> On 10 Oct 2020, at 22:45, Conrad Meyer wrote:
>
> Author: cem
> Date: Sat Oct 10 21:45:59 2020
> New Revision: 366620
> URL: https://svnweb.freebsd.org/changeset/base/366620
>
> Log:
> Add "Fenestras X" alternative /dev/random implementation
This is a much needed improvement to the
Author: markm
Date: Tue Sep 1 08:02:12 2020
New Revision: 365028
URL: https://svnweb.freebsd.org/changeset/base/365028
Log:
Add a pointer to csprng@ for the CSPRNG driver. This is enforced anyway by
subversion.
Modified:
head/MAINTAINERS
Modified: head/MAINTAINERS
> On 21 Jun 2020, at 17:41, Hans Petter Selasky wrote:
> If you got a Master's degree in South Africa under Apartheid, to many people
> that is still symbolic.
First I've heard of it (yes, I'm South African).
> https://en.wikipedia.org/wiki/Apartheid#Education
>
> Apartheid is not very long
> On 21 Jun 2020, at 14:51, Hans Petter Selasky wrote:
>
> On 2020-06-21 15:46, Hans Petter Selasky wrote:
>> On 2020-06-21 15:45, Alexey Dokuchaev wrote:
...
-#https://en.wikipedia.org/wiki/Master_boot_record#PTE
+#https://en.wikipedia.org/wiki/Main_boot_record#PTE
>>> Wikipedia
> On 14 Dec 2019, at 08:28, Conrad Meyer wrote:
>
> Author: cem
> Date: Sat Dec 14 08:28:10 2019
> New Revision: 355747
> URL: https://svnweb.freebsd.org/changeset/base/355747
>
> Log:
> Deprecate sranddev(3) API
>
> It serves no useful purpose and wasn't as popular as its equally
Author: markm
Date: Mon Nov 26 22:45:58 2018
New Revision: 341002
URL: https://svnweb.freebsd.org/changeset/base/341002
Log:
Add dependency to allow if_muge device to be only ethernet device in
stripped-down RPI3 kernel.
Modified:
head/sys/conf/files
Modified: head/sys/conf/files
Author: markm
Date: Sun Aug 26 12:51:46 2018
New Revision: 338324
URL: https://svnweb.freebsd.org/changeset/base/338324
Log:
Remove the Yarrow PRNG algorithm option in accordance with due notice
given in random(4).
This includes updating of the relevant man pages, and no-longer-used
Author: markm
Date: Fri Aug 24 14:53:46 2018
New Revision: 338293
URL: https://svnweb.freebsd.org/changeset/base/338293
Log:
Limit the amount of "fast" entropy. We don't need nearly as much
for security, and the excess just slows things down badly.
PR: 230808
Submitted by:
Author: markm
Date: Fri Aug 24 14:53:42 2018
New Revision: 338292
URL: https://svnweb.freebsd.org/changeset/base/338292
Log:
Fix braino of mine where the reseeds would happen far too often,
making the kernel process way too busy.
PR: 230808
Submitted by: Conrad Meyer
Author: markm
Date: Thu Apr 19 20:31:52 2018
New Revision: 332791
URL: https://svnweb.freebsd.org/changeset/base/332791
Log:
Remove empty dir no longer required.
Reported by: Jung-uk Kim
Deleted:
head/sys/modules/random/
___
Author: markm
Date: Sun Apr 16 09:11:02 2017
New Revision: 317015
URL: https://svnweb.freebsd.org/changeset/base/317015
Log:
Replace the RC4 algorithm for generating in-kernel secure random
numbers with Chacha20. Keep the API, though, as that is what the
other *BSD's have done.
Use the
Author: markm
Date: Tue Jul 19 18:07:47 2016
New Revision: 303035
URL: https://svnweb.freebsd.org/changeset/base/303035
Log:
Random bit generator (RBG) driver for RPi and RPi2.
Summary:
This driver supports the following methods to trigger gathering random bits
from the hardware:
1.
