Home | History | Annotate | Download | only in pci
History log of /src/sys/arch/i386/pci/glxsb.c
RevisionDateAuthorComments
 1.19  22-May-2022  riastradh opencrypto: Make freesession callback return void.

No functional change intended: all drivers already return zero
unconditionally.
 1.18  22-May-2022  riastradh glxsb(4): Prune dead branches. Assert session id validity.
 1.17  22-May-2022  riastradh glxsb(4): Return zero, not error, if we've issued crypto_done.
 1.16  29-Jun-2020  riastradh glxsb(4): Remove rijndael dependency.

This doesn't actually seem to depend on it in any way.

XXX Compile-tested only.
 1.15  14-Jun-2020  riastradh glxsb(4): Don't use prev msg's last block as IV for next msg in CBC.

This violates the security contract of the CBC construction, which
requires that the IV be unpredictable in advance; an adaptive adversary
can exploit this to verify plaintext guesses.

XXX Compile-tested only.
 1.14  14-Jul-2016  msaitoh - Use aprint*() more in xxx_attach().
- Add missing aprint_naive("\n").
- Remove extra spaces and tabs.
- KNF.
 1.13  13-Apr-2015  riastradh Need <sys/rndsource.h>, not <sys/cprng.h>, for rnd source stuff.
 1.12  10-Aug-2014  tls branches: 1.12.4;
Merge tls-earlyentropy branch into HEAD.
 1.11  04-Apr-2014  christos branches: 1.11.2;
PR/48701: Timo Buhrmester: spurious messages while booting silently (gpio,
glxsb); use aprint_normal()
>Category: kern
>Synopsis: spurious messages while booting silently (gpio, glxsb)
>Confidential: no
>Severity: non-critical
>Priority: medium
>Responsible: kern-bug-people
>State: open
>Class: sw-bug
>Submitter-Id: net
 1.10  19-Nov-2011  tls branches: 1.10.8; 1.10.12;
First step of random number subsystem rework described in
<20111022023242.BA26F14A158@mail.netbsd.org>. This change includes
the following:

An initial cleanup and minor reorganization of the entropy pool
code in sys/dev/rnd.c and sys/dev/rndpool.c. Several bugs are
fixed. Some effort is made to accumulate entropy more quickly at
boot time.

A generic interface, "rndsink", is added, for stream generators to
request that they be re-keyed with good quality entropy from the pool
as soon as it is available.

The arc4random()/arc4randbytes() implementation in libkern is
adjusted to use the rndsink interface for rekeying, which helps
address the problem of low-quality keys at boot time.

An implementation of the FIPS 140-2 statistical tests for random
number generator quality is provided (libkern/rngtest.c). This
is based on Greg Rose's implementation from Qualcomm.

A new random stream generator, nist_ctr_drbg, is provided. It is
based on an implementation of the NIST SP800-90 CTR_DRBG by
Henric Jungheim. This generator users AES in a modified counter
mode to generate a backtracking-resistant random stream.

An abstraction layer, "cprng", is provided for in-kernel consumers
of randomness. The arc4random/arc4randbytes API is deprecated for
in-kernel use. It is replaced by "cprng_strong". The current
cprng_fast implementation wraps the existing arc4random
implementation. The current cprng_strong implementation wraps the
new CTR_DRBG implementation. Both interfaces are rekeyed from
the entropy pool automatically at intervals justifiable from best
current cryptographic practice.

In some quick tests, cprng_fast() is about the same speed as
the old arc4randbytes(), and cprng_strong() is about 20% faster
than rnd_extract_data(). Performance is expected to improve.

The AES code in src/crypto/rijndael is no longer an optional
kernel component, as it is required by cprng_strong, which is
not an optional kernel component.

The entropy pool output is subjected to the rngtest tests at
startup time; if it fails, the system will reboot. There is
approximately a 3/10000 chance of a false positive from these
tests. Entropy pool _input_ from hardware random numbers is
subjected to the rngtest tests at attach time, as well as the
FIPS continuous-output test, to detect bad or stuck hardware
RNGs; if any are detected, they are detached, but the system
continues to run.

A problem with rndctl(8) is fixed -- datastructures with
pointers in arrays are no longer passed to userspace (this
was not a security problem, but rather a major issue for
compat32). A new kernel will require a new rndctl.

The sysctl kern.arandom() and kern.urandom() nodes are hooked
up to the new generators, but the /dev/*random pseudodevices
are not, yet.

Manual pages for the new kernel interfaces are forthcoming.
 1.9  16-May-2009  cegger branches: 1.9.12;
KNF, same object code generated.
 1.8  18-Mar-2009  cegger bcopy -> memcpy
 1.7  18-Mar-2009  cegger bzero -> memset
 1.6  05-May-2008  xtraeme branches: 1.6.8; 1.6.14;
device_t/softc split and other related cosmetic changes.
 1.5  04-Apr-2008  cegger branches: 1.5.2; 1.5.4;
use aprint_*_dev and device_xname
OK joerg
 1.4  04-Jan-2008  ad branches: 1.4.6;
Start detangling lock.h from intr.h. This is likely to cause short term
breakage, but the mess of dependencies has been regularly breaking the
build recently anyhow.
 1.3  11-Dec-2007  lukem use __KERNEL_RCSID()
 1.2  09-Jul-2007  ad branches: 1.2.2; 1.2.4; 1.2.14; 1.2.16; 1.2.18; 1.2.24; 1.2.26; 1.2.28; 1.2.30;
Merge some of the less invasive changes from the vmlocking branch:

