summaryrefslogtreecommitdiffstats
path: root/sys/dev/random/hash.h
diff options
context:
space:
mode:
authormarkm <markm@FreeBSD.org>2000-09-10 13:52:19 +0000
committermarkm <markm@FreeBSD.org>2000-09-10 13:52:19 +0000
commitbda6631159d812341f6580e946c1018370472ca5 (patch)
tree493f74f89936854101b5fafbba093a3d63291a1e /sys/dev/random/hash.h
parent87a1e517ad08a9114153b8cd936c2382a0f3d06e (diff)
downloadFreeBSD-src-bda6631159d812341f6580e946c1018370472ca5.zip
FreeBSD-src-bda6631159d812341f6580e946c1018370472ca5.tar.gz
Large upgrade to the entropy device; mainly inspired by feedback
from many folk. o The reseed process is now a kthread. With SMPng, kthreads are pre-emptive, so the annoying jerkiness of the mouse is gone. o The data structures are protected by mutexes now, not splfoo()/splx(). o The cryptographic routines are broken out into their own subroutines. this facilitates review, and possible replacement if that is ever found necessary. Thanks to: kris, green, peter, jasone, grog, jhb Forgotten to thank: You know who you are; no offense intended.
Diffstat (limited to 'sys/dev/random/hash.h')
-rw-r--r--sys/dev/random/hash.h46
1 files changed, 46 insertions, 0 deletions
diff --git a/sys/dev/random/hash.h b/sys/dev/random/hash.h
new file mode 100644
index 0000000..f210f13
--- /dev/null
+++ b/sys/dev/random/hash.h
@@ -0,0 +1,46 @@
+/*-
+ * Copyright (c) 2000 Mark R V Murray
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ * 1. Redistributions of source code must retain the above copyright
+ * notice, this list of conditions and the following disclaimer
+ * in this position and unchanged.
+ * 2. Redistributions in binary form must reproduce the above copyright
+ * notice, this list of conditions and the following disclaimer in the
+ * documentation and/or other materials provided with the distribution.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
+ * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
+ * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
+ * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
+ * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
+ * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+ * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+ * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+ * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
+ * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ *
+ * $FreeBSD$
+ */
+
+#define KEYSIZE 32 /* 32 bytes == 256 bits */
+
+struct yarrowhash { /* Big! Make static! */
+ BF_KEY hashkey; /* Data cycles through here */
+ u_char ivec[8]; /* Blowfish Internal */
+ u_char hash[KEYSIZE]; /* Repeatedly encrypted */
+};
+
+struct yarrowkey { /* Big! Make static! */
+ BF_KEY key; /* Key schedule */
+ u_char ivec[8]; /* Blowfish Internal */
+};
+
+void yarrow_hash_init(struct yarrowhash *, void *, size_t);
+void yarrow_hash_iterate(struct yarrowhash *, void *, size_t);
+void yarrow_hash_finish(struct yarrowhash *, void *);
+void yarrow_encrypt_init(struct yarrowkey *, void *, size_t);
+void yarrow_encrypt(struct yarrowkey *context, void *, void *, size_t);
OpenPOWER on IntegriCloud