Author: markm
Date: Mon Oct 5 07:41:12 2015
New Revision: 288703
URL: https://svnweb.freebsd.org/changeset/base/288703
Log:
It appears that under some circumstances, like virtualisiation, the
'rdrand' instruction may occasionally not return random numbers, in
spite of looping attempts to
Author: markm
Date: Mon Oct 5 10:45:52 2015
New Revision: 288780
URL: https://svnweb.freebsd.org/changeset/base/288780
Log:
Fix printf-like formats for KASSERT.
Submitted by: jenkins
Approved by: so (/dev/random blanket)
Modified:
head/sys/dev/random/random_harvestq.c
Modified:
Author: markm
Date: Sat Aug 22 12:59:05 2015
New Revision: 287023
URL: https://svnweb.freebsd.org/changeset/base/287023
Log:
Make the UMA harvesting go away completely if not wanted. Default to not
wanted.
Provide and document the RANDOM_ENABLE_UMA option.
Change RANDOM_FAST to
Author: markm
Date: Mon Aug 17 07:36:12 2015
New Revision: 286839
URL: https://svnweb.freebsd.org/changeset/base/286839
Log:
Add DEV_RANDOM pseudo-option and use it to include out random(4)
if desired.
Retire randomdev_none.c and introduce random_infra.c for resident
infrastructure.
Author: markm
Date: Sun Jul 19 14:34:35 2015
New Revision: 285688
URL: https://svnweb.freebsd.org/changeset/base/285688
Log:
Clean up some trailing whitespace.
Modified:
head/UPDATING
Modified: head/UPDATING
==
---
Author: markm
Date: Sun Jul 19 18:07:35 2015
New Revision: 285700
URL: https://svnweb.freebsd.org/changeset/base/285700
Log:
Fix some untidy logic. I committed the wrong local fix; please pass the
pointy hat.
Approved by:so (/dev/random blanket)
Modified:
Author: markm
Date: Sun Jul 19 16:05:23 2015
New Revision: 285690
URL: https://svnweb.freebsd.org/changeset/base/285690
Log:
Optimise the buffer-size calculation. It was possible to get one block too
many.
Approved by: so (/dev/random blanket)
Modified:
head/sys/dev/random/randomdev.c
Author: markm
Date: Sun Jul 19 16:05:30 2015
New Revision: 285692
URL: https://svnweb.freebsd.org/changeset/base/285692
Log:
Fix the read blocking so that it is interruptable and slow down the rate of
console warning spamming while blocked.
Approved by: so (/dev/random blanket)
Author: markm
Date: Sun Jul 19 16:05:34 2015
New Revision: 285693
URL: https://svnweb.freebsd.org/changeset/base/285693
Log:
Remove out-of-date comments.
Approved by:so (/dev/random blanket)
Modified:
head/sys/dev/random/fortuna.c
head/sys/dev/random/yarrow.c
Modified:
Author: markm
Date: Sun Jul 19 16:05:26 2015
New Revision: 285691
URL: https://svnweb.freebsd.org/changeset/base/285691
Log:
Clarify the intent of the RANDOM_* options.
Approved by: so (/dev/random blanket)
Modified:
head/sys/conf/NOTES
Modified: head/sys/conf/NOTES
On 15 Jul 2015, at 23:43, Adrian Chadd adrian.ch...@gmail.com wrote:
- Add harvesting of slab allocator events. This needs to be checked for
weighing down the allocator code.
Hi,
Is this really doing it upon every one of those events? eg, for each
mbuf alloc through UMA?
Only if
Author: markm
Date: Tue Jul 14 18:53:24 2015
New Revision: 285550
URL: https://svnweb.freebsd.org/changeset/base/285550
Log:
Widen the host field so that a full IPv6 address will be seen.
Modified:
head/usr.bin/w/w.c
Modified: head/usr.bin/w/w.c
Author: markm
Date: Mon Jul 13 08:38:21 2015
New Revision: 285439
URL: https://svnweb.freebsd.org/changeset/base/285439
Log:
Rework the read routines to keep the PRNG sources happy. These work
in units of crypto blocks, so must have adequate space to write.
