• Theodore Ts'o's avatar
    random: mix in architectural randomness earlier in extract_buf() · 85a1f777
    Theodore Ts'o authored
    Previously if CPU chip had a built-in random number generator (i.e.,
    RDRAND on newer x86 chips), we mixed it in at the very end of
    extract_buf() using an XOR operation.
    
    We now mix it in right after the calculate a hash across the entire
    pool.  This has the advantage that any contribution of entropy from
    the CPU's HWRNG will get mixed back into the pool.  In addition, it
    means that if the HWRNG has any defects (either accidentally or
    maliciously introduced), this will be mitigated via the non-linear
    transform of the SHA-1 hash function before we hand out generated
    output.
    Signed-off-by: default avatar"Theodore Ts'o" <tytso@mit.edu>
    85a1f777
random.c 44.7 KB