-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
open /dev/urandom when entropy context is initialized and keep open #323
Conversation
Automatic CI verification build not done, please verify manually. |
At first glance, looks good to me. In order to accept your contribution, we'll request that you sign our contributor license agreement. Can you please get in touch with @sbutcher-arm or @pjbakker regarding the details? Thanks! |
Happy to do the CLA but I'm not sure how to get in touch (neither Sam nor Paul have their email addresses public). Either of them can contact me at the address on my profile. Thanks. |
I just sent an email to the three of you. |
|
||
int mbedtls_platform_entropy_init( void ) | ||
{ | ||
#if !defined(HAVE_GETRANDOM) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
HAVE_GETRANDOM
doesn't guarantee that getrandom
is available at runtime (we support older Linux kernel versions that some embedded devices run), so the /dev/urandom
code needs to be included regardless.
@jkarneges Thank you for your contribution! I've made a new pull request #1545 which builds on your work, fixes the case of getrandom() available at build time but not at runtime, and makes a few related improvements. |
This PR hasn't been active in a long time, and development work has been pursued in PR #1545. I am therefore closing this PR, and further work can happen there. @jkarneges - if you'd like to pick this up again, please raise a new PR or push to the other PR #1545. |
* Mbed-TLS#321: Replace config.pl by config.py * Mbed-TLS#322: Update Mbed Crypto with latest Mbed TLS changes as of 2019-11-15 * Mbed-TLS#308: Small performance improvement of mbedtls_mpi_div_mpi() * Mbed-TLS#324: test_psa_constant_names: support key agreement, better code structure * Mbed-TLS#320: Link to the PSA crypto portal page from README.md * Mbed-TLS#293: Always gather MBEDTLS_ENTROPY_BLOCK_SIZE bytes of entropy * Mbed-TLS#310: Clarify test descriptions in test_suite_memory_buffer_alloc * Mbed-TLS#307: Add ASN.1 ENUMERATED tag support * Mbed-TLS#328: Remove dependency of crypto_values.h on crypto_extra.h * Mbed-TLS#325: Rename psa_asymmetric_{sign_verify} to psa_{sign,verify}_hash * Mbed-TLS#333: Streamline PSA key type encodings: prepare * Mbed-TLS#323: Initialise return values to an error * Mbed-TLS#330: Streamline PSA key type encodings
* Mbed-TLS#333: Streamline PSA key type encodings: prepare * Mbed-TLS#323: Initialise return values to an error * Mbed-TLS#330: Streamline PSA key type encodings
In a previous submodule update: * Mbed-TLS#333: Streamline PSA key type encodings: prepare * Mbed-TLS#323: Initialise return values to an error In this submodule update: * Mbed-TLS#330: Streamline PSA key type encodings
In a previous submodule update: * Mbed-TLS#333: Streamline PSA key type encodings: prepare * Mbed-TLS#323: Initialise return values to an error In this submodule update: * Mbed-TLS#330: Streamline PSA key type encodings
Previously in d875285: * Mbed-TLS#333: Streamline PSA key type encodings: prepare * Mbed-TLS#323: Initialise return values to an error Previously in dbcb442: * Mbed-TLS#291: Test MBEDTLS_CTR_DRBG_USE_128_BIT_KEY * Mbed-TLS#334: Fix some pylint warnings Previously in ceceedb: * Mbed-TLS#348: Bump version to Mbed TLS 2.20.0 and crypto SO version to 4 * Mbed-TLS#354: Fix incrementing pointer instead of value In this commit: * Mbed-TLS#349: Fix minor defects found by Coverity * Mbed-TLS#179: Add option to build SHA-512 without SHA-384 * Mbed-TLS#330: Streamline PSA key type and curve encodings
Previously in d875285: * Mbed-TLS#333: Streamline PSA key type encodings: prepare * Mbed-TLS#323: Initialise return values to an error Previously in dbcb442: * Mbed-TLS#291: Test MBEDTLS_CTR_DRBG_USE_128_BIT_KEY * Mbed-TLS#334: Fix some pylint warnings Previously in ceceedb: * Mbed-TLS#348: Bump version to Mbed TLS 2.20.0 and crypto SO version to 4 * Mbed-TLS#354: Fix incrementing pointer instead of value In this commit: * Mbed-TLS#349: Fix minor defects found by Coverity * Mbed-TLS#179: Add option to build SHA-512 without SHA-384 * Mbed-TLS#330: Streamline PSA key type and curve encodings
Previously in d875285: * Mbed-TLS#333: Streamline PSA key type encodings: prepare * Mbed-TLS#323: Initialise return values to an error Previously in dbcb442: * Mbed-TLS#291: Test MBEDTLS_CTR_DRBG_USE_128_BIT_KEY * Mbed-TLS#334: Fix some pylint warnings Previously in ceceedb: * Mbed-TLS#348: Bump version to Mbed TLS 2.20.0 and crypto SO version to 4 * Mbed-TLS#354: Fix incrementing pointer instead of value In this commit: * Mbed-TLS#349: Fix minor defects found by Coverity * Mbed-TLS#179: Add option to build SHA-512 without SHA-384 * Mbed-TLS#327: Implement psa_hash_compute and psa_hash_compare * Mbed-TLS#330: Streamline PSA key type and curve encodings
…return-values Initialise return values to an error
…tls-cookies Add conditional compilation for mbedtls_ssl_conf_dtls_cookies
Fix rtpw invocation if srcdir != objdir
Proposed patch for #322. The user simply calls
entropy_init
before entering chroot.