NetBSD/sys/crypto
tls 6e1dd068e9 Separate /dev/random pseudodevice implemenation from kernel entropy pool
implementation.  Rewrite pseudodevice code to use cprng_strong(9).

The new pseudodevice is cloning, so each caller gets bits from a stream
generated with its own key.  Users of /dev/urandom get their generators
keyed on a "best effort" basis -- the kernel will rekey generators
whenever the entropy pool hits the high water mark -- while users of
/dev/random get their generators rekeyed every time key-length bits
are output.

The underlying cprng_strong API can use AES-256 or AES-128, but we use
AES-128 because of concerns about related-key attacks on AES-256.  This
improves performance (and reduces entropy pool depletion) significantly
for users of /dev/urandom but does cause users of /dev/random to rekey
twice as often.

Also fixes various bugs (including some missing locking and a reseed-counter
overflow in the CTR_DRBG code) found while testing this.

For long reads, this generator is approximately 20 times as fast as the
old generator (dd with bs=64K yields 53MB/sec on 2Ghz Core2 instead of
2.5MB/sec) and also uses a separate mutex per instance so concurrency
is greatly improved.  For reads of typical key sizes for modern
cryptosystems (16-32 bytes) performance is about the same as the old
code: a little better for 32 bytes, a little worse for 16 bytes.
2011-12-17 20:05:38 +00:00
..
arc4
blowfish Apply const where necessary (XXX: where is bf_locl.org?) 2009-06-30 13:14:40 +00:00
camellia add "camellia" crypto code, copied from FreeBSD 2011-05-05 17:38:35 +00:00
cast128
des Remove all the __P() from sys (excluding sys/dist) 2009-03-14 14:45:51 +00:00
nist_ctr_drbg Separate /dev/random pseudodevice implemenation from kernel entropy pool 2011-12-17 20:05:38 +00:00
rijndael First step of random number subsystem rework described in 2011-11-19 22:51:18 +00:00
skipjack