This means needing to be careful
Author: markm
Date: Sun Jul 12 18:14:38 2015
New Revision: 285422
URL: https://svnweb.freebsd.org/changeset/base/285422
Log:
* Address review (and add a bit myself).
- Tweek man page.
- Remove all mention of RANDOM_FORTUNA. If the system owner wants YARROW or
DUMMY, they ask for it,
Author: markm
Date: Wed Jul 8 18:46:44 2015
New Revision: 285288
URL: https://svnweb.freebsd.org/changeset/base/285288
Log:
Address review.
Differential Revision: https://reviews.freebsd.org/D2924
Modified:
head/etc/rc.d/random
Modified: head/etc/rc.d/random
Author: markm
Date: Tue Jun 30 17:09:41 2015
New Revision: 284960
URL: https://svnweb.freebsd.org/changeset/base/284960
Log:
Updated random(4) boot/shutdown scripting.
Fix the man pages as well.
Differential Revision: https://reviews.freebsd.org/D2924
Approved by: so (delphij)
Author: markm
Date: Tue Jun 30 17:00:45 2015
New Revision: 284959
URL: https://svnweb.freebsd.org/changeset/base/284959
Log:
Huge cleanup of random(4) code.
* GENERAL
- Update copyright.
- Make kernel options for RANDOM_YARROW and RANDOM_DUMMY. Set
neither to ON, which means we
Author: markm
Date: Sun Jun 28 12:52:28 2015
New Revision: 284911
URL: https://svnweb.freebsd.org/changeset/base/284911
Log:
Add const to char * pointers. This breaks nothing, and means const
chars can be passed with no warnings.
Modified:
head/sys/sys/kthread.h
Modified:
Author: markm
Date: Sun Jun 28 09:44:58 2015
New Revision: 284909
URL: https://svnweb.freebsd.org/changeset/base/284909
Log:
ANSIfy the only function that uses KR definition in this file.
Modified:
head/sys/kern/kern_kthread.c
Modified: head/sys/kern/kern_kthread.c
Author: markm
Date: Sun Jun 28 10:51:08 2015
New Revision: 284910
URL: https://svnweb.freebsd.org/changeset/base/284910
Log:
Ansify another function. This is the last in the file, I hope.
Modified:
head/sys/kern/kern_kthread.c
Modified: head/sys/kern/kern_kthread.c
Author: markm
Date: Mon May 25 10:51:40 2015
New Revision: 283517
URL: https://svnweb.freebsd.org/changeset/base/283517
Log:
Unbreak build where WANT_GDB == no', as libreadline is also used by ntpdc.
Modified:
head/gnu/lib/Makefile
Modified: head/gnu/lib/Makefile
Author: markm
Date: Sun Apr 12 11:23:59 2015
New Revision: 281463
URL: https://svnweb.freebsd.org/changeset/base/281463
Log:
Fix a very minor typo.
Modified:
head/sys/sys/module.h
Modified: head/sys/sys/module.h
==
Author: markm
Date: Sat Nov 1 17:52:04 2014
New Revision: 273939
URL: https://svnweb.freebsd.org/changeset/base/273939
Log:
Remove duplicate macro settings (probably due to an SVN merge /faux pas/ on
my part.
Spotted by: DES
Approved by: DES(implicit)
Modified:
Author: markm
Date: Thu Oct 30 21:21:53 2014
New Revision: 273872
URL: https://svnweb.freebsd.org/changeset/base/273872
Log:
This is the much-discussed major upgrade to the random(4) device, known to
you all as /dev/random.
This code has had an extensive rewrite and a good series of
Author: markm
Date: Wed May 14 19:11:15 2014
New Revision: 266083
URL: http://svnweb.freebsd.org/changeset/base/266083
Log:
Give suitably-endowed ARMs a register similar to the x86 TSC register.