- kthread, callout, devsw API changes
- select()/poll() improvements
- miscellaneous MT safety improvements
 1.1  15-Jun-2007  jmcneill branches: 1.1.2;
Import driver for the AMD Geode LX AES Security Block, from OpenBSD. The
glxsb(4) driver provides random numbers and AES acceleration.
 1.1.2.2  19-Jun-2007  liamjfoy Pull up following revision(s) (requested by riz in ticket #734):
sys/arch/i386/pci/glxsb.c: revision 1.1
sys/arch/i386/conf/GENERIC: revision 1.833
share/man/man4/man4.i386/glxsb.4: revision 1.1
sys/arch/i386/conf/ALL: revision 1.104
share/man/man4/man4.i386/Makefile: revision 1.66
sys/arch/i386/conf/files.i386: revision 1.309
distrib/sets/lists/man/mi: revision 1.1007
Import driver for the AMD Geode LX AES Security Block, from OpenBSD. The
glxsb(4) driver provides random numbers and AES acceleration.
Add man page for AMD Geode LX AES Security Block driver.
Enable glxsb(4)
 1.1.2.1  15-Jun-2007  liamjfoy file glxsb.c was added on branch netbsd-4 on 2007-06-19 09:26:30 +0000
 1.2.30.2  08-Jan-2008  bouyer Sync with HEAD
 1.2.30.1  13-Dec-2007  bouyer Sync with HEAD
 1.2.28.1  11-Dec-2007  yamt sync with head.
 1.2.26.1  26-Dec-2007  ad Sync with head.
 1.2.24.1  18-Feb-2008  mjf Sync with HEAD.
 1.2.18.3  21-Jan-2008  yamt sync with head
 1.2.18.2  03-Sep-2007  yamt sync with head.
 1.2.18.1  09-Jul-2007  yamt file glxsb.c was added on branch yamt-lazymbuf on 2007-09-03 14:26:52 +0000
 1.2.16.2  03-Sep-2007  wrstuden Sync w/ NetBSD-4-RC_1
 1.2.16.1  09-Jul-2007  wrstuden file glxsb.c was added on branch wrstuden-fixsa on 2007-09-03 07:03:35 +0000
 1.2.14.1  09-Jan-2008  matt sync with HEAD
 1.2.4.2  15-Jul-2007  ad Sync with head.
 1.2.4.1  09-Jul-2007  ad file glxsb.c was added on branch vmlocking on 2007-07-15 13:21:04 +0000
 1.2.2.2  11-Jul-2007  mjf Sync with head.
 1.2.2.1  09-Jul-2007  mjf file glxsb.c was added on branch mjf-ufs-trans on 2007-07-11 20:00:12 +0000
 1.4.6.1  02-Jun-2008  mjf Sync with HEAD.
 1.5.4.3  20-Jun-2009  yamt sync with head
 1.5.4.2  04-May-2009  yamt sync with head.
 1.5.4.1  16-May-2008  yamt sync with head.
 1.5.2.1  18-May-2008  yamt sync with head.
 1.6.14.3  01-Nov-2009  jym Sync with HEAD.
 1.6.14.2  31-May-2009  jym Sync with HEAD.
 1.6.14.1  13-May-2009  jym Sync with HEAD.

Commit is split, to avoid a "too many arguments" protocol error.
 1.6.8.1  28-Apr-2009  skrll Sync with HEAD.
 1.9.12.2  22-May-2014  yamt sync with head.

for a reference, the tree before this commit was tagged
as yamt-pagecache-tag8.

this commit was splitted into small chunks to avoid
a limitation of cvs. ("Protocol error: too many arguments")
 1.9.12.1  17-Apr-2012  yamt sync with head
 1.10.12.1  18-May-2014  rmind sync with head
 1.10.8.2  03-Dec-2017  jdolecek update from HEAD
 1.10.8.1  20-Aug-2014  tls Rebase to HEAD as of a few days ago.
 1.11.2.1  07-Apr-2014  tls Be a little more clear and consistent about harvesting entropy from devices:

1) deprecate RND_FLAG_NO_ESTIMATE

2) define RND_FLAG_COLLECT_TIME, RND_FLAG_COLLECT_VALUE

3) define RND_FLAG_ESTIMATE_TIME, RND_FLAG_ESTIMATE_VALUE

4) define RND_FLAG_DEFAULT: RND_FLAG_COLLECT_TIME|
RND_FLAG_COLLECT_VALUE|RND_FLAG_ESTIMATE_TIME

5) Make entropy harvesting from environmental sensors a little more generic
and remove it from individual sensor drivers.

6) Remove individual open-coded delta-estimators for values from a few
places in the tree (uvm, environmental drivers).

7) 0 -> RND_FLAG_DEFAULT, actually gather entropy from various drivers
that had stubbed out code, other minor cleanups.
 1.12.4.2  05-Oct-2016  skrll Sync with HEAD
 1.12.4.1  06-Jun-2015  skrll Sync with HEAD

RSS XML Feed