2012-10-11 02:17:44 +04:00
|
|
|
/* $NetBSD: seeq8005var.h,v 1.8 2012/10/10 22:17:44 skrll Exp $ */
|
2000-09-19 00:51:14 +04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Copyright (c) 2000 Ben Harris
|
|
|
|
* Copyright (c) 1995 Mark Brinicombe
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3. All advertising materials mentioning features or use of this software
|
|
|
|
* must display the following acknowledgement:
|
|
|
|
* This product includes software developed by Mark Brinicombe.
|
|
|
|
* 4. The name of the company nor the name of the author may be used to
|
|
|
|
* endorse or promote products derived from this software without specific
|
|
|
|
* prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED
|
|
|
|
* WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
|
|
* MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
|
|
* IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
|
|
|
|
* INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
|
|
|
|
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
|
|
|
|
* SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef _SEEQ8005VAR_H_
|
|
|
|
#define _SEEQ8005VAR_H_
|
|
|
|
|
2001-03-24 23:38:41 +03:00
|
|
|
#include <net/if_media.h>
|
|
|
|
|
2001-11-07 23:01:58 +03:00
|
|
|
#include <sys/rnd.h>
|
|
|
|
|
2001-03-24 23:38:41 +03:00
|
|
|
/* Enumerate the possible cip variants */
|
|
|
|
enum seeq_variant {
|
|
|
|
SEEQ_8004, SEEQ_8005
|
|
|
|
};
|
|
|
|
|
2000-09-19 00:51:14 +04:00
|
|
|
/*
|
|
|
|
* per-line info and status
|
|
|
|
*/
|
|
|
|
|
|
|
|
struct seeq8005_softc {
|
2012-10-11 02:17:44 +04:00
|
|
|
device_t sc_dev;
|
2001-03-24 23:38:41 +03:00
|
|
|
|
2000-09-22 02:20:38 +04:00
|
|
|
/* These fields should be initialised by the board driver. */
|
2000-09-19 00:51:14 +04:00
|
|
|
bus_space_tag_t sc_iot; /* I/O base addr */
|
|
|
|
bus_space_handle_t sc_ioh;
|
2001-03-24 23:38:41 +03:00
|
|
|
|
|
|
|
int (*sc_mediachange)(struct seeq8005_softc *);
|
|
|
|
void (*sc_mediastatus)(struct seeq8005_softc *, struct ifmediareq *);
|
|
|
|
|
2000-09-22 02:20:38 +04:00
|
|
|
/* These fields are used internally by the seeq8005 driver. */
|
2000-09-19 00:51:14 +04:00
|
|
|
struct ethercom sc_ethercom; /* Ethernet common */
|
2001-03-24 23:38:41 +03:00
|
|
|
struct ifmedia sc_media; /* supported media information */
|
|
|
|
|
2000-09-19 00:51:14 +04:00
|
|
|
int sc_config1; /* Current config1 bits */
|
|
|
|
int sc_config2; /* Current config2 bits */
|
2001-03-24 23:38:41 +03:00
|
|
|
int sc_config3; /* Current config3 bits 8004 only */
|
2000-09-19 00:51:14 +04:00
|
|
|
int sc_command; /* Current command bits */
|
|
|
|
u_int sc_rx_ptr; /* Receive buffer pointer */
|
2001-03-24 23:38:41 +03:00
|
|
|
|
|
|
|
u_int sc_tx_bufs; /* Number of tx buffers */
|
|
|
|
u_int sc_tx_used; /* Number of tx buffers in use */
|
|
|
|
u_int sc_tx_cur; /* Next tx buffer to transmit */
|
|
|
|
u_int sc_tx_next; /* Next tx buffer to fill */
|
|
|
|
|
|
|
|
u_int sc_buffersize; /* Size of packet buffer */
|
|
|
|
u_int sc_tx_bufsize; /* Size of TX packet buffer */
|
|
|
|
u_int sc_rx_bufsize; /* Size of RX packet buffer */
|
|
|
|
|
|
|
|
int sc_enabled; /* Enabled state */
|
|
|
|
enum seeq_variant sc_variant; /* Chip variant */
|
2001-06-25 15:38:28 +04:00
|
|
|
int sc_flags;
|
|
|
|
#define SF_8BIT 0x01
|
First step of random number subsystem rework described in
<20111022023242.BA26F14A158@mail.netbsd.org>. This change includes
the following:
An initial cleanup and minor reorganization of the entropy pool
code in sys/dev/rnd.c and sys/dev/rndpool.c. Several bugs are
fixed. Some effort is made to accumulate entropy more quickly at
boot time.
A generic interface, "rndsink", is added, for stream generators to
request that they be re-keyed with good quality entropy from the pool
as soon as it is available.
The arc4random()/arc4randbytes() implementation in libkern is
adjusted to use the rndsink interface for rekeying, which helps
address the problem of low-quality keys at boot time.
An implementation of the FIPS 140-2 statistical tests for random
number generator quality is provided (libkern/rngtest.c). This
is based on Greg Rose's implementation from Qualcomm.
A new random stream generator, nist_ctr_drbg, is provided. It is
based on an implementation of the NIST SP800-90 CTR_DRBG by
Henric Jungheim. This generator users AES in a modified counter
mode to generate a backtracking-resistant random stream.
An abstraction layer, "cprng", is provided for in-kernel consumers
of randomness. The arc4random/arc4randbytes API is deprecated for
in-kernel use. It is replaced by "cprng_strong". The current
cprng_fast implementation wraps the existing arc4random
implementation. The current cprng_strong implementation wraps the
new CTR_DRBG implementation. Both interfaces are rekeyed from
the entropy pool automatically at intervals justifiable from best
current cryptographic practice.
In some quick tests, cprng_fast() is about the same speed as
the old arc4randbytes(), and cprng_strong() is about 20% faster
than rnd_extract_data(). Performance is expected to improve.
The AES code in src/crypto/rijndael is no longer an optional
kernel component, as it is required by cprng_strong, which is
not an optional kernel component.
The entropy pool output is subjected to the rngtest tests at
startup time; if it fails, the system will reboot. There is
approximately a 3/10000 chance of a false positive from these
tests. Entropy pool _input_ from hardware random numbers is
subjected to the rngtest tests at attach time, as well as the
FIPS continuous-output test, to detect bad or stuck hardware
RNGs; if any are detected, they are detached, but the system
continues to run.
A problem with rndctl(8) is fixed -- datastructures with
pointers in arrays are no longer passed to userspace (this
was not a security problem, but rather a major issue for
compat32). A new kernel will require a new rndctl.
The sysctl kern.arandom() and kern.urandom() nodes are hooked
up to the new generators, but the /dev/*random pseudodevices
are not, yet.
Manual pages for the new kernel interfaces are forthcoming.
2011-11-20 02:51:18 +04:00
|
|
|
krndsource_t rnd_source;
|
2000-09-19 00:51:14 +04:00
|
|
|
};
|
|
|
|
|
2001-03-24 23:38:41 +03:00
|
|
|
extern void seeq8005_attach(struct seeq8005_softc *, const u_int8_t *, int *,
|
|
|
|
int, int);
|
2000-09-19 00:51:14 +04:00
|
|
|
extern int seeq8005intr(void *);
|
|
|
|
|
|
|
|
#endif
|