Re: [v2] RANDOM: ATH9K RNG delivers zero bits of entropy

2016-09-27 Thread Stephan Mueller
Am Dienstag, 27. September 2016, 16:44:16 CEST schrieb Kalle Valo: Hi Kalle, > Stephan Mueller <smuel...@chronox.de> wrote: > > The ATH9K driver implements an RNG which is completely bypassing the > > standard Linux HW generator logic. > > > > The RNG may or may

Re: [PATCH 2/2] ath9k: disable RNG by default

2016-08-10 Thread Stephan Mueller
Am Mittwoch, 10. August 2016, 07:15:49 CEST schrieb Pan, Miaoqing: Hi Miaoqing, > Hi Stephan, > > NIST SP 800-22-rev1a and NIST SP 800-90B are used together to evaluate the > amount of min entropy the source provides, and not to decide if the source > has passed the tests or failed. See > >

Re: [PATCH 2/2] ath9k: disable RNG by default

2016-08-10 Thread Stephan Mueller
Am Mittwoch, 10. August 2016, 06:46:31 CEST schrieb Pan, Miaoqing: Hi Miaoqing, > Hi Stephan, > > Would you please provide a recent NIST document which asks the entropy > source to pass the NIST randomness tests ? See FIPS 140-2 IG 7.15 which explicitly references SP800-22. Ciao Stephan -- To

Re: [PATCH 2/2] ath9k: disable RNG by default

2016-08-10 Thread Stephan Mueller
Am Mittwoch, 10. August 2016, 06:04:32 CEST schrieb Pan, Miaoqing: Hi Miaoqing, > Hi Stephan, > > FIPS RNG test is supposed to be run on the output of an RNG, and not on the > RNG entropy source. It is not surprising that the RNG input fails the > entropy tests from NIST. Check the following

Re: [PATCH 2/2] ath9k: disable RNG by default

2016-08-09 Thread Stephan Mueller
Am Dienstag, 9. August 2016, 17:56:57 CEST schrieb Herbert Xu: Hi Herbert, > On Tue, Aug 09, 2016 at 11:56:08AM +0200, Stephan Mueller wrote: > > Am Dienstag, 9. August 2016, 17:46:56 CEST schrieb Herbert Xu: > > > > Hi Herbert, > > > > > You're suppos

Re: [PATCH 2/2] ath9k: disable RNG by default

2016-08-09 Thread Stephan Mueller
Am Dienstag, 9. August 2016, 17:46:56 CEST schrieb Herbert Xu: Hi Herbert, > > You're supposed to tweak the quality of the input. In any case, How is that tweak supposed to happen? The rngd does not allow changing the amount of read data relative to the assumed entropy. > this is not

Re: [PATCH 2/2] ath9k: disable RNG by default

2016-08-09 Thread Stephan Mueller
Am Dienstag, 9. August 2016, 17:17:55 CEST schrieb Herbert Xu: Hi Herbert, > On Tue, Aug 09, 2016 at 11:02:58AM +0200, Stephan Mueller wrote: > > But shouldn't the default of the rngd then be adjusted a bit? > > Please elaborate. in rngd_linux.c:random_add_entropy(void *b

Re: [PATCH 2/2] ath9k: disable RNG by default

2016-08-09 Thread Stephan Mueller
Am Dienstag, 9. August 2016, 16:58:58 CEST schrieb Herbert Xu: Hi Herbert, > On Tue, Aug 09, 2016 at 10:07:29AM +0200, Stephan Mueller wrote: > > Herbert, Matt, should such noise sources be added to the HW random > > framework? The thing is that the in-kernel HW random to input_po

Re: [PATCH 2/2] ath9k: disable RNG by default

2016-08-09 Thread Stephan Mueller
Am Dienstag, 9. August 2016, 07:35:33 CEST schrieb Pan, Miaoqing: Hi Miaoqing, Herbert, Matt, > Hi Stephan, > > So your suggestion is to use HW Random framework ? Actually, which was > done by the commit 6301566e0b2d ("ath9k: export HW random number > generator"), but it was reverted, you can

Re: [PATCH 2/2] ath9k: disable RNG by default

2016-08-09 Thread Stephan Mueller
> it if the system without HW RNG, especially on embedded systems. > > Signed-off-by: Miaoqing Pan <miaoq...@codeaurora.org> As a short term solution: Acked-by: Stephan Mueller <smuel...@chronox.de> But as Jason outlined, there should be nothing that prevents using this code with

Re: [PATCH v2] RANDOM: ATH9K RNG delivers zero bits of entropy

2016-08-08 Thread Stephan Mueller
e help and offer another solution. > > -- > Miaoqing > > -----Original Message- > From: Stephan Mueller [mailto:smuel...@chronox.de] > Sent: Sunday, August 07, 2016 5:36 PM > To: Ted Tso <ty...@mit.edu> > Cc: herb...@gondor.apana.org.au; linux-ker...@vger.kernel.o

Re: [RFC][PATCH] RANDOM: ATH9K RNG delivers zero bits of entropy

2016-08-06 Thread Stephan Mueller
Am Samstag, 6. August 2016, 19:45:51 CEST schrieb Jason Cooper: Hi Jason, > Hi Stephan, > > On Fri, Aug 05, 2016 at 05:08:14PM +0200, Stephan Mueller wrote: > > Hi Ted, Herbert, > > > > I sent a question to the ATH9K RNG some time ago to the developers. > > See

[RFC][PATCH] RANDOM: ATH9K RNG delivers zero bits of entropy

2016-08-05 Thread Stephan Mueller
ata into the input_pool but it is assumed to have no entropy. When the ATH9K RNG changes to use the HW RNG framework, it may re-enable the entropy estimation considering that a user can change that value at boot and runtime. Signed-off-by: Stephan Mueller <smuel...@chronox.de> --- drivers/net/wireless/

Re: [PATCH 2/2] ath9k: export HW random number generator

2015-07-29 Thread Stephan Mueller
Am Dienstag, 28. Juli 2015, 13:41:57 schrieb Sandy Harris: Hi Sandy, However, the hwrandom framework does not provide any conditioning logic. At first sight, this sounds like a blunder to me, but I have not looked at hwrandom at all. Is there a rationale? I think hwrandom is solely a

Re: [PATCH 2/2] ath9k: export HW random number generator

2015-07-27 Thread Stephan Mueller
Am Montag, 27. Juli 2015, 12:45:29 schrieb Oleksij Rempel: Hi Oleksij, Am 27.07.2015 um 08:50 schrieb Pan, Miaoqing: “fips_run_rng_test” is legacy code, recommend to disable 'FIPS 140-2' test if to use 'rngd-tools’. Ok, lets try simple compression. will it find enough pattern to do

Re: [PATCH 7/7] mac80211: Switch to new AEAD interface

2015-06-01 Thread Stephan Mueller
Am Montag, 1. Juni 2015, 16:35:26 schrieb Johannes Berg: Hi Johannes, IOW, I think something like this would make sense: That looks definitely cleaner :-) Though, my main concern was just to ensure that the aad length value is not zero. Ciao Stephan -- To unsubscribe from this list: send