History log of /src/sys/arch/i386/pci/glxsb.c |
Revision | | Date | Author | Comments |
1.19 |
| 22-May-2022 |
riastradh | opencrypto: Make freesession callback return void.
No functional change intended: all drivers already return zero unconditionally.
|
1.18 |
| 22-May-2022 |
riastradh | glxsb(4): Prune dead branches. Assert session id validity.
|
1.17 |
| 22-May-2022 |
riastradh | glxsb(4): Return zero, not error, if we've issued crypto_done.
|
1.16 |
| 29-Jun-2020 |
riastradh | glxsb(4): Remove rijndael dependency.
This doesn't actually seem to depend on it in any way.
XXX Compile-tested only.
|
1.15 |
| 14-Jun-2020 |
riastradh | glxsb(4): Don't use prev msg's last block as IV for next msg in CBC.
This violates the security contract of the CBC construction, which requires that the IV be unpredictable in advance; an adaptive adversary can exploit this to verify plaintext guesses.
XXX Compile-tested only.
|
1.14 |
| 14-Jul-2016 |
msaitoh | - Use aprint*() more in xxx_attach(). - Add missing aprint_naive("\n"). - Remove extra spaces and tabs. - KNF.
|
1.13 |
| 13-Apr-2015 |
riastradh | Need <sys/rndsource.h>, not <sys/cprng.h>, for rnd source stuff.
|
1.12 |
| 10-Aug-2014 |
tls | branches: 1.12.4; Merge tls-earlyentropy branch into HEAD.
|
1.11 |
| 04-Apr-2014 |
christos | branches: 1.11.2; PR/48701: Timo Buhrmester: spurious messages while booting silently (gpio, glxsb); use aprint_normal() >Category: kern >Synopsis: spurious messages while booting silently (gpio, glxsb) >Confidential: no >Severity: non-critical >Priority: medium >Responsible: kern-bug-people >State: open >Class: sw-bug >Submitter-Id: net
|
1.10 |
| 19-Nov-2011 |
tls | branches: 1.10.8; 1.10.12; First step of random number subsystem rework described in <20111022023242.BA26F14A158@mail.netbsd.org>. This change includes the following:
An initial cleanup and minor reorganization of the entropy pool code in sys/dev/rnd.c and sys/dev/rndpool.c. Several bugs are fixed. Some effort is made to accumulate entropy more quickly at boot time.
A generic interface, "rndsink", is added, for stream generators to request that they be re-keyed with good quality entropy from the pool as soon as it is available.
The arc4random()/arc4randbytes() implementation in libkern is adjusted to use the rndsink interface for rekeying, which helps address the problem of low-quality keys at boot time.
An implementation of the FIPS 140-2 statistical tests for random number generator quality is provided (libkern/rngtest.c). This is based on Greg Rose's implementation from Qualcomm.
A new random stream generator, nist_ctr_drbg, is provided. It is based on an implementation of the NIST SP800-90 CTR_DRBG by Henric Jungheim. This generator users AES in a modified counter mode to generate a backtracking-resistant random stream.
An abstraction layer, "cprng", is provided for in-kernel consumers of randomness. The arc4random/arc4randbytes API is deprecated for in-kernel use. It is replaced by "cprng_strong". The current cprng_fast implementation wraps the existing arc4random implementation. The current cprng_strong implementation wraps the new CTR_DRBG implementation. Both interfaces are rekeyed from the entropy pool automatically at intervals justifiable from best current cryptographic practice.
In some quick tests, cprng_fast() is about the same speed as the old arc4randbytes(), and cprng_strong() is about 20% faster than rnd_extract_data(). Performance is expected to improve.
The AES code in src/crypto/rijndael is no longer an optional kernel component, as it is required by cprng_strong, which is not an optional kernel component.
The entropy pool output is subjected to the rngtest tests at startup time; if it fails, the system will reboot. There is approximately a 3/10000 chance of a false positive from these tests. Entropy pool _input_ from hardware random numbers is subjected to the rngtest tests at attach time, as well as the FIPS continuous-output test, to detect bad or stuck hardware RNGs; if any are detected, they are detached, but the system continues to run.
A problem with rndctl(8) is fixed -- datastructures with pointers in arrays are no longer passed to userspace (this was not a security problem, but rather a major issue for compat32). A new kernel will require a new rndctl.
The sysctl kern.arandom() and kern.urandom() nodes are hooked up to the new generators, but the /dev/*random pseudodevices are not, yet.
Manual pages for the new kernel interfaces are forthcoming.
|
1.9 |
| 16-May-2009 |
cegger | branches: 1.9.12; KNF, same object code generated.
|
1.8 |
| 18-Mar-2009 |
cegger | bcopy -> memcpy
|
1.7 |
| 18-Mar-2009 |
cegger | bzero -> memset
|
1.6 |
| 05-May-2008 |
xtraeme | branches: 1.6.8; 1.6.14; device_t/softc split and other related cosmetic changes.
|
1.5 |
| 04-Apr-2008 |
cegger | branches: 1.5.2; 1.5.4; use aprint_*_dev and device_xname OK joerg
|
1.4 |
| 04-Jan-2008 |
ad | branches: 1.4.6; Start detangling lock.h from intr.h. This is likely to cause short term breakage, but the mess of dependencies has been regularly breaking the build recently anyhow.
