| History log of /src/sys/arch/arm/sa11x0/sa1111_kbc.c |
| Revision | | Date | Author | Comments |
| 1.19 |
| 27-Sep-2022 |
skrll | Remove unnecessary sys/malloc.h include
|
| 1.18 |
| 13-Apr-2015 |
riastradh | MD rnd.h cleanups. Please let me know if I broke anything!
|
| 1.17 |
| 10-Aug-2014 |
tls | branches: 1.17.4; Merge tls-earlyentropy branch into HEAD.
|
| 1.16 |
| 27-Oct-2012 |
chs | branches: 1.16.10; split device_t/softc for all remaining drivers. replace "struct device *" with "device_t". use device_xname(), device_unit(), etc.
|
| 1.15 |
| 04-Feb-2012 |
matt | branches: 1.15.6; Make this compile again.
|
| 1.14 |
| 02-Feb-2012 |
tls | Entropy-pool implementation move and cleanup.
1) Move core entropy-pool code and source/sink/sample management code to sys/kern from sys/dev.
2) Remove use of NRND as test for presence of entropy-pool code throughout source tree.
3) Remove use of RND_ENABLED in device drivers as microoptimization to avoid expensive operations on disabled entropy sources; make the rnd_add calls do this directly so all callers benefit.
4) Fix bug in recent rnd_add_data()/rnd_add_uint32() changes that might have lead to slight entropy overestimation for some sources.
5) Add new source types for environmental sensors, power sensors, VM system events, and skew between clocks, with a sample implementation for each.
ok releng to go in before the branch due to the difficulty of later pullup (widespread #ifdef removal and moved files). Tested with release builds on amd64 and evbarm and live testing on amd64.
|
| 1.13 |
| 19-Nov-2011 |
tls | branches: 1.13.2; First step of random number subsystem rework described in <20111022023242.BA26F14A158@mail.netbsd.org>. This change includes the following:
An initial cleanup and minor reorganization of the entropy pool code in sys/dev/rnd.c and sys/dev/rndpool.c. Several bugs are fixed. Some effort is made to accumulate entropy more quickly at boot time.
A generic interface, "rndsink", is added, for stream generators to request that they be re-keyed with good quality entropy from the pool as soon as it is available.
The arc4random()/arc4randbytes() implementation in libkern is adjusted to use the rndsink interface for rekeying, which helps address the problem of low-quality keys at boot time.
An implementation of the FIPS 140-2 statistical tests for random number generator quality is provided (libkern/rngtest.c). This is based on Greg Rose's implementation from Qualcomm.
A new random stream generator, nist_ctr_drbg, is provided. It is based on an implementation of the NIST SP800-90 CTR_DRBG by Henric Jungheim. This generator users AES in a modified counter mode to generate a backtracking-resistant random stream.
An abstraction layer, "cprng", is provided for in-kernel consumers of randomness. The arc4random/arc4randbytes API is deprecated for in-kernel use. It is replaced by "cprng_strong". The current cprng_fast implementation wraps the existing arc4random implementation. The current cprng_strong implementation wraps the new CTR_DRBG implementation. Both interfaces are rekeyed from the entropy pool automatically at intervals justifiable from best current cryptographic practice.
In some quick tests, cprng_fast() is about the same speed as the old arc4randbytes(), and cprng_strong() is about 20% faster than rnd_extract_data(). Performance is expected to improve.
The AES code in src/crypto/rijndael is no longer an optional kernel component, as it is required by cprng_strong, which is not an optional kernel component.
The entropy pool output is subjected to the rngtest tests at startup time; if it fails, the system will reboot. There is approximately a 3/10000 chance of a false positive from these tests. Entropy pool _input_ from hardware random numbers is subjected to the rngtest tests at attach time, as well as the FIPS continuous-output test, to detect bad or stuck hardware RNGs; if any are detected, they are detached, but the system continues to run.
A problem with rndctl(8) is fixed -- datastructures with pointers in arrays are no longer passed to userspace (this was not a security problem, but rather a major issue for compat32). A new kernel will require a new rndctl.
The sysctl kern.arandom() and kern.urandom() nodes are hooked up to the new generators, but the /dev/*random pseudodevices are not, yet.
Manual pages for the new kernel interfaces are forthcoming.
|
| 1.12 |
| 13-Mar-2010 |
bsh | branches: 1.12.10; fix changes for struct device split for Lubbock.
|
| 1.11 |
| 29-May-2009 |
rjs | branches: 1.11.2; Make the following changes:
struct device * -> device_t struct cfdata * -> cfdata_t printf -> aprint_ device_t/softc split
|
| 1.10 |
| 05-Jan-2008 |
ad | branches: 1.10.10; Fix includes.
|
| 1.9 |
| 27-Jun-2006 |
peter | branches: 1.9.30; 1.9.34; 1.9.36; 1.9.42; 1.9.50; KNF. Correct some spelling errors.
|
| 1.8 |
| 23-Feb-2006 |
thorpej | branches: 1.8.2; 1.8.10; Use device_parent().
|
| 1.7 |
| 11-Dec-2005 |
christos | branches: 1.7.2; 1.7.4; 1.7.6; merge ktrace-lwp.
|
| 1.6 |
| 06-Apr-2004 |
bsh | branches: 1.6.12; fake that the PS/2 kbd/mouse controller of SA-1111 has two slots.
