Home | History | Annotate | Download | only in sa11x0
History log of /src/sys/arch/arm/sa11x0/sa1111_kbc.c
RevisionDateAuthorComments
 1.19  27-Sep-2022  skrll Remove unnecessary sys/malloc.h include
 1.18  13-Apr-2015  riastradh MD rnd.h cleanups. Please let me know if I broke anything!
 1.17  10-Aug-2014  tls branches: 1.17.4;
Merge tls-earlyentropy branch into HEAD.
 1.16  27-Oct-2012  chs branches: 1.16.10;
split device_t/softc for all remaining drivers.
replace "struct device *" with "device_t".
use device_xname(), device_unit(), etc.
 1.15  04-Feb-2012  matt branches: 1.15.6;
Make this compile again.
 1.14  02-Feb-2012  tls Entropy-pool implementation move and cleanup.

1) Move core entropy-pool code and source/sink/sample management code
to sys/kern from sys/dev.

2) Remove use of NRND as test for presence of entropy-pool code throughout
source tree.

3) Remove use of RND_ENABLED in device drivers as microoptimization to
avoid expensive operations on disabled entropy sources; make the
rnd_add calls do this directly so all callers benefit.

4) Fix bug in recent rnd_add_data()/rnd_add_uint32() changes that might
have lead to slight entropy overestimation for some sources.

5) Add new source types for environmental sensors, power sensors, VM
system events, and skew between clocks, with a sample implementation
for each.

ok releng to go in before the branch due to the difficulty of later
pullup (widespread #ifdef removal and moved files). Tested with release
builds on amd64 and evbarm and live testing on amd64.
 1.13  19-Nov-2011  tls branches: 1.13.2;
First step of random number subsystem rework described in
<20111022023242.BA26F14A158@mail.netbsd.org>. This change includes
the following:

An initial cleanup and minor reorganization of the entropy pool
code in sys/dev/rnd.c and sys/dev/rndpool.c. Several bugs are
fixed. Some effort is made to accumulate entropy more quickly at
boot time.

A generic interface, "rndsink", is added, for stream generators to
request that they be re-keyed with good quality entropy from the pool
as soon as it is available.

The arc4random()/arc4randbytes() implementation in libkern is
adjusted to use the rndsink interface for rekeying, which helps
address the problem of low-quality keys at boot time.

An implementation of the FIPS 140-2 statistical tests for random
number generator quality is provided (libkern/rngtest.c). This
is based on Greg Rose's implementation from Qualcomm.

A new random stream generator, nist_ctr_drbg, is provided. It is
based on an implementation of the NIST SP800-90 CTR_DRBG by
Henric Jungheim. This generator users AES in a modified counter
mode to generate a backtracking-resistant random stream.

An abstraction layer, "cprng", is provided for in-kernel consumers
of randomness. The arc4random/arc4randbytes API is deprecated for
in-kernel use. It is replaced by "cprng_strong". The current
cprng_fast implementation wraps the existing arc4random
implementation. The current cprng_strong implementation wraps the
new CTR_DRBG implementation. Both interfaces are rekeyed from
the entropy pool automatically at intervals justifiable from best
current cryptographic practice.

In some quick tests, cprng_fast() is about the same speed as
the old arc4randbytes(), and cprng_strong() is about 20% faster
than rnd_extract_data(). Performance is expected to improve.

The AES code in src/crypto/rijndael is no longer an optional
kernel component, as it is required by cprng_strong, which is
not an optional kernel component.

The entropy pool output is subjected to the rngtest tests at
startup time; if it fails, the system will reboot. There is
approximately a 3/10000 chance of a false positive from these
tests. Entropy pool _input_ from hardware random numbers is
subjected to the rngtest tests at attach time, as well as the
FIPS continuous-output test, to detect bad or stuck hardware
RNGs; if any are detected, they are detached, but the system
continues to run.

A problem with rndctl(8) is fixed -- datastructures with
pointers in arrays are no longer passed to userspace (this
was not a security problem, but rather a major issue for
compat32). A new kernel will require a new rndctl.

The sysctl kern.arandom() and kern.urandom() nodes are hooked
up to the new generators, but the /dev/*random pseudodevices
are not, yet.

Manual pages for the new kernel interfaces are forthcoming.
 1.12  13-Mar-2010  bsh branches: 1.12.10;
fix changes for struct device split for Lubbock.
 1.11  29-May-2009  rjs branches: 1.11.2;
Make the following changes:

struct device * -> device_t
struct cfdata * -> cfdata_t
printf -> aprint_
device_t/softc split
 1.10  05-Jan-2008  ad branches: 1.10.10;
Fix includes.
 1.9  27-Jun-2006  peter branches: 1.9.30; 1.9.34; 1.9.36; 1.9.42; 1.9.50;
KNF. Correct some spelling errors.
 1.8  23-Feb-2006  thorpej branches: 1.8.2; 1.8.10;
Use device_parent().
 1.7  11-Dec-2005  christos branches: 1.7.2; 1.7.4; 1.7.6;
merge ktrace-lwp.
 1.6  06-Apr-2004  bsh branches: 1.6.12;
fake that the PS/2 kbd/mouse controller of SA-1111 has two slots.

