]> git.ipfire.org Git - thirdparty/rng-tools.git/commit
rngd_rdrand: Don't use a fixed AES key for data reduction
authorH. Peter Anvin <hpa@linux.intel.com>
Mon, 24 Feb 2014 22:01:49 +0000 (14:01 -0800)
committerH. Peter Anvin <hpa@linux.intel.com>
Wed, 26 Feb 2014 08:12:32 +0000 (00:12 -0800)
commit94f03c9a2c479bd59913e6556620c2432e43b6ee
treea10dff0ada1ac56133587d52c4f028f7b95b42a9
parent62dec321e2f6cc5de249d1396aec579729d0cf13
rngd_rdrand: Don't use a fixed AES key for data reduction

If we're going to run the data through AES anyway, there is no point
in using the same key every time.  Grab a key from /dev/urandom,
although of course it is unknown how much entropy actually *is* in
/dev/urandom at this point, it is presumably better than nothing,
which is what we have now and XOR with rdrand output.

Signed-off-by: H. Peter Anvin <hpa@linux.intel.com>
rdrand_asm.S
rngd_rdrand.c