This is necessary to attach a pms driver to sackbc.
|
| 1.5 |
| 06-Apr-2004 |
bsh | whitespace nits.
|
| 1.4 |
| 24-Mar-2004 |
drochner | remove license clauses 3 and 4 from my cpoyright notices
|
| 1.3 |
| 13-Mar-2004 |
bjh21 | Abstract the interface between pckbc(4), and the pckbd(4) and pms(4) drivers that attach to it. This allows for other host interface chips that use the same keyboards and mice, such as the ones in the ARM IOMD20, ARM7500, and SA-1111. The PC-compatible driver is still called pckbc(4), and the new abstraction layer is "pckbport", so the child devices have moved from sys/dev/pckbc to sys/dev/pckbport, which also contains some code shared between all host controllers. To avoid incompatibility, pckbdreg.h is still installed in /usr/include/dev/pckbc.
In theory, this shouldn't cause any behavioural changes in the drivers concerned. Thy just use rather more function pointers than before. Tested on i386 and (with a new host driver) acorn32. Compiled on several other affected architectures.
|
| 1.2 |
| 15-Jul-2003 |
lukem | __KERNEL_RCSID()
|
| 1.1 |
| 20-Dec-2002 |
bsh | branches: 1.1.2; 1.1.4; Driver for keyboard controller in the SA-1111 companion chip.
Our PC keyboard driver (sys/dev/pckbc/pckbd.c) works only with 8042 keyboard controller driver (sys/dev/ic/pckbc.c). So, This file provides same functions as those of 8042 driver.
XXX: we need cleaner interface between the keyboard driver and keyboard controller drivers.
XXX: PS/2 mice are not supported yet.
|
| 1.1.4.3 |
| 21-Sep-2004 |
skrll | Fix the sync with head I botched.
|
| 1.1.4.2 |
| 18-Sep-2004 |
skrll | Sync with HEAD.
|
| 1.1.4.1 |
| 03-Aug-2004 |
skrll | Sync with HEAD
|
| 1.1.2.2 |
| 29-Dec-2002 |
thorpej | Sync with HEAD.
|
| 1.1.2.1 |
| 20-Dec-2002 |
thorpej | file sa1111_kbc.c was added on branch nathanw_sa on 2002-12-29 19:20:08 +0000
|
| 1.6.12.3 |
| 21-Jan-2008 |
yamt | sync with head
|
| 1.6.12.2 |
| 30-Dec-2006 |
yamt | sync with head.
|
| 1.6.12.1 |
| 21-Jun-2006 |
yamt | sync with head.
|
| 1.7.6.1 |
| 22-Apr-2006 |
simonb | Sync with head.
|
| 1.7.4.1 |
| 09-Sep-2006 |
rpaulo | sync with head
|
| 1.7.2.1 |
| 01-Mar-2006 |
yamt | sync with head.
|
| 1.8.10.1 |
| 13-Jul-2006 |
gdamore | Merge from HEAD.
|
| 1.8.2.1 |
| 11-Aug-2006 |
yamt | sync with head
|
| 1.9.50.1 |
| 08-Jan-2008 |
bouyer | Sync with HEAD
|
| 1.9.42.1 |
| 18-Feb-2008 |
mjf | Sync with HEAD.
|
| 1.9.36.1 |
| 09-Jan-2008 |
matt | sync with HEAD
|
| 1.9.34.1 |
| 20-Jan-2008 |
chris | Sync to HEAD.
|
| 1.9.30.1 |
| 28-Feb-2008 |
rjs | Sync with HEAD.
|
| 1.10.10.2 |
| 11-Aug-2010 |
yamt | sync with head.
|
| 1.10.10.1 |
| 20-Jun-2009 |
yamt | sync with head
|
| 1.11.2.1 |
| 30-Apr-2010 |
uebayasi | Sync with HEAD.
|
| 1.12.10.2 |
| 30-Oct-2012 |
yamt | sync with head
|
| 1.12.10.1 |
| 17-Apr-2012 |
yamt | sync with head
|
| 1.13.2.1 |
| 18-Feb-2012 |
mrg | merge to -current.
|
| 1.15.6.3 |
| 03-Dec-2017 |
jdolecek | update from HEAD
|
| 1.15.6.2 |
| 20-Aug-2014 |
tls | Rebase to HEAD as of a few days ago.
|
| 1.15.6.1 |
| 20-Nov-2012 |
tls | Resync to 2012-11-19 00:00:00 UTC
|
| 1.16.10.1 |
| 07-Apr-2014 |
tls | Be a little more clear and consistent about harvesting entropy from devices:
1) deprecate RND_FLAG_NO_ESTIMATE
2) define RND_FLAG_COLLECT_TIME, RND_FLAG_COLLECT_VALUE
3) define RND_FLAG_ESTIMATE_TIME, RND_FLAG_ESTIMATE_VALUE
4) define RND_FLAG_DEFAULT: RND_FLAG_COLLECT_TIME| RND_FLAG_COLLECT_VALUE|RND_FLAG_ESTIMATE_TIME
5) Make entropy harvesting from environmental sensors a little more generic and remove it from individual sensor drivers.
6) Remove individual open-coded delta-estimators for values from a few places in the tree (uvm, environmental drivers).
7) 0 -> RND_FLAG_DEFAULT, actually gather entropy from various drivers that had stubbed out code, other minor cleanups.
|
| 1.17.4.1 |
| 06-Jun-2015 |
skrll | Sync with HEAD
|