This is necessary to attach a pms driver to sackbc.
 1.5  06-Apr-2004  bsh whitespace nits.
 1.4  24-Mar-2004  drochner remove license clauses 3 and 4 from my cpoyright notices
 1.3  13-Mar-2004  bjh21 Abstract the interface between pckbc(4), and the pckbd(4) and pms(4)
drivers that attach to it. This allows for other host interface chips
that use the same keyboards and mice, such as the ones in the ARM
IOMD20, ARM7500, and SA-1111. The PC-compatible driver is still
called pckbc(4), and the new abstraction layer is "pckbport", so the
child devices have moved from sys/dev/pckbc to sys/dev/pckbport, which
also contains some code shared between all host controllers. To avoid
incompatibility, pckbdreg.h is still installed in
/usr/include/dev/pckbc.

In theory, this shouldn't cause any behavioural changes in the drivers
concerned. Thy just use rather more function pointers than before. Tested
on i386 and (with a new host driver) acorn32. Compiled on several other
affected architectures.
 1.2  15-Jul-2003  lukem __KERNEL_RCSID()
 1.1  20-Dec-2002  bsh branches: 1.1.2; 1.1.4;
Driver for keyboard controller in the SA-1111 companion chip.

Our PC keyboard driver (sys/dev/pckbc/pckbd.c) works only with 8042
keyboard controller driver (sys/dev/ic/pckbc.c). So, This file
provides same functions as those of 8042 driver.

XXX: we need cleaner interface between the keyboard driver and
keyboard controller drivers.

XXX: PS/2 mice are not supported yet.
 1.1.4.3  21-Sep-2004  skrll Fix the sync with head I botched.
 1.1.4.2  18-Sep-2004  skrll Sync with HEAD.
 1.1.4.1  03-Aug-2004  skrll Sync with HEAD
 1.1.2.2  29-Dec-2002  thorpej Sync with HEAD.
 1.1.2.1  20-Dec-2002  thorpej file sa1111_kbc.c was added on branch nathanw_sa on 2002-12-29 19:20:08 +0000
 1.6.12.3  21-Jan-2008  yamt sync with head
 1.6.12.2  30-Dec-2006  yamt sync with head.
 1.6.12.1  21-Jun-2006  yamt sync with head.
 1.7.6.1  22-Apr-2006  simonb Sync with head.
 1.7.4.1  09-Sep-2006  rpaulo sync with head
 1.7.2.1  01-Mar-2006  yamt sync with head.
 1.8.10.1  13-Jul-2006  gdamore Merge from HEAD.
 1.8.2.1  11-Aug-2006  yamt sync with head
 1.9.50.1  08-Jan-2008  bouyer Sync with HEAD
 1.9.42.1  18-Feb-2008  mjf Sync with HEAD.
 1.9.36.1  09-Jan-2008  matt sync with HEAD
 1.9.34.1  20-Jan-2008  chris Sync to HEAD.
 1.9.30.1  28-Feb-2008  rjs Sync with HEAD.
 1.10.10.2  11-Aug-2010  yamt sync with head.
 1.10.10.1  20-Jun-2009  yamt sync with head
 1.11.2.1  30-Apr-2010  uebayasi Sync with HEAD.
 1.12.10.2  30-Oct-2012  yamt sync with head
 1.12.10.1  17-Apr-2012  yamt sync with head
 1.13.2.1  18-Feb-2012  mrg merge to -current.
 1.15.6.3  03-Dec-2017  jdolecek update from HEAD
 1.15.6.2  20-Aug-2014  tls Rebase to HEAD as of a few days ago.
 1.15.6.1  20-Nov-2012  tls Resync to 2012-11-19 00:00:00 UTC
 1.16.10.1  07-Apr-2014  tls Be a little more clear and consistent about harvesting entropy from devices:

1) deprecate RND_FLAG_NO_ESTIMATE

2) define RND_FLAG_COLLECT_TIME, RND_FLAG_COLLECT_VALUE

3) define RND_FLAG_ESTIMATE_TIME, RND_FLAG_ESTIMATE_VALUE

4) define RND_FLAG_DEFAULT: RND_FLAG_COLLECT_TIME|
RND_FLAG_COLLECT_VALUE|RND_FLAG_ESTIMATE_TIME

5) Make entropy harvesting from environmental sensors a little more generic
and remove it from individual sensor drivers.

6) Remove individual open-coded delta-estimators for values from a few
places in the tree (uvm, environmental drivers).

7) 0 -> RND_FLAG_DEFAULT, actually gather entropy from various drivers
that had stubbed out code, other minor cleanups.
 1.17.4.1  06-Jun-2015  skrll Sync with HEAD

RSS XML Feed