<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src/sys/dev/random/randomdev.c, branch release/12.3.0</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src/atom?h=release%2F12.3.0</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src/atom?h=release%2F12.3.0'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/'/>
<updated>2018-09-09T17:12:31Z</updated>
<entry>
<title>random(4): Squash non-error timeout codes from tsleep(9).</title>
<updated>2018-09-09T17:12:31Z</updated>
<author>
<name>Xin LI</name>
<email>delphij@FreeBSD.org</email>
</author>
<published>2018-09-09T17:12:31Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=7a8d26613918887296503ab39c06ba605f7880dd'/>
<id>urn:sha1:7a8d26613918887296503ab39c06ba605f7880dd</id>
<content type='text'>
In both scenarios a timeout (EWOULDBLOCK) is considered as a
normal condition and the error should not pop up to upper layers.

PR:		231181
Submitted by:	cem
Reported by:	lev
Reviewed by:	vangyzen, markm, delphij
Approved by:	re (kib)
Approved by:	secteam (delphij)
Differential Revision:	https://reviews.freebsd.org/D17049
</content>
</entry>
<entry>
<title>Remove the Yarrow PRNG algorithm option in accordance with due notice</title>
<updated>2018-08-26T12:51:46Z</updated>
<author>
<name>Mark Murray</name>
<email>markm@FreeBSD.org</email>
</author>
<published>2018-08-26T12:51:46Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=19fa89e93888ebfe79d06c7b831bcd39001dce63'/>
<id>urn:sha1:19fa89e93888ebfe79d06c7b831bcd39001dce63</id>
<content type='text'>
given in random(4).

This includes updating of the relevant man pages, and no-longer-used
harvesting parameters.

Ensure that the pseudo-unit-test still does something useful, now also
with the "other" algorithm instead of Yarrow.

PR:		230870
Reviewed by:	cem
Approved by:	so(delphij,gtetlow)
Approved by:	re(marius)
Differential Revision:	https://reviews.freebsd.org/D16898
</content>
</entry>
<entry>
<title>random(4): Poll for signals during large reads</title>
<updated>2018-03-16T18:50:26Z</updated>
<author>
<name>Conrad Meyer</name>
<email>cem@FreeBSD.org</email>
</author>
<published>2018-03-16T18:50:26Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=db488e4f52a8644bf5d0f6727367b08e18b729ee'/>
<id>urn:sha1:db488e4f52a8644bf5d0f6727367b08e18b729ee</id>
<content type='text'>
Occasionally poll for signals during large reads of the /dev/u?random
devices.  This allows cancellation via SIGINT of accidental invocations of
very large reads.  (A 2GB /dev/random read, which takes about 10 seconds on
my 2017 AMD Zen processor, can be aborted.)

I believe this behavior was intended since 2014 (r273997), just not fully
implemented.

This is motivated by a potential getrandom(2) interface that may not
explicitly forbid extremely large reads on 64-bit platforms -- even larger
than the 2GB limit imposed on devfs I/O by default.  Such reads, if they are
to be allowed, should be cancellable by the user or administrator.

Reviewed by:	delphij
Approved by:	secteam (delphij)
Sponsored by:	Dell EMC Isilon
Differential Revision:	https://reviews.freebsd.org/D14684
</content>
</entry>
<entry>
<title>random(4): Gather entropy from Pure sources</title>
<updated>2017-10-07T19:02:03Z</updated>
<author>
<name>Conrad Meyer</name>
<email>cem@FreeBSD.org</email>
</author>
<published>2017-10-07T19:02:03Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=095db7e6e7cc577ddcfaf7efb72bbbb7e8b06f34'/>
<id>urn:sha1:095db7e6e7cc577ddcfaf7efb72bbbb7e8b06f34</id>
<content type='text'>
At initialization, hc_source_mask only includes non-Pure sources.

The patch changes source registration to enable the registered source in the
hc_source_mask bitmask. This mask governs which sources are harvested.

This patch also disallows userspace from disabling such sources.

PR:		222807
Submitted by:	W. Dean Freeman &lt;badfilemagic AT gmail.com&gt;
Reviewed by:	jmg (earlier version), delphij
Approved by:	secteam (delphij)
Obtained from:	HBSD 0054e3e170e083811acc9f3b637f8be8a86c03e7
Security:	yes
Differential Revision:	https://reviews.freebsd.org/D12611
</content>
</entry>
<entry>
<title>dev/random: use our roundup() macro instead of re-implementing it.</title>
<updated>2016-04-25T21:14:32Z</updated>
<author>
<name>Pedro F. Giffuni</name>
<email>pfg@FreeBSD.org</email>
</author>
<published>2016-04-25T21:14:32Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=7b250b1ec9da6b80d73784911c59c64d688789ad'/>
<id>urn:sha1:7b250b1ec9da6b80d73784911c59c64d688789ad</id>
<content type='text'>
While here also use howmany() macro from sys/param.h
No functional change.

