diff options
author | obrien <obrien@FreeBSD.org> | 2013-08-09 15:31:50 +0000 |
---|---|---|
committer | obrien <obrien@FreeBSD.org> | 2013-08-09 15:31:50 +0000 |
commit | f65ab5c10cefbefba1cca281b8e41b7956ec6d5e (patch) | |
tree | 4744a8ad00a83dbe699947a887d8742001dae753 /share/man | |
parent | e9f37cac7422f86c8a65b4c123705f5dccd43fa1 (diff) | |
download | FreeBSD-src-f65ab5c10cefbefba1cca281b8e41b7956ec6d5e.zip FreeBSD-src-f65ab5c10cefbefba1cca281b8e41b7956ec6d5e.tar.gz |
* Add random_adaptors.[ch] which is basically a store of random_adaptor's.
random_adaptor is basically an adapter that plugs in to random(4).
random_adaptor can only be plugged in to random(4) very early in bootup.
Unplugging random_adaptor from random(4) is not supported, and is probably a
bad idea anyway, due to potential loss of entropy pools.
We currently have 3 random_adaptors:
+ yarrow
+ rdrand (ivy.c)
+ nehemeiah
* Remove platform dependent logic from probe.c, and move it into
corresponding registration routines of each random_adaptor provider.
probe.c doesn't do anything other than picking a specific random_adaptor
from a list of registered ones.
* If the kernel doesn't have any random_adaptor adapters present then the
creation of /dev/random is postponed until next random_adaptor is kldload'ed.
* Fix randomdev_soft.c to refer to its own random_adaptor, instead of a
system wide one.
Submitted by: arthurmesh@gmail.com, obrien
Obtained from: Juniper Networks
Reviewed by: so (des)
Diffstat (limited to 'share/man')
-rw-r--r-- | share/man/man4/random.4 | 14 |
1 files changed, 12 insertions, 2 deletions
diff --git a/share/man/man4/random.4 b/share/man/man4/random.4 index e2809f4..5e73bc0 100644 --- a/share/man/man4/random.4 +++ b/share/man/man4/random.4 @@ -23,7 +23,7 @@ .\" .\" $FreeBSD$ .\" -.Dd September 7, 2012 +.Dd August 7, 2013 .Dt RANDOM 4 .Os .Sh NAME @@ -43,6 +43,13 @@ The device will probe for certain hardware entropy sources, and use these in preference to the fallback, which is a generator implemented in software. +If the kernel environment MIB's +.Va hw.nehemiah_rng_enable +or +.Va hw.ivy_rng_enable +are set to +.Dq Li 0 , +the associated hardware entropy source will be ignored. .Pp If the device is using the software generator, @@ -74,6 +81,7 @@ device, use the command line: .Pp which results in something like: .Bd -literal -offset indent +kern.random.adaptors: yarrow kern.random.sys.seeded: 1 kern.random.sys.harvest.ethernet: 1 kern.random.sys.harvest.point_to_point: 1 @@ -89,7 +97,9 @@ kern.random.yarrow.slowoverthresh: 2 (These would not be seen if a hardware generator is present.) .Pp -All settings are read/write. +Other than +.Dl kern.random.adaptors +all settings are read/write. .Pp The .Va kern.random.sys.seeded |