Received: by 2002:a25:7ec1:0:0:0:0:0 with SMTP id z184csp761009ybc; Sat, 16 Nov 2019 08:13:38 -0800 (PST) X-Google-Smtp-Source: APXvYqwXyymw9H0vJs4sVfNGSyGkQo8quXSBwW5gKAp3EuDA/d/U5SiArM2CGIw+puq4UW4ax98f X-Received: by 2002:a1c:1b07:: with SMTP id b7mr21113564wmb.111.1573920817912; Sat, 16 Nov 2019 08:13:37 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1573920817; cv=none; d=google.com; s=arc-20160816; b=XJyuXsgDVcrHsLqnVb6IkbWuyqgQYFlF9KBMssnXjfVW3yTVIN3RLT4KMx7NT7vB/Z LxotvsGSsbQsX3rBmihxFLHC+3ZVdi+/lC/176npiDgDJB68IGKUoMjV0T58Vj+Fq7yC o6WvigmU5x3Hvmq/T90baZHENIlO6gFzUxmlWvpnk3WujsNyEe0XZ0XkVDugW6Rz6Q0Q Gqww+jDFIcijdTDqOT2pczSoe3EVaOpKAkpXmCWhPYLNP4P2wBHnhOc0dipjoxKAhh9x 51cKVqVOYlrzkf6mAhlu464PsvYLZWoUAnJXqDoKETPopvBKonB+LJoOTQsbRHVzlX4p VEqA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:to:in-reply-to:cc:references:message-id :date:subject:mime-version:from:content-transfer-encoding :dkim-signature; bh=rbbVOSmMuRnIGDknBjXXfC0fBPASDKYoYUrmo5eNFgM=; b=blx2SF7t9WCwcjIPfnpVPlXHqRpnTw9Shcr0XX4Z5GHwnq25/h0YF1IcPpbbbCwJm0 Benkxj+mc7hzkH2jf2Db19tYQxCIqSP8yEPnw5BzUkcsGi1PX/v3ncE9oOiqsY4WBB0J jTw3Lt7Qb7oCfzjMQuGIvu2BDK9bXnEAcVQYg+Haot9TdKRAAokTPEYmzJ81wAY5M4Lr aw1DVI3ZNrtCCxpQjcwzCzm7+W6hV9DawdJOmLWmw4zGSNkl8+/W0SqLEsNIV7rDPNm0 qYcxaOsuQ0r36ifDogRoGuRwHbpAmgoDxLmP6xfl+1+oITmW83WD7LYpwOylSXIfGgxr Gn4A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@amacapital-net.20150623.gappssmtp.com header.s=20150623 header.b=bS92H15s; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o22si8620384edv.175.2019.11.16.08.12.41; Sat, 16 Nov 2019 08:13:37 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@amacapital-net.20150623.gappssmtp.com header.s=20150623 header.b=bS92H15s; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730390AbfKPQJO (ORCPT + 99 others); Sat, 16 Nov 2019 11:09:14 -0500 Received: from mail-pl1-f193.google.com ([209.85.214.193]:34925 "EHLO mail-pl1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731008AbfKPQJM (ORCPT ); Sat, 16 Nov 2019 11:09:12 -0500 Received: by mail-pl1-f193.google.com with SMTP id s10so6857780plp.2 for ; Sat, 16 Nov 2019 08:09:12 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amacapital-net.20150623.gappssmtp.com; s=20150623; h=content-transfer-encoding:from:mime-version:subject:date:message-id :references:cc:in-reply-to:to; bh=rbbVOSmMuRnIGDknBjXXfC0fBPASDKYoYUrmo5eNFgM=; b=bS92H15s+5qWORaPy/KpGyd9SsgC655KqQYuSsU9pKNGfk9SJTLqRih+4XIq+ZkOS2 +/poIX3KAggHJsmIL0jJM+EurfmUKZRoJ9Bb5rc9SAaN4mUnuVL0u4psU6cMne+FN7vp 37n6UpKt+0TZ3XSqaIb7jbEgq6pL0UEzQ6MkRCpb5Id5hwADu+fONtfsT2zYci08+irc miWPM6cogv/xFmoqjRR41ZkQlbnm7Oql0Oxp4oS3u9d+DJyiLsEyCDgbacdlxGsCwHWr ZGwZtccBiL2U/y9DsrLyrdaGrRPsceSG8ipedytZVQBCAmEN0NK/dNnPTzzBSvM1VLxH 9XgA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:content-transfer-encoding:from:mime-version :subject:date:message-id:references:cc:in-reply-to:to; bh=rbbVOSmMuRnIGDknBjXXfC0fBPASDKYoYUrmo5eNFgM=; b=Do44xrM8ciDOr/T3trL6Sks76Mt0ef6rbVJne1PefmG5MVl4kOv89Ovse+08jBlTGS rZy7GohVHtFO93kJQNU+u5Fd5kKm217YUwy4QO3mgUk794ADuKw+kJEtJB2KfYDyzfRq hWP0IDK0S+7YTHcEyvBfjBufEs7BhzAzeksIoSGvV3p2FJliRbmM+dvZEcC8IlKDe2Ez D85vYUe76Fekd1GTfXPP+AnZui9RF7WbhjuZVGFItCd1ssWebMBjO8o/S8Hnns6L82tX dNYcEYj0l/ah43OFjsNoW6luFzoG/NdM2x1d23PFEyyWnBlbX1IG67677fpseWla+ijr Ez/Q== X-Gm-Message-State: APjAAAWB4v5br1JfFf37zheKKGjDKkOiABaNRbwSl8blekYz50WzztiV qf9vFAcn0FWQk7EV/dI9V4oTSw== X-Received: by 2002:a17:90b:3015:: with SMTP id hg21mr27434228pjb.96.1573920552189; Sat, 16 Nov 2019 08:09:12 -0800 (PST) Received: from ?IPv6:2601:646:c200:1ef2:28e6:fc7a:c382:8b6f? ([2601:646:c200:1ef2:28e6:fc7a:c382:8b6f]) by smtp.gmail.com with ESMTPSA id r33sm13936396pjb.5.2019.11.16.08.09.11 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Sat, 16 Nov 2019 08:09:11 -0800 (PST) Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable From: Andy Lutomirski Mime-Version: 1.0 (1.0) Subject: Re: [PATCH v25 10/12] LRNG - add TRNG support Date: Sat, 16 Nov 2019 08:09:09 -0800 Message-Id: References: <5390778.VeFRgus4bQ@positron.chronox.de> Cc: Arnd Bergmann , Greg Kroah-Hartman , linux-crypto@vger.kernel.org, LKML , linux-api@vger.kernel.org, "Eric W. Biederman" , "Alexander E. Patrakov" , "Ahmed S. Darwish" , "Theodore Y. Ts'o" , Willy Tarreau , Matthew Garrett , Vito Caputo , Andreas Dilger , Jan Kara , Ray Strode , William Jon McCann , zhangjs , Andy Lutomirski , Florian Weimer , Lennart Poettering , Nicolai Stange , "Peter, Matthias" , Marcelo Henrique Cerri , Roman Drahtmueller , Neil Horman In-Reply-To: <5390778.VeFRgus4bQ@positron.chronox.de> To: =?utf-8?Q?Stephan_M=C3=BCller?= X-Mailer: iPhone Mail (17A878) Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org > On Nov 16, 2019, at 1:40 AM, Stephan M=C3=BCller wro= te: >=20 > =EF=BB=BFThe True Random Number Generator (TRNG) provides a random number > generator with prediction resistance (SP800-90A terminology) or an NTG.1 > (AIS 31 terminology). >=20 ... > The secondary DRNGs seed from the TRNG if it is present. In addition, > the /dev/random device accesses the TRNG. >=20 > If the TRNG is disabled, the secondary DRNGs seed from the entropy pool > and /dev/random behaves like getrandom(2). As mentioned before, I don=E2=80=99t like this API. An application that, fo= r some reason, needs a TRNG, should have an API by which it either gets a TR= NG or an error. Similarly, an application that wants cryptographically secur= e random numbers efficiently should have an API that does that. With your d= esign, /dev/random tries to cater to both use cases, but one of the use case= s fails depending on kernel config. I think /dev/random should wait for enough entropy to initialize the system b= ut should not block after that. A TRNG should have an entirely new API that i= s better than /dev/random.