TJEC and AES128-CTR-DRBG random source#52
Merged
oberrow merged 6 commits intoOBOS-dev:masterfrom Jan 9, 2026
Merged
Conversation
Collaborator
|
After a quick read, this looks fine. My only comment is that if you added new kernel command line options, is that you should add them to the usage message in cmdline.c |
oberrow
requested changes
Jan 8, 2026
oberrow
reviewed
Jan 9, 2026
Collaborator
|
Merged. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This Pull Request replaces the Mersenne Twister random source for a better combination of Time Jitter Entropy Collector in conjunction with AES128 in Counter mode as a Deterministic Random Bit Generator.
The following options are added
tjec-random-access: Makes the underlying memory accessing randomized using a xoshiro128** prng.tjec-max-memory-size=<byte count>: Allows the TJEC-Memory to be at most byte count bytes rounded up to nearest power of two.tjec-no-fips: Makes TJEC only retrieve 256 bits of potential entropy per 256 bits generated.tjec-no-lag-predictor: Disables the LAG Predictor health check.tjec-max-acc-loop-bits=<1-8>: Specifies a maximum number of random additional memory accesses to make in 2^k, default is 7 or 128.tjec-max-hash-loop-bits=<1-8>: Specifies a maximum number of random additional hash iterations to make in 2^k, default is 3 or 8.tjec-osr=<1-255>: Specifies the over sampling ratio, i.e. how many multiples of 256 bits of potential entropy to collect per 256 bits generated.