Re: use of add_interrupt_randomness in drivers missing in many drivers

From: David Wagner (daw@mozart.cs.berkeley.edu)
Date: Wed Oct 18 2000 - 15:29:33 EST


Jeff Garzik wrote:
>Then you make your local random pool vulnerable to external
>manipulation, to a certain extent...

Adding more bits to the pool should never hurt; the cryptographic
mixing ensures this. What _can_ hurt is adding predictable bits but
(erroneously) bumping up the entropy counter.

So, if you're not sure whether those bits are unpredictable and random
or not, the right thing to do is to mix 'em into the pool, but don't
bump the entropy counter. The greater your diversity of sources, the
less likely it is that you encounter a catastrophic randomness failure.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
Please read the FAQ at http://www.tux.org/lkml/



This archive was generated by hypermail 2b29 : Mon Oct 23 2000 - 21:00:13 EST