colored) to branchpoint 1.153 (colored) next main 1.154 (colored)

The printf entropy source seems to have a lock-recursion problem.
Temporarily disable it unless options RND_PRINTF is set.

Revision 1.153.2.3 / (download) - annotate - [select for diffs], Thu Jul 17 14:03:33 2014 UTC (9 years, 9 months ago) by tls
Branch: tls-earlyentropy
Changes since 1.153.2.2: +12 -9 lines
Diff to previous 1.153.2.2 (colored) to branchpoint 1.153 (colored)

Adjustments to the "earlyentropy" branch in response to the various
discussions beginning with my initial proposal
http://mail-index.netbsd.org/tech-kern/2014/04/08/msg016876.html and
particularly the long discussion of cprng_fast() performance (e.g.
https://mail-index.netbsd.org/tech-crypto/2014/04/21/msg000642.html).

In particular:

	* Per-CPU, lockless cprng_fast replacement using Dennis Ferguson's
	  "ccrand" implementation of ChaCha8.

	* libkern arc4random() is gone, gone, gone.

	* Entropy estimator reverted to 32-bit recordkeeping and timestamps
	  per Dennis' comments and analysis.

	* LZF entropy estimator removed: it required a great deal of state,
	  and rejected only truly pathological input.

	I have not yet reverted the changes that provide LZF in the kernel
	as generic functionality; I will likely revert those changes prior
	to any merge of this branch to HEAD.

Revision 1.153.2.2 / (download) - annotate - [select for diffs], Wed Apr 9 03:41:30 2014 UTC (10 years ago) by tls
Branch: tls-earlyentropy
Changes since 1.153.2.1: +4 -4 lines
Diff to previous 1.153.2.1 (colored) to branchpoint 1.153 (colored)

Skip mutex_tryenter() if !kprnd_added.

Revision 1.153.2.1 / (download) - annotate - [select for diffs], Mon Apr 7 02:20:00 2014 UTC (10 years ago) by tls
Branch: tls-earlyentropy
Changes since 1.153: +67 -8 lines
Diff to previous 1.153 (colored)

Get more entropy into the system early:

	1) Add device attach timings from autoconf.
	2) Accumulate the output of kernel printf (as well as the times
	   when it's called) and add this periodically.  To avoid issues
	   with recursion through diagnostic printfs, we use SHA512 to
	   accumulate the printf output, then mix in its output.
	3) Add all sysctl settings -- mixes in the hostname and likely a
	   bit more.

Revision 1.153 / (download) - annotate - [select for diffs], Wed Mar 26 18:03:47 2014 UTC (10 years ago) by christos
Branch: MAIN
CVS Tags: yamt-pagecache-base9, tls-earlyentropy-base, rmind-smpnet-nbase, rmind-smpnet-base, riastradh-xf86-video-intel-2-7-1-pre-2-21-15
Branch point for: tls-earlyentropy
Changes since 1.152: +2 -34 lines
Diff to previous 1.152 (colored)

remove {v,}sprintf

This form allows you to request diff's between any two revisions of a file. You may select a symbolic revision name using the selection box or you may type in a numeric name using the type-in text box.




CVSweb <webmaster@jp.NetBSD.org>