The entropy was evaluated by crypto expert,  the analysis report show the ADC 
with at least 10bits and up to 22 bits of min-entropy for a 32 bits value, we 
conservatively assume the min-entropy is 10 bits out of 32 bits, so that's why 
set entropy quality  to  320/1024 = 10/32.  Also we have explained in the 
commit message why can't use the HW RNG framework.

Otherwise, your patch will cause high CPU load,  as continuously read ADC data 
if entropy bits under write_wakeup_threshold.

--
Miaoqing

-----Original Message-----
From: Stephan Mueller [mailto:smuel...@chronox.de] 
Sent: Sunday, August 07, 2016 5:36 PM
To: Ted Tso <ty...@mit.edu>
Cc: herb...@gondor.apana.org.au; linux-ker...@vger.kernel.org; 
linux-crypto@vger.kernel.org; ath9k-devel <ath9k-de...@qca.qualcomm.com>; 
linux-wirel...@vger.kernel.org; ath9k-de...@lists.ath9k.org; Kalle Valo 
<kv...@codeaurora.org>; Jason Cooper <ja...@lakedaemon.net>
Subject: [PATCH v2] RANDOM: ATH9K RNG delivers zero bits of entropy

The ATH9K driver implements an RNG which is completely bypassing the standard 
Linux HW generator logic.

The RNG may or may not deliver entropy. Considering the conservative approach 
in treating entropy with respect to non-auditable sources, this patch changes 
the delivered entropy value to zero. The RNG still feeds data into the 
input_pool but it is assumed to have no entropy.

When the ATH9K RNG changes to use the HW RNG framework, it may re-enable the 
entropy estimation considering that a user can change that value at boot and 
runtime.

Reviewed-by: Jason Cooper <ja...@lakedaemon.net>
Signed-off-by: Stephan Mueller <smuel...@chronox.de>
---
 drivers/net/wireless/ath/ath9k/rng.c | 4 +---
 1 file changed, 1 insertion(+), 3 deletions(-)

diff --git a/drivers/net/wireless/ath/ath9k/rng.c 
b/drivers/net/wireless/ath/ath9k/rng.c
index d38e50f..1ed8338 100644
--- a/drivers/net/wireless/ath/ath9k/rng.c
+++ b/drivers/net/wireless/ath/ath9k/rng.c
@@ -22,7 +22,6 @@
 #include "ar9003_phy.h"
 
 #define ATH9K_RNG_BUF_SIZE     320
-#define ATH9K_RNG_ENTROPY(x)   (((x) * 8 * 320) >> 10) /* quality: 320/1024 */
 
 static int ath9k_rng_data_read(struct ath_softc *sc, u32 *buf, u32 buf_size)  
{ @@ -92,8 +91,7 @@ static int ath9k_rng_kthread(void *data)
                fail_stats = 0;
 
                /* sleep until entropy bits under write_wakeup_threshold */
-               add_hwgenerator_randomness((void *)rng_buf, bytes_read,
-                                          ATH9K_RNG_ENTROPY(bytes_read));
+               add_hwgenerator_randomness((void *)rng_buf, bytes_read, 0);
        }
 
        kfree(rng_buf);
--
2.7.4


--
To unsubscribe from this list: send the line "unsubscribe linux-crypto" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to