summaryrefslogtreecommitdiffstats
path: root/sys/conf/files.amd64
diff options
context:
space:
mode:
authorkib <kib@FreeBSD.org>2012-09-05 13:18:51 +0000
committerkib <kib@FreeBSD.org>2012-09-05 13:18:51 +0000
commitdac91f5998c1d33695196e636176f5634af60f74 (patch)
tree4e5e06d435f26a7ff60ca89f3247cc53bec9401b /sys/conf/files.amd64
parent71dbd73468d207cc6328627d0f16d719bad326c8 (diff)
downloadFreeBSD-src-dac91f5998c1d33695196e636176f5634af60f74.zip
FreeBSD-src-dac91f5998c1d33695196e636176f5634af60f74.tar.gz
Add support for new Intel on-CPU Bull Mountain random number
generator, found on IvyBridge and supposedly later CPUs, accessible with RDRAND instruction. From the Intel whitepapers and articles about Bull Mountain, it seems that we do not need to perform post-processing of RDRAND results, like AES-encryption of the data with random IV and keys, which was done for Padlock. Intel claims that sanitization is performed in hardware. Make both Padlock and Bull Mountain random generators support code covered by kernel config options, for the benefit of people who prefer minimal kernels. Also add the tunables to disable hardware generator even if detected. Reviewed by: markm, secteam (simon) Tested by: bapt, Michael Moll <kvedulv@kvedulv.de> MFC after: 3 weeks
Diffstat (limited to 'sys/conf/files.amd64')
-rw-r--r--sys/conf/files.amd643
1 files changed, 2 insertions, 1 deletions
diff --git a/sys/conf/files.amd64 b/sys/conf/files.amd64
index 9aa61e2..374afcb 100644
--- a/sys/conf/files.amd64
+++ b/sys/conf/files.amd64
@@ -213,7 +213,8 @@ dev/lindev/lindev.c optional lindev
dev/nfe/if_nfe.c optional nfe pci
dev/nve/if_nve.c optional nve pci
dev/nvram/nvram.c optional nvram isa
-dev/random/nehemiah.c optional random
+dev/random/ivy.c optional random ivy_rng
+dev/random/nehemiah.c optional random padlock_rng
dev/qlxgb/qla_dbg.c optional qlxgb pci
dev/qlxgb/qla_hw.c optional qlxgb pci
dev/qlxgb/qla_ioctl.c optional qlxgb pci
OpenPOWER on IntegriCloud