From dac91f5998c1d33695196e636176f5634af60f74 Mon Sep 17 00:00:00 2001 From: kib Date: Wed, 5 Sep 2012 13:18:51 +0000 Subject: Add support for new Intel on-CPU Bull Mountain random number generator, found on IvyBridge and supposedly later CPUs, accessible with RDRAND instruction. From the Intel whitepapers and articles about Bull Mountain, it seems that we do not need to perform post-processing of RDRAND results, like AES-encryption of the data with random IV and keys, which was done for Padlock. Intel claims that sanitization is performed in hardware. Make both Padlock and Bull Mountain random generators support code covered by kernel config options, for the benefit of people who prefer minimal kernels. Also add the tunables to disable hardware generator even if detected. Reviewed by: markm, secteam (simon) Tested by: bapt, Michael Moll MFC after: 3 weeks --- sys/i386/conf/GENERIC | 2 ++ 1 file changed, 2 insertions(+) (limited to 'sys/i386/conf') diff --git a/sys/i386/conf/GENERIC b/sys/i386/conf/GENERIC index b542e1c..74829b8 100644 --- a/sys/i386/conf/GENERIC +++ b/sys/i386/conf/GENERIC @@ -305,6 +305,8 @@ device wpi # Intel 3945ABG wireless NICs. # Pseudo devices. device loop # Network loopback device random # Entropy device +options PADLOCK_RNG # VIA Padlock RNG +options IVY_RNG # Intel Bull Mountain RNG device ether # Ethernet support device vlan # 802.1Q VLAN support device tun # Packet tunnel. -- cgit v1.1