Received: by 2002:a25:ca44:0:0:0:0:0 with SMTP id a65csp592282ybg; Tue, 28 Jul 2020 13:41:38 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx82FuCEXMZa+WzeBxB81GpaLHNAZC9NZAZZcOQgPWFECgTjSfdmI6Sfn4k+7cD98nuHPfs X-Received: by 2002:a50:d8c2:: with SMTP id y2mr27611101edj.114.1595968898012; Tue, 28 Jul 2020 13:41:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1595968897; cv=none; d=google.com; s=arc-20160816; b=OmAwU27KAD8u78u9qA2E1khJkydQDuyEDWqETIP7zoNbdUtuCumR1poT/P7PjHstYM 5+u9CpdKCKjIc2jEWEyEqP8phy9da17YEjNbY/YYouFFWLrRMfFJaMyFnURHnKRx9Oev NgGEGtLURGt9eJfSjd5JL7VjAdcTasNy+nFi1CEv08USv0wXHcTzx7R8+nZYrGqzNJli Mx5z7jSra0z8Af0g/WkjQ3Bc3dp/3yL16bwTzQt+3v674jNmO3++3lLdg8zIS2f7PVZ2 XJYZDrjZQyyIzrEOTeAEOd0kan2Q07x+frxRNEEtPdaRxqGpJh6HyoL9rrJE2LRFMRwt 0kWA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=vQ5fVP16Xq3ECgvu5N7k0g4Hn/fw+nsk8O0pYdaANmE=; b=ltN73L8YFoTfvhT/DHnjg0ncEpZrVANz72+UGtqqIrhrHhd2j36cghaEuh4zl52pDB cLbyoDutBYcYsblc9TQc0IjdwcALRM+psS4C1YSKwvPgsufyVbLZ5DwcQu/TGPJ0rEgH 89D0TTzEuVy/PCx0T4ltp/lOAwr/KgnZ8mNk/B3HCaYdu/3J7HLWrpcvHywB37PLJpAe 6lmNFWHq6g/ZoBGILeuJxrwqouBEft2hlXHAQbLY2Keg87TCmARUJCNQJk5FddDIhE53 a7jw8PXyShooZK/ebo85ze3+I1UBwqJi9UYUpAvPBrNcupdy1W94PRUC58ptVHa6pxB7 TrhQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 89si2916997edq.575.2020.07.28.13.41.15; Tue, 28 Jul 2020 13:41:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729136AbgG1Ukr (ORCPT + 99 others); Tue, 28 Jul 2020 16:40:47 -0400 Received: from jabberwock.ucw.cz ([46.255.230.98]:50042 "EHLO jabberwock.ucw.cz" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728430AbgG1Ukr (ORCPT ); Tue, 28 Jul 2020 16:40:47 -0400 Received: by jabberwock.ucw.cz (Postfix, from userid 1017) id 3489E1C0BED; Tue, 28 Jul 2020 22:40:45 +0200 (CEST) Date: Tue, 28 Jul 2020 22:40:44 +0200 From: Pavel Machek To: Stephan M?ller Cc: Arnd Bergmann , Greg Kroah-Hartman , linux-crypto@vger.kernel.org, LKML , linux-api@vger.kernel.org, "Eric W. Biederman" , "Alexander E. Patrakov" , "Ahmed S. Darwish" , "Theodore Y. Ts'o" , Willy Tarreau , Matthew Garrett , Vito Caputo , Andreas Dilger , Jan Kara , Ray Strode , William Jon McCann , zhangjs , Andy Lutomirski , Florian Weimer , Lennart Poettering , Nicolai Stange , "Peter, Matthias" , Marcelo Henrique Cerri , Roman Drahtmueller , Neil Horman , Randy Dunlap , Julia Lawall , Dan Carpenter Subject: Re: [PATCH v31 00/12] /dev/random - a new approach with full SP800-90B Message-ID: <20200728204044.GD1012@bug> References: <2050754.Mh6RI2rZIc@positron.chronox.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <2050754.Mh6RI2rZIc@positron.chronox.de> User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi! > The following patch set provides a different approach to /dev/random which is called > Linux Random Number Generator (LRNG) to collect entropy within the Linux kernel. The > main improvements compared to the existing /dev/random is to provide sufficient entropy > during boot time as well as in virtual environments and when using SSDs. A secondary > design goal is to limit the impact of the entropy collection on massive parallel systems > and also allow the use accelerated cryptographic primitives. Also, all steps of the > entropic data processing are testable. That sounds good.. maybe too good. Where does LRNG get the entropy? That is the part that should be carefully documented.. Pavel -- (english) http://www.livejournal.com/~pavelmachek (cesky, pictures) http://atrey.karlin.mff.cuni.cz/~pavel/picture/horses/blog.html