commit | 94f03c9a2c479bd59913e6556620c2432e43b6ee | [log] [tgz] |
---|---|---|
author | H. Peter Anvin <hpa@linux.intel.com> | Mon Feb 24 14:01:49 2014 -0800 |
committer | H. Peter Anvin <hpa@linux.intel.com> | Wed Feb 26 00:12:32 2014 -0800 |
tree | a10dff0ada1ac56133587d52c4f028f7b95b42a9 | |
parent | 62dec321e2f6cc5de249d1396aec579729d0cf13 [diff] |
rngd_rdrand: Don't use a fixed AES key for data reduction If we're going to run the data through AES anyway, there is no point in using the same key every time. Grab a key from /dev/urandom, although of course it is unknown how much entropy actually *is* in /dev/urandom at this point, it is presumably better than nothing, which is what we have now and XOR with rdrand output. Signed-off-by: H. Peter Anvin <hpa@linux.intel.com>