<feed xmlns='http://www.w3.org/2005/Atom'>
<title>src/sys/dev/randomdev/randomdev.c, branch main</title>
<subtitle>FreeBSD source tree</subtitle>
<id>https://cgit-dev.freebsd.org/src/atom?h=main</id>
<link rel='self' href='https://cgit-dev.freebsd.org/src/atom?h=main'/>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/'/>
<updated>2000-10-14T10:59:56Z</updated>
<entry>
<title>After some complaints about the dir names, the random device is</title>
<updated>2000-10-14T10:59:56Z</updated>
<author>
<name>Mark Murray</name>
<email>markm@FreeBSD.org</email>
</author>
<published>2000-10-14T10:59:56Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=a6278a2a42fc77094f356a290336a0fc395feb05'/>
<id>urn:sha1:a6278a2a42fc77094f356a290336a0fc395feb05</id>
<content type='text'>
now in dirs called sys/*/random/ instead of sys/*/randomdev/*.

Introduce blocking, but only at startup; the random device will
block until the first reseed happens to prevent clients from
using untrustworthy output.

Provide a read_random() call for the rest of the kernel so that
the entropy device does not need to be present. This means that
things like IPX no longer need to have "device random" hardcoded
into thir kernel config. The downside is that read_random() will
provide very poor output until the entropy device is loaded and
reseeded. It is recommended that developers do NOT use the
read_random() call; instead, they should use arc4random() which
internally uses read_random().

Clean up the mutex and locking code a bit; this makes it possible
to unload the module again.
</content>
</entry>
<entry>
<title>Remove unneeded includes.</title>
<updated>2000-09-21T06:23:16Z</updated>
<author>
<name>Mark Murray</name>
<email>markm@FreeBSD.org</email>
</author>
<published>2000-09-21T06:23:16Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=4a8612fd41ecde5ed5d1be985c14bf813536c484'/>
<id>urn:sha1:4a8612fd41ecde5ed5d1be985c14bf813536c484</id>
<content type='text'>
Submitted by:	phk
</content>
</entry>
<entry>
<title>Include &lt;sys/proc.h&gt; to silence suser() compiler warning.</title>
<updated>2000-09-18T20:42:04Z</updated>
<author>
<name>Robert Watson</name>
<email>rwatson@FreeBSD.org</email>
</author>
<published>2000-09-18T20:42:04Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=c4ff4a846725f24058b6a495b7a7b4b0e00e7b0c'/>
<id>urn:sha1:c4ff4a846725f24058b6a495b7a7b4b0e00e7b0c</id>
<content type='text'>
Approved by:	markm
</content>
</entry>
<entry>
<title>The "struct proc" argument to read_random was ill-conceived, and a</title>
<updated>2000-09-12T13:13:22Z</updated>
<author>
<name>Mark Murray</name>
<email>markm@FreeBSD.org</email>
</author>
<published>2000-09-12T13:13:22Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=d0d519348da5646dd0a77d1551596049d3d1a6a6'/>
<id>urn:sha1:d0d519348da5646dd0a77d1551596049d3d1a6a6</id>
<content type='text'>
hangover from previous experimentation. Remove it. This will clean
up gratuitous needs for forward references and other namespace
pollution.
Moaned about by:	bde
Brought to my attention by:	bp
</content>
</entry>
<entry>
<title>Large upgrade to the entropy device; mainly inspired by feedback</title>
<updated>2000-09-10T13:52:19Z</updated>
<author>
<name>Mark Murray</name>
<email>markm@FreeBSD.org</email>
</author>
<published>2000-09-10T13:52:19Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=4d87a031c0106945da094f3ea770ea9b4b5fcd6b'/>
<id>urn:sha1:4d87a031c0106945da094f3ea770ea9b4b5fcd6b</id>
<content type='text'>
from many folk.

o The reseed process is now a kthread. With SMPng, kthreads are
  pre-emptive, so the annoying jerkiness of the mouse is gone.

o The data structures are protected by mutexes now, not splfoo()/splx().

o The cryptographic routines are broken out into their own subroutines.
  this facilitates review, and possible replacement if that is ever
  found necessary.

Thanks to:		kris, green, peter, jasone, grog, jhb
Forgotten to thank:	You know who you are; no offense intended.
</content>
</entry>
<entry>
<title>o Fix a horrible bug where small reads (&lt; 8 bytes) would return the</title>
<updated>2000-07-25T21:18:47Z</updated>
<author>
<name>Mark Murray</name>
<email>markm@FreeBSD.org</email>
</author>
<published>2000-07-25T21:18:47Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=7aa4389a6c7429f679ba5d0348c4251242ed4702'/>
<id>urn:sha1:7aa4389a6c7429f679ba5d0348c4251242ed4702</id>
<content type='text'>
  wrong bytes.

o Improve the public interface; use void* instead of char* or u_int64_t
  to pass arbitrary data around.
Submitted by:	kris ("horrible bug")
</content>
</entry>
<entry>
<title>Add randomness write functionality. This does absolutely nothing for</title>
<updated>2000-07-17T12:23:04Z</updated>
<author>
<name>Mark Murray</name>
<email>markm@FreeBSD.org</email>
</author>
<published>2000-07-17T12:23:04Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=720a3741cf8c06f597bac5a1a216b6018278dc89'/>
<id>urn:sha1:720a3741cf8c06f597bac5a1a216b6018278dc89</id>
<content type='text'>
entropy estimation, but causes an immediate reseed after the input
(read in sizeof(u_int64_t) chunks) is "harvested".

This will be used in the reboot "reseeder", coming in another
commit. This can be used very effectively at any time you think
your randomness is compromised; something like

# (ps -gauxwww; netstat -an; dmesg; vmstat -c10 1) &gt; /dev/random

will give the attacker something to think about.
</content>
</entry>
<entry>
<title>Fix bug with a vraiable that needs to be per-process, not static;</title>
<updated>2000-07-09T11:49:07Z</updated>
<author>
<name>Mark Murray</name>
<email>markm@FreeBSD.org</email>
</author>
<published>2000-07-09T11:49:07Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=769afb047c958f05573d51af1ed265e67b7f4604'/>
<id>urn:sha1:769afb047c958f05573d51af1ed265e67b7f4604</id>
<content type='text'>
fix formatting of long macros.

Pointed out by:	bde
</content>
</entry>
<entry>
<title>Add entropy gathering code. This will work whether the module is</title>
<updated>2000-07-07T09:03:59Z</updated>
<author>
<name>Mark Murray</name>
<email>markm@FreeBSD.org</email>
</author>
<published>2000-07-07T09:03:59Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=c9ec235ca1e53105c29450d483686482a26751e0'/>
<id>urn:sha1:c9ec235ca1e53105c29450d483686482a26751e0</id>
<content type='text'>
compiled in or loaded.
</content>
</entry>
<entry>
<title>Staticize a variable.</title>
<updated>2000-06-28T18:51:15Z</updated>
<author>
<name>Mark Murray</name>
<email>markm@FreeBSD.org</email>
</author>
<published>2000-06-28T18:51:15Z</published>
<link rel='alternate' type='text/html' href='https://cgit-dev.freebsd.org/src/commit/?id=d44f401738ed7eea729b29ca4d1420285c10cc7f'/>
<id>urn:sha1:d44f401738ed7eea729b29ca4d1420285c10cc7f</id>
<content type='text'>
This fixes the case where linking randomdev into the kernel statically
can cause panics at shutdown time.

Reported by:	sos
</content>
</entry>
</feed>
