From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-wr1-f43.google.com (mail-wr1-f43.google.com [209.85.221.43]) by sourceware.org (Postfix) with ESMTPS id 35DD43858C52 for ; Fri, 1 Apr 2022 18:01:15 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.1 sourceware.org 35DD43858C52 Received: by mail-wr1-f43.google.com with SMTP id m30so5368417wrb.1 for ; Fri, 01 Apr 2022 11:01:15 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=vLInwgokhglGKy3rwTGUAoXIbH4FIV0XZkl//42J+tw=; b=L/XC/FuDJu7AYxqGw8/TvUgN2AGN74Nd/pLfFJ6uKFSvqJW6/2wqxP/jsWew2BCAeT IruS+oGmaE4/8lsHar+j4iLwzLmukMC6u6Iq1KuPn3kpiOFzxarLGjK7JZXVQkIngFkc ++sA3KFiuvjWaDXD8ms6stJ1wosqiV1zju/ATN9/0iBaczs3f/q5ix1H05+fwn3+IK1G yCNww2ivCgLTR9rgdhlIRL7hh8Dn2H6YARzXIvGU0M5h5D3g53PWEaasMpo6DVIiw909 nA4n64LMv63DZ6Bz35K5cGm8PzdHiIe9WDZHJTj/X+h9KfEC4CY0rH45HQK49zVd08cL 08jA== X-Gm-Message-State: AOAM531xqG1sBs9g91RHaZEIoPTBbPx/kV9BCgtnqcRd/mVLPWKGJUSm tUSyvoz6mpHFSeZ2ugfSjpZ31g4Gn97ablqI98l1Kg== X-Google-Smtp-Source: ABdhPJy5qj1l2ZdtzfVEtUKhLiJ3QsBnvYBhVNCZFdquvXyUZ3TcA4LJ7JtQ2C2YUtx7atTERGbSPXaAThu3PYO6DYg= X-Received: by 2002:a5d:526d:0:b0:203:d69f:3a66 with SMTP id l13-20020a5d526d000000b00203d69f3a66mr8555582wrc.74.1648836074165; Fri, 01 Apr 2022 11:01:14 -0700 (PDT) MIME-Version: 1.0 References: <20220328220936.2724834-1-goldstein.w.n@gmail.com> <7b48ece6-392a-0850-c136-01ab751273ef@linaro.org> <72332228-093c-5186-789f-8616cfb93793@linaro.org> <0198ce75-8a8e-4355-eed1-f69dfb6f40f0@linaro.org> In-Reply-To: From: =?UTF-8?Q?Cristian_Rodr=C3=ADguez?= Date: Fri, 1 Apr 2022 15:01:03 -0300 Message-ID: Subject: Re: [PATCH v1 1/2] random-bits: Factor out entropy generating function To: Noah Goldstein Cc: "Jason A. Donenfeld" , Adhemerval Zanella , GNU C Library , Florian Weimer Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS, KAM_DMARC_STATUS, RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2, SPF_HELO_NONE, SPF_PASS, TXREP, T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.4 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on server2.sourceware.org X-BeenThere: libc-alpha@sourceware.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Libc-alpha mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 01 Apr 2022 18:01:18 -0000 On Thu, Mar 31, 2022 at 8:05 PM Noah Goldstein wrote: > AFAIK our goal is entropy more so than security. For example > if this is used to generate jiffies to stagger threads its not a security > issue in any sense, it's just not ideal for performance. In any case this should be more than fast enough for the other use cases of random_bits() .. maybe one new random_bits_fast() function foe edge cases where even this is too slow?