Thanks George! The haveged project looks interesting, I'll have to check it out.
In the case anyone wants to help pick this up, these are my notes so far: 1. There are various documents that mention the HW_RNG.[1][2] 2. I've tried to configure the TRNG in kernel 3.8.13-bone26 and I did not see Devices->Char Devices->Hardware Random (etc..)->OMAP4 Random 3. OMAP RNG appears to depend on CONFIG_HW_RANDOM && ( CONFIG_ARCH_OMAP16XX || CONFIG_ARCH_OMAP2PLUS ).[3] I believe CONFIG_HW_RANDOM is set and CONFIG_ARCH_OMAP2PLUS was set. 4. There were some patches back in August[4] on this. But it wasn't clear to me whether they are in 3.8.13 or not. I was planning on the following approach: 1. Try building the kernel to see if omap-rng builds a .o or a .ko 2. Try grabbing a later kernel to see if it's there. 3. Try applying the patches directly. 4. Re-visit my assumption that CONFIG_ARCH_OMAP2PLUS is enabled, because then, based on the logic above, I shouldn't see the OMAP-RNG. If I make any breakthroughs, I'll keep the list posted. If others are working on this, please do the same! Josh Footnotes: [1] http://www.ti.com/lit/wp/spry198/spry198.pdf [2] http://processors.wiki.ti.com/index.php/Cryptography_Users_Guide [3] http://cateee.net/lkddb/web-lkddb/HW_RANDOM_OMAP.html [4] http://comments.gmane.org/gmane.linux.ports.arm.omap/102520 On Tue, Oct 8, 2013 at 12:07 AM, George B <[email protected]> wrote: > Hmm, looks like: > > apt-get install haveged > > was all I needed. While it isn't the hwrng, it is a nice entropy generator. > > http://freecode.com/projects/haveged > > > On Monday, October 7, 2013 10:58:55 PM UTC-7, George B wrote: >> >> I would be very interested in this topic as well. The application I have >> in mind for this BBB relies on making varying amounts of SSL connections. >> In a test today I believe I ran the pool out of entropy and some handshakes >> would hang for a while before completing (typical SSL handshake would take >> about 1/2 a second but some would hang for 2 to 4 seconds before >> completing). Basically the performance is such that I can't use it for the >> desired application but getting the hwrng working would likely change >> everything. This unit is operating "headless" with no kbd/mouse or anything >> except network connected. I finally did break down and installed rng-tools >> to use /dev/urandom to seed /dev/random but I see that as basically a >> quick/dirty workaround. Even tried adding randomsound to add some entropy >> but that didn't seem to make any difference. >> >> On Friday, October 4, 2013 11:43:14 AM UTC-7, Joshua Datko wrote: >>> >>> I have not yet tried to get the HWRNG working on the BBB. According >>> to the TI Crypto page [1], you just need to reconfigure your kernel >>> and it should add /dev/hwrng support. If anybody has gotten this >>> working recently, I'd like to know :) >>> >>> Josh >>> >>> [1] http://processors.wiki.ti.com/index.php/Cryptography_Users_Guide >>> >>> On Fri, Oct 4, 2013 at 12:25 PM, rh_ <[email protected]> wrote: >>> > On Fri, 4 Oct 2013 13:29:24 -0400 >>> > Przemek Klosowski >>> > <[email protected]> wrote: >>> > -- > For more options, visit http://beagleboard.org/discuss > --- > You received this message because you are subscribed to a topic in the > Google Groups "BeagleBoard" group. > To unsubscribe from this topic, visit > https://groups.google.com/d/topic/beagleboard/ZFrCs9ZHCP4/unsubscribe. > To unsubscribe from this group and all its topics, send an email to > [email protected]. > For more options, visit https://groups.google.com/groups/opt_out. -- For more options, visit http://beagleboard.org/discuss --- You received this message because you are subscribed to the Google Groups "BeagleBoard" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. For more options, visit https://groups.google.com/groups/opt_out.