Here, suitably endowed means that the System Control Coprocessor
(#15) has Performance
Author: markm
Date: Sat Apr 26 13:21:28 2014
New Revision: 264969
URL: http://svnweb.freebsd.org/changeset/base/264969
Log:
Correctly set the sysctl format to Alphanumeric, rather than letting it
default.
Approved by: security-officer(des)
Modified:
Author: markm
Date: Mon Oct 14 17:43:22 2013
New Revision: 256446
URL: http://svnweb.freebsd.org/changeset/base/256446
Log:
Add needed files to the KLD random.ko.
Approved by: re (kib)
Modified:
head/sys/modules/random/Makefile
Modified: head/sys/modules/random/Makefile
Author: markm
Date: Sun Oct 13 00:10:48 2013
New Revision: 256412
URL: http://svnweb.freebsd.org/changeset/base/256412
Log:
There is an issue (not seen in our testing) where yarrow and
dummy switch priorities, and the users are left with no usable
/dev/random. The fix assigns priories to
Author: markm
Date: Sun Sep 8 16:48:03 2013
New Revision: 255391
URL: http://svnweb.freebsd.org/changeset/base/255391
Log:
Fix verbose output line; needs NL
Submitted by: Sean Bruno sean_br...@yahoo.com
Approved by: re (glebius)
Modified:
head/sys/dev/random/random_adaptors.c
Author: markm
Date: Sat Sep 7 14:15:13 2013
New Revision: 255362
URL: http://svnweb.freebsd.org/changeset/base/255362
Log:
Bring in some behind-the-scenes development, mainly By Arthur Mesh,
the rest by me.
o Namespace cleanup; the Yarrow name is now restricted to where it
really
Author: markm
Date: Sat Sep 7 22:07:36 2013
New Revision: 255379
URL: http://svnweb.freebsd.org/changeset/base/255379
Log:
Fix the build; Certain linkable symbols need to always be present.
Pass the pointy hat please.
Also unblock the software (Yarrow) generator for now. This will be
This looks like a Good Thing(™), thank you! I'm doing an implementation
of Fortuna CSPRNG, and this is going to save me a BUNCH of work!
M
On 29 Jul 2013, at 21:26, David E. O'Brien obr...@freebsd.org wrote:
Author: obrien
Date: Mon Jul 29 20:26:27 2013
New Revision: 253779
URL:
Andrey Chernov writes:
On Thu, Jan 26, 2012 at 10:13:41PM +0400, Andrey Chernov wrote:
On Thu, Jan 26, 2012 at 12:52:43PM -0500, David Schultz wrote:
Why complicate things with atomics at all? A race might result in
arc4random(9) being seeded multiple times, but that's harmless.
David Schultz writes:
Although current version with current kernel flags works, I forget
it is implementation defined in general and not always equal to
sizeof(int), f.e. with gcc --short-enums. I'll remade it with
#defines, thanx again.
Why complicate things with atomics at all? A race
Andrey Chernov writes:
The usual way round this is with a flag. Set a static, volatile
flag, defaulting off, and set it to on when the seeding has
happened. Then arc4random() can do the right thing, depending on
this flag.
Ok, what about this version, is it right? libkern/arc4rand.c is
Andrey Chernov writes:
Should be in a header file, nad _possibly_ should be volatile. If it
works without being volatile, then OK.
It was preliminary patch just to confirm/deny my understanding of your
idea.
Ah, OK - in which case you got the idea correctly!
I'll put it into header.
Andrey Chernov writes:
Look at the function random_yarrow_unblock(). Thats where yopu want to
be doing this. This function is where the random device is unblocked
once safely seeded.
Thanx for your hint, but I fear one moment using random_yarrow_unblock().
It is called under
Andrey Chernov writes:
On Mon, Jan 16, 2012 at 08:18:10PM +, David Schultz wrote:
Author: das
Date: Mon Jan 16 20:18:10 2012
New Revision: 230230
URL: http://svn.freebsd.org/changeset/base/230230
Log:
Generate a warning if the kernel's arc4random() is seeded with bogus
David O'Brien writes:
On Sat, Apr 09, 2011 at 02:02:04PM +, Mark Murray wrote:
Log:
Add SHA256/512 ($5$ and $6$) to crypt(3). Used in linux-world, doesn't
hurt us.