Reviewed by:	markm (roundup replacement part)
Approved by:	so
</content>
</entry>
<entry>
<title>Replace sys/crypto/sha2/sha2.c with lib/libmd/sha512c.c</title>
<updated>2015-12-27T17:33:59Z</updated>
<author>
<name>Allan Jude</name>
<email>allanjude@FreeBSD.org</email>
</author>
<published>2015-12-27T17:33:59Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=7a3f5d11fb3873674a1f7e27bcc9a5f7ce279390'/>
<id>urn:sha1:7a3f5d11fb3873674a1f7e27bcc9a5f7ce279390</id>
<content type='text'>
cperciva's libmd implementation is 5-30% faster

The same was done for SHA256 previously in r263218

cperciva's implementation was lacking SHA-384 which I implemented, validated against OpenSSL and the NIST documentation

Extend sbin/md5 to create sha384(1)

Chase dependancies on sys/crypto/sha2/sha2.{c,h} and replace them with sha512{c.c,.h}

Reviewed by:	cperciva, des, delphij
Approved by:	secteam, bapt (mentor)
MFC after:	2 weeks
Sponsored by:	ScaleEngine Inc.
Differential Revision:	https://reviews.freebsd.org/D3929
</content>
</entry>
<entry>
<title>Add DEV_RANDOM pseudo-option and use it to "include out" random(4)</title>
<updated>2015-08-17T07:36:12Z</updated>
<author>
<name>Mark Murray</name>
<email>markm@FreeBSD.org</email>
</author>
<published>2015-08-17T07:36:12Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=646041a89aeab0d79fa350c401de57e1c8b85ac2'/>
<id>urn:sha1:646041a89aeab0d79fa350c401de57e1c8b85ac2</id>
<content type='text'>
if desired.

Retire randomdev_none.c and introduce random_infra.c for resident
infrastructure. Completely stub out random(4) calls in the "without
DEV_RANDOM" case.

Add RANDOM_LOADABLE option to allow loadable Yarrow/Fortuna/LocallyWritten
algorithm.  Add a skeleton "other" algorithm framework for folks
to add their own processing code. NIST, anyone?

Retire the RANDOM_DUMMY option.

Build modules for Yarrow, Fortuna and "other".

Use atomics for the live entropy rate-tracking.

Convert ints to bools for the 'seeded' logic.

Move _write() function from the algorithm-specific areas to randomdev.c

Get rid of reseed() function - it is unused.

Tidy up the opt_*.h includes.

Update documentation for random(4) modules.

Fix test program (reviewers, please leave this).

Differential Revision:    https://reviews.freebsd.org/D3354
Reviewed by:              wblock,delphij,jmg,bjk
Approved by:              so (/dev/random blanket)
</content>
</entry>
<entry>
<title>Fix some untidy logic. I committed the wrong local fix; please pass the pointy hat.</title>
<updated>2015-07-19T18:07:35Z</updated>
<author>
<name>Mark Murray</name>
<email>markm@FreeBSD.org</email>
</author>
<published>2015-07-19T18:07:35Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=eda4aaeb3fa237a1a4d8ca976b003513989e0118'/>
<id>urn:sha1:eda4aaeb3fa237a1a4d8ca976b003513989e0118</id>
<content type='text'>
Approved by:        so (/dev/random blanket)
</content>
</entry>
<entry>
<title>Fix the read blocking so that it is interruptable and slow down the rate of console warning spamming while blocked.</title>
<updated>2015-07-19T16:05:30Z</updated>
<author>
<name>Mark Murray</name>
<email>markm@FreeBSD.org</email>
</author>
<published>2015-07-19T16:05:30Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=dbefaadca88bcf9c3a1372f2c5d314469e56cdcc'/>
<id>urn:sha1:dbefaadca88bcf9c3a1372f2c5d314469e56cdcc</id>
<content type='text'>
Approved by:	so (/dev/random blanket)
</content>
</entry>
<entry>
<title>Optimise the buffer-size calculation. It was possible to get one block too many.</title>
<updated>2015-07-19T16:05:23Z</updated>
<author>
<name>Mark Murray</name>
<email>markm@FreeBSD.org</email>
</author>
<published>2015-07-19T16:05:23Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=95b184a0488da3219fef51528d9a4bc46ac804b4'/>
<id>urn:sha1:95b184a0488da3219fef51528d9a4bc46ac804b4</id>
<content type='text'>
Approved by:	so (/dev/random blanket)
</content>
</entry>
</feed>
