<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src/sys/dev/random/yarrow.c, branch release/8.1.0</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src/atom?h=release%2F8.1.0</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src/atom?h=release%2F8.1.0'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/'/>
<updated>2007-11-29T16:06:12Z</updated>
<entry>
<title>Correct a random value disclosure in random(4).</title>
<updated>2007-11-29T16:06:12Z</updated>
<author>
<name>Simon L. B. Nielsen</name>
<email>simon@FreeBSD.org</email>
</author>
<published>2007-11-29T16:06:12Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=9790a3cbd4acf18a684305d39c51b4736287160a'/>
<id>urn:sha1:9790a3cbd4acf18a684305d39c51b4736287160a</id>
<content type='text'>
Security:	FreeBSD-SA-07:09.random
</content>
</entry>
<entry>
<title>Rather than repeatedly setting and discarding local variable 'o' based</title>
<updated>2007-05-27T18:54:58Z</updated>
<author>
<name>Robert Watson</name>
<email>rwatson@FreeBSD.org</email>
</author>
<published>2007-05-27T18:54:58Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=d53c5a8872daa8008b32ccfd109f7412068b7746'/>
<id>urn:sha1:d53c5a8872daa8008b32ccfd109f7412068b7746</id>
<content type='text'>
on the return values of various run-time sysctl additions, just ignore
the return value.

Found with:	Coverity Prevent(tm)
CID:		562
</content>
</entry>
<entry>
<title>Remove GIANT from device random.</title>
<updated>2005-12-20T21:41:52Z</updated>
<author>
<name>Paul Saab</name>
<email>ps@FreeBSD.org</email>
</author>
<published>2005-12-20T21:41:52Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=efbbe8fa7938f8ac071095b5b46f621885b447e4'/>
<id>urn:sha1:efbbe8fa7938f8ac071095b5b46f621885b447e4</id>
<content type='text'>
Submitted by:	ups
</content>
</entry>
<entry>
<title>stop including rijndael-api-fst.h from rijndael.h.</title>
<updated>2005-03-11T15:42:51Z</updated>
<author>
<name>Hajimu UMEMOTO</name>
<email>ume@FreeBSD.org</email>
</author>
<published>2005-03-11T15:42:51Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=68527b3aad57040b661a801cfb4de8b5961ae3c0'/>
<id>urn:sha1:68527b3aad57040b661a801cfb4de8b5961ae3c0</id>
<content type='text'>
this is required to integrate opencrypto into crypto.
</content>
</entry>
<entry>
<title>Reorganise the entropy device so that high-yield entropy sources</title>
<updated>2004-04-09T15:47:10Z</updated>
<author>
<name>Mark Murray</name>
<email>markm@FreeBSD.org</email>
</author>
<published>2004-04-09T15:47:10Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=e7806b4c0eb398aba8b6e8ddeda96e6ddd9305ae'/>
<id>urn:sha1:e7806b4c0eb398aba8b6e8ddeda96e6ddd9305ae</id>
<content type='text'>
can more easily be used INSTEAD OF the hard-working Yarrow.
The only hardware source used at this point is the one inside
the VIA C3 Nehemiah (Stepping 3 and above) CPU. More sources will
be added in due course. Contributions welcome!
</content>
</entry>
<entry>
<title>Overhaul the entropy device:</title>
<updated>2003-11-17T23:02:21Z</updated>
<author>
<name>Mark Murray</name>
<email>markm@FreeBSD.org</email>
</author>
<published>2003-11-17T23:02:21Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=0887c8c110da2f060bc422e6942320054bcc755d'/>
<id>urn:sha1:0887c8c110da2f060bc422e6942320054bcc755d</id>
<content type='text'>
o Each source gets its own queue, which is a FIFO, not a ring buffer.
  The FIFOs are implemented with the sys/queue.h macros. The separation
  is so that a low entropy/high rate source can't swamp the harvester
  with low-grade entropy and destroy the reseeds.

o Each FIFO is limited to 256 (set as a macro, so adjustable) events
  queueable. Full FIFOs are ignored by the harvester. This is to
  prevent memory wastage, and helps to keep the kernel thread CPU
  usage within reasonable limits.

o There is no need to break up the event harvesting into ${burst}
  sized chunks, so retire that feature.

o Break the device away from its roots with the memory device, and
  allow it to get its major number automagically.
</content>
</entry>
<entry>
<title>Use __FBSDID().</title>
<updated>2003-08-24T17:55:58Z</updated>
<author>
<name>David E. O'Brien</name>
<email>obrien@FreeBSD.org</email>
</author>
<published>2003-08-24T17:55:58Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=aad970f1fee9a2a3e5a0f880be9b87c6193b3bd1'/>
<id>urn:sha1:aad970f1fee9a2a3e5a0f880be9b87c6193b3bd1</id>
<content type='text'>
Also some minor style cleanups.
</content>
</entry>
<entry>
<title>Fix a buffer overrun in /dev/random which, due to the nature of the</title>
<updated>2002-12-12T17:38:45Z</updated>
<author>
<name>Mark Murray</name>
<email>markm@FreeBSD.org</email>
</author>
<published>2002-12-12T17:38:45Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=340a8a91c378a893b1e15c57f45f4361ab082321'/>
<id>urn:sha1:340a8a91c378a893b1e15c57f45f4361ab082321</id>
<content type='text'>
kernel memory allocator, is harmless. This could be a problem for
other systems, though. I've modified Darren's patch a little.

Original patch by: Darren Schack, Isilon Systems, Inc &lt;darrens@isilon.com&gt;
Also analysed by:  SGI, and in particular Divy Le Ray of SGI
OK'ed by:          re(rwatson)
</content>
</entry>
<entry>
<title>Remove #ifdef'ed Giant mutex wrappers round debugging statements.</title>
<updated>2002-09-21T21:44:19Z</updated>
<author>
<name>Mark Murray</name>
<email>markm@FreeBSD.org</email>
</author>
<published>2002-09-21T21:44:19Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=a0a95acece1d200759bbe965fc7cc3d772cb3477'/>
<id>urn:sha1:a0a95acece1d200759bbe965fc7cc3d772cb3477</id>
<content type='text'>
</content>
</entry>
<entry>
<title>Upgrade the random device to use a "real" hash instead of building</title>
<updated>2002-07-15T13:58:35Z</updated>
<author>
<name>Mark Murray</name>
<email>markm@FreeBSD.org</email>
</author>
<published>2002-07-15T13:58:35Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=bbf09ad887f1ebc18052ee12f5074c05d69a4e46'/>
<id>urn:sha1:bbf09ad887f1ebc18052ee12f5074c05d69a4e46</id>
<content type='text'>
one out of a block cipher. This has 2 advantages:
1) The code is _much_ simpler
2) We aren't committing our security to one algorithm (much as we
   may think we trust AES).

While I'm here, make an explicit reseed do a slow reseed instead
of a fast; this is in line with what the original paper suggested.
</content>
</entry>
</feed>
