Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp7460100ybl; Wed, 15 Jan 2020 23:29:53 -0800 (PST) X-Google-Smtp-Source: APXvYqxxeo3jhWrk+HeA574DXbFR0p9/PfjVP46ul5KKb5kWkCLxtLpTasS/JPtpUGG3EDozOzM2 X-Received: by 2002:a05:6830:2147:: with SMTP id r7mr1007013otd.94.1579159793305; Wed, 15 Jan 2020 23:29:53 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579159793; cv=none; d=google.com; s=arc-20160816; b=qoW5sOnoFrR3u5RlD8r7FU34F1QQyLZUUqGGGKqz53B12MKXJrQ0P+QpV4qts1zYXh LWX54KuycXymeHk/DAylpFHMSuzueIWSltMQbtRuNYmB6MhYDxWNxyz43HN1+J/Ws7hj YHCTnY4Y8p4r0iY2xn0AF06O+dTAp4jL7O/onTyDEwLiGw5UgnDPyeo79AivyIaq/LY3 XL8ktFc/HygL4PcM7aofNbADX/ri70Bc38csmMamduqVH+OA87xrpI4II7V5Vsd/88yV 6KLiTK+RP2V6u1De7kgZWhea0PglorHFFc2pfxPRXTXvAxAEp/bHDImd7r33+S0H22Rb 1/lg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=TuMGu6eCqVUYEoh3TD5lXbSvO6CM/wB9pqQh/ZoBuBY=; b=u9u8WgrLTEqisADAhg7Y/HLl8pkFGyhnofHev2Ij5O2Ni0oVYfME6dWyCLjj10GULd R1nYSmZ56PGuPb7cz6QtZRjSmUFhUMHwJvELVCHLoxgHYEzpPnaUpJWH5wZL+A2FMQlz +UpQ1tWp8NjpZasu6NFXE4DRkB9VvMbps6Qp0ECWDs2W3ZF8STlCVQuuWi0kLz0/KlZb Y5t18Ar1O2kNi/YK+OVKbkud/WzjLBThxAPBGAxSIhAN2fQaipGhSIXZ5O9wabNwHrA4 NqYnEx4vNDRMghmpf9e3+G/Wk+KGoxRLvhVloke76Znewf+dC6aUJePEJoxd1pKmSqUR ZJVQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@chronox.de header.s=strato-dkim-0002 header.b=qf3BehJP; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k84si10891647oib.46.2020.01.15.23.29.42; Wed, 15 Jan 2020 23:29:53 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@chronox.de header.s=strato-dkim-0002 header.b=qf3BehJP; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726410AbgAPGzL (ORCPT + 99 others); Thu, 16 Jan 2020 01:55:11 -0500 Received: from mo4-p03-ob.smtp.rzone.de ([85.215.255.103]:23013 "EHLO mo4-p03-ob.smtp.rzone.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725973AbgAPGzL (ORCPT ); Thu, 16 Jan 2020 01:55:11 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; t=1579157709; s=strato-dkim-0002; d=chronox.de; h=References:In-Reply-To:Message-ID:Date:Subject:Cc:To:From: X-RZG-CLASS-ID:X-RZG-AUTH:From:Subject:Sender; bh=TuMGu6eCqVUYEoh3TD5lXbSvO6CM/wB9pqQh/ZoBuBY=; b=qf3BehJPpMWMEjAwpc96RMiqDWboEbHi5clMZpC1MST7Yg7oy0iKqTHNK1+9TZyGu/ Hlq9sTs1Li8OBhaQfdEmXDl+zsKtgwHB3k0/g5UPxsWqw0lnt1GYcPtAIe6qIPL6mukG /q4KHUWWqOc1CTaclppIc44Q+NX/91zxdGoUh21ahTYFRfchJzQoip8QcOKMI37YbHMb m1tqcxd20sOGvC8YkaGD6ROPzIytEUOqD0+T1umh1MhgTEdFkdFl/qE8vDrtEt2sE3Qk 1E3r06Yw4kYSdh75YysZ0/YWIkpN0eBsVqkD9kn/yd3zcXpcMnylJm7QSkEEh1SZCDgI qbUw== X-RZG-AUTH: ":P2ERcEykfu11Y98lp/T7+hdri+uKZK8TKWEqNyiHySGSa9k9xmwdNnzGHXPZJPScHivh" X-RZG-CLASS-ID: mo00 Received: from tauon.chronox.de by smtp.strato.de (RZmta 46.1.4 DYNA|AUTH) with ESMTPSA id u04585w0G6s1aB2 (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256 bits)) (Client did not present a certificate); Thu, 16 Jan 2020 07:54:01 +0100 (CET) From: Stephan Mueller To: Randy Dunlap Cc: Arnd