summaryrefslogtreecommitdiff
path: root/crypto/sha3_generic.c
diff options
context:
space:
mode:
authorLinus Torvalds <torvalds@linux-foundation.org>2016-07-27 15:11:55 -0700
committerLinus Torvalds <torvalds@linux-foundation.org>2016-07-27 15:11:55 -0700
commitb5f78888643350aad0ca8e5c77216ecc5ba7be05 (patch)
treec9427bb3d096b34940cd1a3e18fc37fc976fb703 /crypto/sha3_generic.c
parent0b9bad208db83040622b1a7d7a5fa25b6bb03e6e (diff)
parent63f4f35c018d68be4b791122d18095998c883c71 (diff)
downloadlinux-crypto-b5f78888643350aad0ca8e5c77216ecc5ba7be05.tar.gz
linux-crypto-b5f78888643350aad0ca8e5c77216ecc5ba7be05.zip
Merge tag 'random_for_linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tytso/random
Pull random driver updates from Ted Ts'o: "A number of improvements for the /dev/random driver; the most important is the use of a ChaCha20-based CRNG for /dev/urandom, which is faster, more efficient, and easier to make scalable for silly/abusive userspace programs that want to read from /dev/urandom in a tight loop on NUMA systems. This set of patches also improves entropy gathering on VM's running on Microsoft Azure, and will take advantage of a hw random number generator (if present) to initialize the /dev/urandom pool" (It turns out that the random tree hadn't been in linux-next this time around, because it had been dropped earlier as being too quiet. Oh well). * tag 'random_for_linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tytso/random: random: strengthen input validation for RNDADDTOENTCNT random: add backtracking protection to the CRNG random: make /dev/urandom scalable for silly userspace programs random: replace non-blocking pool with a Chacha20-based CRNG random: properly align get_random_int_hash random: add interrupt callback to VMBus IRQ handler random: print a warning for the first ten uninitialized random users random: initialize the non-blocking pool via add_hwgenerator_randomness()
Diffstat (limited to 'crypto/sha3_generic.c')
0 files changed, 0 insertions, 0 deletions