Chuck Lever 7f675ca775 SUNRPC: Improve Kerberos confounder generation
Other common Kerberos implementations use a fully random confounder
for encryption. The reason for this is explained in the new comment
added by this patch. The current get_random_bytes() implementation
does not exhaust system entropy.

Since confounder generation is part of Kerberos itself rather than
the GSS-API Kerberos mechanism, the function is renamed and moved.

Note that light top-down analysis shows that the SHA-1 transform
is by far the most CPU-intensive part of encryption. Thus we do not
expect this change to result in a significant performance impact.
However, eventually it might be necessary to generate an independent
stream of confounders for each Kerberos context to help improve I/O
parallelism.

Reviewed-by: Simo Sorce <simo@redhat.com>
Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
2023-02-20 09:20:34 -05:00
..
2023-01-12 17:02:20 -06:00
2022-12-13 15:47:48 -08:00
2022-12-17 14:06:53 -06:00
2023-02-08 09:07:11 +00:00
2023-02-13 09:30:14 +00:00
2022-12-13 15:47:48 -08:00
2022-12-13 15:47:48 -08:00
2022-12-16 03:54:54 -08:00
2022-08-22 14:26:30 +01:00
2022-08-22 14:26:30 +01:00