[PATCH 7/22] /dev/random: simplify reseed logic

From: Matt Mackall
Date: Thu Mar 25 2004 - 20:28:09 EST



/dev/random simplify reseed logic

Automatically reseed from input pool when pulling from output pools.


tiny-mpm/drivers/char/random.c | 20 ++++++--------------
1 files changed, 6 insertions(+), 14 deletions(-)

diff -puN drivers/char/random.c~kill-extract-secondary drivers/char/random.c
--- tiny/drivers/char/random.c~kill-extract-secondary 2004-03-20 13:38:20.000000000 -0600
+++ tiny-mpm/drivers/char/random.c 2004-03-20 13:38:20.000000000 -0600
@@ -1259,8 +1259,7 @@ static void MD5Transform(__u32 buf[HASH_
*********************************************************************/

#define EXTRACT_ENTROPY_USER 1
-#define EXTRACT_ENTROPY_SECONDARY 2
-#define EXTRACT_ENTROPY_LIMIT 4
+#define EXTRACT_ENTROPY_LIMIT 2
#define TMP_BUF_SIZE (HASH_BUFFER_SIZE + HASH_EXTRA_SIZE)
#define SEC_XFER_SIZE (TMP_BUF_SIZE*4)

@@ -1298,10 +1297,6 @@ static inline void xfer_secondary_pool(s
* number of bytes that are actually obtained. If the EXTRACT_ENTROPY_USER
* flag is given, then the buf pointer is assumed to be in user space.
*
- * If the EXTRACT_ENTROPY_SECONDARY flag is given, then we are actually
- * extracting entropy from the secondary pool, and can refill from the
- * primary pool if needed.
- *
* Note: extract_entropy() assumes that .poolwords is a multiple of 16 words.
*/
static ssize_t extract_entropy(struct entropy_store *r, void * buf,
@@ -1317,7 +1312,7 @@ static ssize_t extract_entropy(struct en
if (r->entropy_count > r->poolinfo->POOLBITS)
r->entropy_count = r->poolinfo->POOLBITS;

- if (flags & EXTRACT_ENTROPY_SECONDARY)
+ if (r != input_pool)
xfer_secondary_pool(r, nbytes, tmp);

/* Hold lock while accounting */
@@ -1418,10 +1413,9 @@ static ssize_t extract_entropy(struct en
void get_random_bytes(void *buf, int nbytes)
{
if (blocking_pool)
- extract_entropy(blocking_pool, (char *) buf, nbytes,
- EXTRACT_ENTROPY_SECONDARY);
+ extract_entropy(blocking_pool, buf, nbytes, 0);
else if (input_pool)
- extract_entropy(input_pool, (char *) buf, nbytes, 0);
+ extract_entropy(input_pool, buf, nbytes, 0);
else
printk(KERN_NOTICE "get_random_bytes called before "
"random driver initialization\n");
@@ -1541,8 +1535,7 @@ random_read(struct file * file, char * b

n = extract_entropy(blocking_pool, buf, n,
EXTRACT_ENTROPY_USER |
- EXTRACT_ENTROPY_LIMIT |
- EXTRACT_ENTROPY_SECONDARY);
+ EXTRACT_ENTROPY_LIMIT);

DEBUG_ENT("read got %d bits (%d still needed)\n",
n*8, (nbytes-n)*8);
@@ -1594,8 +1587,7 @@ urandom_read(struct file * file, char *
size_t nbytes, loff_t *ppos)
{
return extract_entropy(blocking_pool, buf, nbytes,
- EXTRACT_ENTROPY_USER |
- EXTRACT_ENTROPY_SECONDARY);
+ EXTRACT_ENTROPY_USER);
}

static unsigned int

_
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/