public inbox for linux-crypto@vger.kernel.org
 help / color / mirror / Atom feed
From: "Jason A. Donenfeld" <Jason@zx2c4.com>
To: linux-kernel@vger.kernel.org, linux-crypto@vger.kernel.org
Cc: "Jason A. Donenfeld" <Jason@zx2c4.com>
Subject: [PATCH v3 0/5] random: use computational hash for entropy extraction, and related fixes
Date: Sat,  5 Feb 2022 17:01:13 +0100	[thread overview]
Message-ID: <20220205160118.252698-1-Jason@zx2c4.com> (raw)

The bulk of the motivation for this and description of crypto
vulnerabilities is in the first patch of this series. The following
three patches then fix up entropy accounting for the new model. The last
patch fixes a minor code safety issue.

This v3 fixes comments and commit message wording, simplifies a bit of
code in a cmpxchg loop, and adjusts semantics around the poll write
wakeup threshold.

Jason A. Donenfeld (5):
  random: use computational hash for entropy extraction
  random: simplify entropy debiting
  random: use linear min-entropy accumulation crediting
  random: always wake up entropy writers after extraction
  random: make credit_entropy_bits() always safe

 drivers/char/random.c         | 501 ++++++----------------------------
 include/trace/events/random.h |  30 +-
 2 files changed, 87 insertions(+), 444 deletions(-)

-- 
2.35.0


             reply	other threads:[~2022-02-05 16:01 UTC|newest]

Thread overview: 9+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-02-05 16:01 Jason A. Donenfeld [this message]
2022-02-05 16:01 ` [PATCH v3 1/5] random: use computational hash for entropy extraction Jason A. Donenfeld
2022-02-05 16:01 ` [PATCH v3 2/5] random: simplify entropy debiting Jason A. Donenfeld
2022-02-05 16:01 ` [PATCH v3 3/5] random: use linear min-entropy accumulation crediting Jason A. Donenfeld
2022-02-05 16:01 ` [PATCH v3 4/5] random: always wake up entropy writers after extraction Jason A. Donenfeld
2022-02-05 18:00   ` Dominik Brodowski
2022-02-05 22:38   ` Jason A. Donenfeld
2022-02-05 16:01 ` [PATCH v3 5/5] random: make credit_entropy_bits() always safe Jason A. Donenfeld
2022-02-08  6:48 ` [PATCH v3 0/5] random: use computational hash for entropy extraction, and related fixes Eric Biggers

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20220205160118.252698-1-Jason@zx2c4.com \
    --to=jason@zx2c4.com \
    --cc=linux-crypto@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox