On 11/08/16 08:28, Kees Cook wrote:
> From: Emese Revfy
>
> When "ram_latent_entropy" is passed on the kernel command line, entropy
> will be extracted from up to the first 4GB of RAM while the runtime memory
> allocator is being initialized. This entropy isn't cryptographically
> secure, but d
On 08/10/2016 03:28 PM, Kees Cook wrote:
> + if (ram_latent_entropy && !PageHighMem(page) &&
> + page_to_pfn(page) < 0x10) {
> + u64 hash = 0;
> + size_t index, end = PAGE_SIZE * nr_pages / sizeof(hash);
> + const u64 *data = lowmem_page_addre
From: Emese Revfy
When "ram_latent_entropy" is passed on the kernel command line, entropy
will be extracted from up to the first 4GB of RAM while the runtime memory
allocator is being initialized. This entropy isn't cryptographically
secure, but does help provide additional unpredictability on ot
3 matches
Mail list logo