Bergmann , Greg Kroah-Hartman , linux-crypto@vger.kernel.org, LKML , linux-api@vger.kernel.org, "Eric W. Biederman" , "Alexander E. Patrakov" , "Ahmed S. Darwish" , "Theodore Y. Ts'o" , Willy Tarreau , Matthew Garrett , Vito Caputo , Andreas Dilger , Jan Kara , Ray Strode , William Jon McCann , zhangjs , Andy Lutomirski , Florian Weimer , Lennart Poettering , Nicolai Stange , "Peter, Matthias" , Marcelo Henrique Cerri , Roman Drahtmueller , Neil Horman , Julia Lawall , Dan Carpenter Subject: Re: [PATCH v28 07/12] LRNG - add kernel crypto API PRNG extension Date: Thu, 16 Jan 2020 07:54:00 +0100 Message-ID: <6088699.12EYreDE7o@tauon.chronox.de> In-Reply-To: References: <6157374.ptSnyUpaCn@positron.chronox.de> <526421170.FD02tCEzJt@positron.chronox.de> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="iso-8859-1" Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Am Donnerstag, 16. Januar 2020, 01:15:46 CET schrieb Randy Dunlap: Hi Randy, > On 1/15/20 2:34 AM, Stephan M=FCller wrote: > > CC: "Eric W. Biederman" > > CC: "Alexander E. Patrakov" > > CC: "Ahmed S. Darwish" > > CC: "Theodore Y. Ts'o" > > CC: Willy Tarreau > > CC: Matthew Garrett > > CC: Vito Caputo > > CC: Andreas Dilger > > CC: Jan Kara > > CC: Ray Strode > > CC: William Jon McCann > > CC: zhangjs > > CC: Andy Lutomirski > > CC: Florian Weimer > > CC: Lennart Poettering > > CC: Nicolai Stange > > Reviewed-by: Marcelo Henrique Cerri > > Reviewed-by: Roman Drahtmueller > > Tested-by: Roman Drahtm=FCller > > Tested-by: Marcelo Henrique Cerri > > Tested-by: Neil Horman > > Signed-off-by: Stephan Mueller > > --- > >=20 > > drivers/char/lrng/Kconfig | 10 + > > drivers/char/lrng/Makefile | 1 + > > drivers/char/lrng/lrng_kcapi.c | 327 +++++++++++++++++++++++++++++++++ > > 3 files changed, 338 insertions(+) > > create mode 100644 drivers/char/lrng/lrng_kcapi.c > >=20 > > diff --git a/drivers/char/lrng/Kconfig b/drivers/char/lrng/Kconfig > > index 15fb623d9d1f..0d070a3897dd 100644 > > --- a/drivers/char/lrng/Kconfig > > +++ b/drivers/char/lrng/Kconfig > > @@ -80,6 +80,16 @@ config LRNG_DRBG > >=20 > > Enable the SP800-90A DRBG support for the LRNG. Once the > > module is loaded, output from /dev/random, /dev/urandom, > > getrandom(2), or get_random_bytes is provided by a DRBG. > >=20 > > + > > +config LRNG_KCAPI > > + tristate "Kernel Crypto API support for the LRNG" > > + select CRYPTO_RNG >=20 > Don't select CRYPTO_RNG unless you know that CRYPTO is set/enabled. I added "depends on CRYPTO" >=20 > > + help > > + Enable the support for generic pseudo-random number > > + generators offered by the kernel crypto API with the > > + LRNG. Once the module is loaded, output from /dev/random, > > + /dev/urandom, getrandom(2), or get_random_bytes is > > + provided by the selected kernel crypto API RNG. > >=20 > > endif # LRNG_DRNG_SWITCH > > =20 > > endif # LRNG Thank you. Ciao Stephan