1. 27 5月, 2015 2 次提交
    • S
      crypto: drbg - add async seeding operation · 4c787990
      Stephan Mueller 提交于
      The async seeding operation is triggered during initalization right
      after the first non-blocking seeding is completed. As required by the
      asynchronous operation of random.c, a callback function is provided that
      is triggered by random.c once entropy is available. That callback
      function performs the actual seeding of the DRBG.
      
      CC: Andreas Steffen <andreas.steffen@strongswan.org>
      CC: Theodore Ts'o <tytso@mit.edu>
      CC: Sandy Harris <sandyinchina@gmail.com>
      Signed-off-by: NStephan Mueller <smueller@chronox.de>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      4c787990
    • S
      crypto: drbg - prepare for async seeding · 3d6a5f75
      Stephan Mueller 提交于
      In order to prepare for the addition of the asynchronous seeding call,
      the invocation of seeding the DRBG is moved out into a helper function.
      
      In addition, a block of memory is allocated during initialization time
      that will be used as a scratchpad for obtaining entropy. That scratchpad
      is used for the initial seeding operation as well as by the
      asynchronous seeding call. The memory must be zeroized every time the
      DRBG seeding call succeeds to avoid entropy data lingering in memory.
      
      CC: Andreas Steffen <andreas.steffen@strongswan.org>
      CC: Theodore Ts'o <tytso@mit.edu>
      CC: Sandy Harris <sandyinchina@gmail.com>
      Signed-off-by: NStephan Mueller <smueller@chronox.de>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      3d6a5f75
  2. 23 4月, 2015 1 次提交
  3. 22 4月, 2015 1 次提交
  4. 21 4月, 2015 6 次提交
  5. 09 3月, 2015 1 次提交
  6. 04 3月, 2015 2 次提交
  7. 05 1月, 2015 1 次提交
  8. 22 12月, 2014 1 次提交
    • S
      crypto: drbg - panic on continuous self test error · 905b42e5
      Stephan Mueller 提交于
      This patch adds a panic if the FIPS 140-2 self test error failed.
      Note, that entire code is only executed with fips_enabled (i.e. when the
      kernel is booted with fips=1. It is therefore not executed for 99.9% of
      all user base.
      
      As mathematically such failure cannot occur, this panic should never be
      triggered. But to comply with NISTs current requirements, an endless
      loop must be replaced with the panic.
      
      When the new version of FIPS 140 will be released, this entire
      continuous self test function will be ripped out as it will not be
      needed any more.
      
      This patch is functionally equivalent as implemented in ansi_cprng.c and drivers/char/random.c.
      Signed-off-by: NStephan Mueller <smueller@chronox.de>
      Signed-off-by: NHerbert Xu <herbert@gondor.apana.org.au>
      905b42e5
  9. 27 11月, 2014 1 次提交
  10. 26 11月, 2014 1 次提交
  11. 10 11月, 2014 1 次提交
  12. 24 10月, 2014 1 次提交
  13. 05 9月, 2014 1 次提交
  14. 26 8月, 2014 1 次提交
  15. 25 8月, 2014 8 次提交
  16. 01 8月, 2014 1 次提交
  17. 10 7月, 2014 1 次提交
  18. 08 7月, 2014 6 次提交
  19. 04 7月, 2014 3 次提交