Thanks George!

The haveged project looks interesting, I'll have to check it out.

In the case anyone wants to help pick this up, these are my notes so far:

1. There are various documents that mention the HW_RNG.[1][2]

2. I've tried to configure the TRNG in kernel 3.8.13-bone26 and I did
not see Devices->Char Devices->Hardware Random (etc..)->OMAP4 Random

3. OMAP RNG appears to depend on CONFIG_HW_RANDOM && (
CONFIG_ARCH_OMAP16XX || CONFIG_ARCH_OMAP2PLUS ).[3] I believe
CONFIG_HW_RANDOM is set and CONFIG_ARCH_OMAP2PLUS was set.

4. There were some patches back in August[4] on this.  But it wasn't
clear to me whether they are in 3.8.13 or not.

I was planning on the following approach:

1. Try building the kernel to see if omap-rng builds a .o or a .ko
2. Try grabbing a later kernel to see if it's there.
3. Try applying the patches directly.
4. Re-visit my assumption that CONFIG_ARCH_OMAP2PLUS is enabled,
because then, based on the logic above, I shouldn't see the OMAP-RNG.

If I make any breakthroughs, I'll keep the list posted.  If others are
working on this, please do the same!

Josh


Footnotes:

[1] http://www.ti.com/lit/wp/spry198/spry198.pdf

[2] http://processors.wiki.ti.com/index.php/Cryptography_Users_Guide

[3] http://cateee.net/lkddb/web-lkddb/HW_RANDOM_OMAP.html

[4] http://comments.gmane.org/gmane.linux.ports.arm.omap/102520

On Tue, Oct 8, 2013 at 12:07 AM, George B <[email protected]> wrote:
> Hmm, looks like:
>
> apt-get install haveged
>
> was all I needed.  While it isn't the hwrng, it is a nice entropy generator.
>
> http://freecode.com/projects/haveged
>
>
> On Monday, October 7, 2013 10:58:55 PM UTC-7, George B wrote:
>>
>> I would be very interested in this topic as well.  The application I have
>> in mind for this BBB relies on making varying amounts of SSL connections.
>> In a test today I believe I ran the pool out of entropy and some handshakes
>> would hang for a while before completing (typical SSL handshake would take
>> about 1/2 a second but some would hang for 2 to 4 seconds before
>> completing).  Basically the performance is such that I can't use it for the
>> desired application but getting the hwrng working would likely change
>> everything.  This unit is operating "headless" with no kbd/mouse or anything
>> except network connected.  I finally did break down and installed rng-tools
>> to use /dev/urandom to seed /dev/random but I see that as basically a
>> quick/dirty workaround.  Even tried adding randomsound to add some entropy
>> but that didn't seem to make any difference.
>>
>> On Friday, October 4, 2013 11:43:14 AM UTC-7, Joshua Datko wrote:
>>>
>>> I have not yet tried to get the HWRNG working on the BBB.  According
>>> to the TI Crypto page [1], you just need to reconfigure your kernel
>>> and it should add /dev/hwrng support.  If anybody has gotten this
>>> working recently, I'd like to know :)
>>>
>>> Josh
>>>
>>> [1] http://processors.wiki.ti.com/index.php/Cryptography_Users_Guide
>>>
>>> On Fri, Oct 4, 2013 at 12:25 PM, rh_ <[email protected]> wrote:
>>> > On Fri, 4 Oct 2013 13:29:24 -0400
>>> > Przemek Klosowski
>>> > <[email protected]> wrote:
>>>
> --
> For more options, visit http://beagleboard.org/discuss
> ---
> You received this message because you are subscribed to a topic in the
> Google Groups "BeagleBoard" group.
> To unsubscribe from this topic, visit
> https://groups.google.com/d/topic/beagleboard/ZFrCs9ZHCP4/unsubscribe.
> To unsubscribe from this group and all its topics, send an email to
> [email protected].
> For more options, visit https://groups.google.com/groups/opt_out.

-- 
For more options, visit http://beagleboard.org/discuss
--- 
You received this message because you are subscribed to the Google Groups 
"BeagleBoard" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/groups/opt_out.

Reply via email to