Skip to content

Commit 908dffa

Browse files
smuellerDDherbertx
authored andcommitted
crypto: jitter - add oversampling of noise source
The output n bits can receive more than n bits of min entropy, of course, but the fixed output of the conditioning function can only asymptotically approach the output size bits of min entropy, not attain that bound. Random maps will tend to have output collisions, which reduces the creditable output entropy (that is what SP 800-90B Section 3.1.5.1.2 attempts to bound). The value "64" is justified in Appendix A.4 of the current 90C draft, and aligns with NIST's in "epsilon" definition in this document, which is that a string can be considered "full entropy" if you can bound the min entropy in each bit of output to at least 1-epsilon, where epsilon is required to be <= 2^(-32). Note, this patch causes the Jitter RNG to cut its performance in half in FIPS mode because the conditioning function of the LFSR produces 64 bits of entropy in one block. The oversampling requires that additionally 64 bits of entropy are sampled from the noise source. If the conditioner is changed, such as using SHA-256, the impact of the oversampling is only one fourth, because for the 256 bit block of the conditioner, only 64 additional bits from the noise source must be sampled. This patch is derived from the user space jitterentropy-library. Signed-off-by: Stephan Mueller <[email protected]> Reviewed-by: Simo Sorce <[email protected]> Signed-off-by: Herbert Xu <[email protected]>
1 parent 25d04a3 commit 908dffa

File tree

1 file changed

+21
-2
lines changed

1 file changed

+21
-2
lines changed

crypto/jitterentropy.c

Lines changed: 21 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -117,6 +117,22 @@ struct rand_data {
117117
#define JENT_EHEALTH 9 /* Health test failed during initialization */
118118
#define JENT_ERCT 10 /* RCT failed during initialization */
119119

120+
/*
121+
* The output n bits can receive more than n bits of min entropy, of course,
122+
* but the fixed output of the conditioning function can only asymptotically
123+
* approach the output size bits of min entropy, not attain that bound. Random
124+
* maps will tend to have output collisions, which reduces the creditable
125+
* output entropy (that is what SP 800-90B Section 3.1.5.1.2 attempts to bound).
126+
*
127+
* The value "64" is justified in Appendix A.4 of the current 90C draft,
128+
* and aligns with NIST's in "epsilon" definition in this document, which is
129+
* that a string can be considered "full entropy" if you can bound the min
130+
* entropy in each bit of output to at least 1-epsilon, where epsilon is
131+
* required to be <= 2^(-32).
132+
*/
133+
#define JENT_ENTROPY_SAFETY_FACTOR 64
134+
135+
#include <linux/fips.h>
120136
#include "jitterentropy.h"
121137

122138
/***************************************************************************
@@ -542,7 +558,10 @@ static int jent_measure_jitter(struct rand_data *ec)
542558
*/
543559
static void jent_gen_entropy(struct rand_data *ec)
544560
{
545-
unsigned int k = 0;
561+
unsigned int k = 0, safety_factor = 0;
562+
563+
if (fips_enabled)
564+
safety_factor = JENT_ENTROPY_SAFETY_FACTOR;
546565

547566
/* priming of the ->prev_time value */
548567
jent_measure_jitter(ec);
@@ -556,7 +575,7 @@ static void jent_gen_entropy(struct rand_data *ec)
556575
* We multiply the loop value with ->osr to obtain the
557576
* oversampling rate requested by the caller
558577
*/
559-
if (++k >= (DATA_SIZE_BITS * ec->osr))
578+
if (++k >= ((DATA_SIZE_BITS + safety_factor) * ec->osr))
560579
break;
561580
}
562581
}

0 commit comments

Comments
 (0)