From: Andy L. <lu...@am...> - 2014-04-14 15:50:34
|
[Resent because I forgot to email lkml. This also surreptitiously fixes a silly typo on a patch description.] This is my attempt to come up with a workable way to use so-called entropy sources like a TPM to feed /dev/urandom. Arguably we should be feeding the input pool as well, but if the /dev/random algorithm is correct, this shouldn't matter. I don't want sensible use of TPMs for /dev/urandom to block on a long debate about /dev/random, so these patches have no effect on /dev/random. Andy Lutomirski (2): random: Add add_drbg_randomness to safely seed urandom from crypto hw tpm,random: Call add_drbg_randomness after selftest drivers/char/random.c | 56 +++++++++++++++++++++++++++++++++++----- drivers/char/tpm/tpm-interface.c | 15 ++++++++++- include/linux/random.h | 1 + include/trace/events/random.h | 19 ++++++++++++++ 4 files changed, 83 insertions(+), 8 deletions(-) -- 1.9.0 |