|
1.3 |
| 11-Dec-2007 |
lukem | use __KERNEL_RCSID()
|
1.2 |
| 09-Jul-2007 |
ad | branches: 1.2.2; 1.2.4; 1.2.14; 1.2.16; 1.2.18; 1.2.24; 1.2.26; 1.2.28; 1.2.30; Merge some of the less invasive changes from the vmlocking branch:
- kthread, callout, devsw API changes - select()/poll() improvements - miscellaneous MT safety improvements
|
1.1 |
| 15-Jun-2007 |
jmcneill | branches: 1.1.2; Import driver for the AMD Geode LX AES Security Block, from OpenBSD. The glxsb(4) driver provides random numbers and AES acceleration.
|
1.1.2.2 |
| 19-Jun-2007 |
liamjfoy | Pull up following revision(s) (requested by riz in ticket #734): sys/arch/i386/pci/glxsb.c: revision 1.1 sys/arch/i386/conf/GENERIC: revision 1.833 share/man/man4/man4.i386/glxsb.4: revision 1.1 sys/arch/i386/conf/ALL: revision 1.104 share/man/man4/man4.i386/Makefile: revision 1.66 sys/arch/i386/conf/files.i386: revision 1.309 distrib/sets/lists/man/mi: revision 1.1007 Import driver for the AMD Geode LX AES Security Block, from OpenBSD. The glxsb(4) driver provides random numbers and AES acceleration. Add man page for AMD Geode LX AES Security Block driver. Enable glxsb(4)
|
1.1.2.1 |
| 15-Jun-2007 |
liamjfoy | file glxsb.c was added on branch netbsd-4 on 2007-06-19 09:26:30 +0000
|
1.2.30.2 |
| 08-Jan-2008 |
bouyer | Sync with HEAD
|
1.2.30.1 |
| 13-Dec-2007 |
bouyer | Sync with HEAD
|
1.2.28.1 |
| 11-Dec-2007 |
yamt | sync with head.
|
1.2.26.1 |
| 26-Dec-2007 |
ad | Sync with head.
|
1.2.24.1 |
| 18-Feb-2008 |
mjf | Sync with HEAD.
|
1.2.18.3 |
| 21-Jan-2008 |
yamt | sync with head
|
1.2.18.2 |
| 03-Sep-2007 |
yamt | sync with head.
|
1.2.18.1 |
| 09-Jul-2007 |
yamt | file glxsb.c was added on branch yamt-lazymbuf on 2007-09-03 14:26:52 +0000
|
1.2.16.2 |
| 03-Sep-2007 |
wrstuden | Sync w/ NetBSD-4-RC_1
|
1.2.16.1 |
| 09-Jul-2007 |
wrstuden | file glxsb.c was added on branch wrstuden-fixsa on 2007-09-03 07:03:35 +0000
|
1.2.14.1 |
| 09-Jan-2008 |
matt | sync with HEAD
|
1.2.4.2 |
| 15-Jul-2007 |
ad | Sync with head.
|
1.2.4.1 |
| 09-Jul-2007 |
ad | file glxsb.c was added on branch vmlocking on 2007-07-15 13:21:04 +0000
|
1.2.2.2 |
| 11-Jul-2007 |
mjf | Sync with head.
|
1.2.2.1 |
| 09-Jul-2007 |
mjf | file glxsb.c was added on branch mjf-ufs-trans on 2007-07-11 20:00:12 +0000
|
1.4.6.1 |
| 02-Jun-2008 |
mjf | Sync with HEAD.
|
1.5.4.3 |
| 20-Jun-2009 |
yamt | sync with head
|
1.5.4.2 |
| 04-May-2009 |
yamt | sync with head.
|
1.5.4.1 |
| 16-May-2008 |
yamt | sync with head.
|
1.5.2.1 |
| 18-May-2008 |
yamt | sync with head.
|
1.6.14.3 |
| 01-Nov-2009 |
jym | Sync with HEAD.
|
1.6.14.2 |
| 31-May-2009 |
jym | Sync with HEAD.
|
1.6.14.1 |
| 13-May-2009 |
jym | Sync with HEAD.
Commit is split, to avoid a "too many arguments" protocol error.
|
1.6.8.1 |
| 28-Apr-2009 |
skrll | Sync with HEAD.
|
1.9.12.2 |
| 22-May-2014 |
yamt | sync with head.
for a reference, the tree before this commit was tagged as yamt-pagecache-tag8.
this commit was splitted into small chunks to avoid a limitation of cvs. ("Protocol error: too many arguments")
|
1.9.12.1 |
| 17-Apr-2012 |
yamt | sync with head
|
1.10.12.1 |
| 18-May-2014 |
rmind | sync with head
|
1.10.8.2 |
| 03-Dec-2017 |
jdolecek | update from HEAD
|
1.10.8.1 |
| 20-Aug-2014 |
tls | Rebase to HEAD as of a few days ago.
|
1.11.2.1 |
| 07-Apr-2014 |
tls | Be a little more clear and consistent about harvesting entropy from devices:
1) deprecate RND_FLAG_NO_ESTIMATE
2) define RND_FLAG_COLLECT_TIME, RND_FLAG_COLLECT_VALUE
3) define RND_FLAG_ESTIMATE_TIME, RND_FLAG_ESTIMATE_VALUE
4) define RND_FLAG_DEFAULT: RND_FLAG_COLLECT_TIME| RND_FLAG_COLLECT_VALUE|RND_FLAG_ESTIMATE_TIME
5) Make entropy harvesting from environmental sensors a little more generic and remove it from individual sensor drivers.
6) Remove individual open-coded delta-estimators for values from a few places in the tree (uvm, environmental drivers).
7) 0 -> RND_FLAG_DEFAULT, actually gather entropy from various drivers that had stubbed out code, other minor cleanups.
|
1.12.4.2 |
| 05-Oct-2016 |
skrll | Sync with HEAD
|
1.12.4.1 |
| 06-Jun-2015 |
skrll | Sync with HEAD
|