Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754708AbbERW6W (ORCPT ); Mon, 18 May 2015 18:58:22 -0400 Received: from helcar.hengli.com.au ([209.40.204.226]:51951 "EHLO helcar.hengli.com.au" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753984AbbERW6S (ORCPT ); Mon, 18 May 2015 18:58:18 -0400 Date: Tue, 19 May 2015 06:58:07 +0800 From: Herbert Xu To: Stephan Mueller Cc: tytso@mit.edu, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH] random: add random_initialized command line param Message-ID: <20150518225807.GA25931@gondor.apana.org.au> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <477328243.LmeEDk1ili@tauon> Organization: Core X-Newsgroups: apana.lists.os.linux.cryptoapi,apana.lists.os.linux.kernel User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1005 Lines: 22 Stephan Mueller wrote: > > I hear more and more discussions about recommendations to use AES 256 and not > AES 128. > > These kind of recommendations will eventually also affect the entropy > requirements for noise sources. This is my motivation for the patch: allowing > different user groups to set the minimum bar for the nonblocking pool to > *higher* levels (the examples for 80 to 112 bits or 100 to 125 bits shall just > show that there are active revisions of entropy requirements). Does anyone need to raise this from 128 today? If not then this patch is pointless. -- Email: Herbert Xu Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/