diff options
author | obrien <obrien@FreeBSD.org> | 2013-08-09 15:31:50 +0000 |
---|---|---|
committer | obrien <obrien@FreeBSD.org> | 2013-08-09 15:31:50 +0000 |
commit | f65ab5c10cefbefba1cca281b8e41b7956ec6d5e (patch) | |
tree | 4744a8ad00a83dbe699947a887d8742001dae753 /sys/dev/random/yarrow.c | |
parent | e9f37cac7422f86c8a65b4c123705f5dccd43fa1 (diff) | |
download | FreeBSD-src-f65ab5c10cefbefba1cca281b8e41b7956ec6d5e.zip FreeBSD-src-f65ab5c10cefbefba1cca281b8e41b7956ec6d5e.tar.gz |
* Add random_adaptors.[ch] which is basically a store of random_adaptor's.
random_adaptor is basically an adapter that plugs in to random(4).
random_adaptor can only be plugged in to random(4) very early in bootup.
Unplugging random_adaptor from random(4) is not supported, and is probably a
bad idea anyway, due to potential loss of entropy pools.
We currently have 3 random_adaptors:
+ yarrow
+ rdrand (ivy.c)
+ nehemeiah
* Remove platform dependent logic from probe.c, and move it into
corresponding registration routines of each random_adaptor provider.
probe.c doesn't do anything other than picking a specific random_adaptor
from a list of registered ones.
* If the kernel doesn't have any random_adaptor adapters present then the
creation of /dev/random is postponed until next random_adaptor is kldload'ed.
* Fix randomdev_soft.c to refer to its own random_adaptor, instead of a
system wide one.
Submitted by: arthurmesh@gmail.com, obrien
Obtained from: Juniper Networks
Reviewed by: so (des)
Diffstat (limited to 'sys/dev/random/yarrow.c')
-rw-r--r-- | sys/dev/random/yarrow.c | 5 |
1 files changed, 3 insertions, 2 deletions
diff --git a/sys/dev/random/yarrow.c b/sys/dev/random/yarrow.c index 6f631bb..09f079a 100644 --- a/sys/dev/random/yarrow.c +++ b/sys/dev/random/yarrow.c @@ -41,6 +41,7 @@ __FBSDID("$FreeBSD$"); #include <crypto/sha2/sha2.h> #include <dev/random/hash.h> +#include <dev/random/random_adaptors.h> #include <dev/random/randomdev_soft.h> #include <dev/random/yarrow.h> @@ -101,7 +102,7 @@ random_process_event(struct harvest *event) } void -random_yarrow_init_alg(struct sysctl_ctx_list *clist, struct sysctl_oid *in_o) +random_yarrow_init_alg(struct sysctl_ctx_list *clist) { int i; struct sysctl_oid *random_yarrow_o; @@ -110,7 +111,7 @@ random_yarrow_init_alg(struct sysctl_ctx_list *clist, struct sysctl_oid *in_o) * have a very good clue about what they do! */ random_yarrow_o = SYSCTL_ADD_NODE(clist, - SYSCTL_CHILDREN(in_o), + SYSCTL_STATIC_CHILDREN(_kern_random), OID_AUTO, "yarrow", CTLFLAG_RW, 0, "Yarrow Parameters"); |