Would you mind if I committed this to be a more consistent with the
existing naming?
Be my guest.
M
--
Mark R V
Author: markm
Date: Sat Apr 9 13:56:29 2011
New Revision: 220496
URL: http://svn.freebsd.org/changeset/base/220496
Log:
Add SHA512 (Actually, this is Colin Percival's code for SHA256, with
relevant constants changed).
While I'm here clean up the tests and Makefile.
PR:
Author: markm
Date: Sat Apr 9 14:02:04 2011
New Revision: 220497
URL: http://svn.freebsd.org/changeset/base/220497
Log:
Add SHA256/512 ($5$ and $6$) to crypt(3). Used in linux-world, doesn't
hurt us.
PR: misc/124164
Submitted by: KIMURA Yasuhiro yasu utahime org
MFC
Author: markm
Date: Thu Nov 18 16:32:52 2010
New Revision: 215455
URL: http://svn.freebsd.org/changeset/base/215455
Log:
Do not lint code beyond necessity (with apologies to Wiliam of Ockham).
Don't lint externally maintained CDDL code, or relint the 32-bit libraries
in amd64 mode.
Author: markm
Date: Thu Nov 18 18:22:58 2010
New Revision: 215463
URL: http://svn.freebsd.org/changeset/base/215463
Log:
Fix paths for example files.
Modified:
head/contrib/ipfilter/man/ipnat.8
head/contrib/ipfilter/man/mkfilters.1
Modified: head/contrib/ipfilter/man/ipnat.8
Alexander Leidinger writes:
src/usr.sbin/mailwrapper/Makefile
What am I doing wrong?
I did not do a correct copypaste... put the result is the same.
---snip---
% grep rmail /usr/src/usr.sbin/mailwrapper
% grep rmail /usr/src/usr.sbin/mailwrapper/Makefile
My foul-up, sorry.
It
Author: markm
Date: Tue Oct 12 21:01:26 2010
New Revision: 213749
URL: http://svn.freebsd.org/changeset/base/213749
Log:
Create the /bin/rmail symlink (which mailers such as postfix
and Exim can use).
This is something I thought I committed MONTHS ago, but it appears
that I fatfingered
Mark Murray writes:
URL: http://svn.freebsd.org/changeset/base/213749
Log:
Create the /bin/rmail symlink (which mailers such as postfix
and Exim can use).
This is something I thought I committed MONTHS ago, but it appears
that I fatfingered it and made a local commit
Alexander Leidinger writes:
Can you please point out where rmail is installed when MK_SENDMAIL=no
and MK_MAILWRAPPER!=no? I can not find such a place.
src/usr.sbin/mailwrapper/Makefile
M
--
Mark R V Murray
Cert APS(Open) Dip Phys(Open) BSc Open(Open) BSc(Hons)(Open)
Pi: 132511160
Author: markm
Date: Fri Oct 8 17:42:09 2010
New Revision: 213585
URL: http://svn.freebsd.org/changeset/base/213585
Log:
Don't blow away /bin/rmail symlink if we are keeping mailwrapper.
Mailwrapper can provide a perfectly good rmail with other
mailers.
Modified:
Author: markm
Date: Fri Oct 8 20:13:12 2010
New Revision: 213609
URL: http://svn.freebsd.org/changeset/base/213609
Log:
Extend the example section a bit, for other mailers.
Modified:
head/share/man/man5/mailer.conf.5
Modified: head/share/man/man5/mailer.conf.5
Author: markm
Date: Fri Oct 8 20:17:17 2010
New Revision: 213611
URL: http://svn.freebsd.org/changeset/base/213611
Log:
Don't let the available/not available logs flap quite so badly. In the
case of a multi-interfaced host, sub-second flapping can fill up the logs
too quickly. This fixes
62 matches
Mail list logo