Received: by 2002:a25:7ec1:0:0:0:0:0 with SMTP id z184csp2294796ybc; Wed, 20 Nov 2019 11:51:29 -0800 (PST) X-Google-Smtp-Source: APXvYqwT4AbK4GiVmz5i8+5HotarJuUYR/LOSu03WozP7+9hB6hPQiqj457kXRoFxTLM1PBccJ2u X-Received: by 2002:adf:ee92:: with SMTP id b18mr6053239wro.346.1574279488865; Wed, 20 Nov 2019 11:51:28 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1574279488; cv=none; d=google.com; s=arc-20160816; b=Cfvh7VCylMLQWws6Uo/rouS1HMKi/GMs8Sz+CZyE82kSaeFgiCRzIwxyOud52k24El sFKEkMn1Z038W54tMqawvPH4Y1tDdcnpJY3B6u5p2Tg81wcwmA9Vwe+B+fvwH6Z4EJcQ M1v8MndI8/ps3dLgO0Grf/UG+aeE6WhDPcPPo4lkVC0y1fw/q5y6ywBWgw/LPVNvQ3FK mrYM1k98LKSRjayZQU971p74g6ByvpKmdn9xEVYHFoB9CCJoyyKTsaheXETCLspoPKud OvBCiUoou4B0VzQrCdkpPnOFoj7Ai8kX/RcPYoHrfTN/F8fMeGSjZw7s7hhLquIWSt4B Stxw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:date:cc:to:from:subject:message-id; bh=L406xOC31vjx57nBrA4aeI1otqlx8dimrv4thAzRg/I=; b=goUNYpr/4C2S/Dd/gjFE0HUp+gA8Ox93v/FhhqPNVy35RloT3gve1XObT4wwQZga1q nXBI90IKUTgBKDms/TKmklzWLxBPWAgOLEvDOKH+DAWjo1lbtCVVUrLMGSfR2+bssWZs xCxVcRDV9u9hNeUpItEwVHh2eqAAYYteznTJ6aWQjGlAIhO6flXQaVJ3ZpWodLDCv0/F UeQfFCYUT4NbtDME+O+L4XovAxN5dV4ZL1M6M1O8fol2Y/+PaqQ/Y2W1hrDmgOHJnMJP P56YfgBYdTHNDexBjy80N6ePZutvMniYD4gPlFcDVGT4+ys6f07a1rmbLOGRQqz6ARrd dS5g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d20si312191edq.317.2019.11.20.11.51.04; Wed, 20 Nov 2019 11:51:28 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-crypto-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727566AbfKTTuT (ORCPT + 99 others); Wed, 20 Nov 2019 14:50:19 -0500 Received: from mx2.suse.de ([195.135.220.15]:33916 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727374AbfKTTuT (ORCPT ); Wed, 20 Nov 2019 14:50:19 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 29ACDB14A; Wed, 20 Nov 2019 19:50:16 +0000 (UTC) Message-ID: <6aaa37d2cbe91c177b7be2d7f8aa3846efe3dc34.camel@suse.de> Subject: Re: [PATCH v3 0/4] Raspberry Pi 4 HWRNG Support From: Nicolas Saenz Julienne To: Stefan Wahren , Stephen Brennan Cc: Mark Rutland , devicetree@vger.kernel.org, Florian Fainelli , Herbert Xu , Scott Branden , Greg Kroah-Hartman , Matt Mackall , linux-kernel@vger.kernel.org, Arnd Bergmann , linux-crypto@vger.kernel.org, Eric Anholt , Rob Herring , bcm-kernel-feedback-list@broadcom.com, linux-rpi-kernel@lists.infradead.org, Ray Jui , linux-arm-kernel@lists.infradead.org Date: Wed, 20 Nov 2019 20:50:14 +0100 In-Reply-To: <99554159-6abb-6ea5-aebb-57a148a59b78@gmx.net> References: <20191120031622.88949-1-stephen@brennan.io> <99554159-6abb-6ea5-aebb-57a148a59b78@gmx.net> Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="=-iQqSDeLkAUWuKqj/9yXJ" User-Agent: Evolution 3.34.1 MIME-Version: 1.0 Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org --=-iQqSDeLkAUWuKqj/9yXJ Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable On Wed, 2019-11-20 at 17:16 +0100, Stefan Wahren wrote: > Hi Stephen, >=20 > Am 20.11.19 um 04:16 schrieb Stephen Brennan: > > This patch series enables support for the HWRNG included on the Raspber= ry > > Pi 4. It is simply a rebase of Stefan's branch [1]. I went ahead and > > tested this out on a Pi 4. Prior to this patch series, attempting to u= se > > the hwrng gives: > >=20 > > $ head -c 2 /dev/hwrng > > head: /dev/hwrng: Input/output error > >=20 > > After this series, the same command gives two random bytes. >=20 > just a note: a more expressive test would be running rngtest (package > rng-tools) on this device. Just had a go at it, root@rpi4:~# rngtest -c 1000 < /dev/hwrng rngtest 2-unofficial-mt.14 Copyright (c) 2004 by Henrique de Moraes Holschuh This is free software; see the source for copying conditions. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. rngtest: starting FIPS tests... rngtest: bits received from input: 20000032 rngtest: FIPS 140-2 successes: 998 rngtest: FIPS 140-2 failures: 2 rngtest: FIPS 140-2(2001-10-10) Monobit: 0 rngtest: FIPS 140-2(2001-10-10) Poker: 1 rngtest: FIPS 140-2(2001-10-10) Runs: 0 rngtest: FIPS 140-2(2001-10-10) Long run: 1 rngtest: FIPS 140-2(2001-10-10) Continuous run: 0 rngtest: input channel speed: (min=3D1.284; avg=3D113.786; max=3D126.213)Ki= bits/s rngtest: FIPS tests speed: (min=3D17.122; avg=3D28.268; max=3D28.812)Mibits= /s rngtest: Program run time: 172323761 microseconds AFAIR (Arch wiki) some small failures are acceptable. Regards, Nicolas --=-iQqSDeLkAUWuKqj/9yXJ Content-Type: application/pgp-signature; name="signature.asc" Content-Description: This is a digitally signed message part Content-Transfer-Encoding: 7bit -----BEGIN PGP SIGNATURE----- iQEzBAABCAAdFiEErOkkGDHCg2EbPcGjlfZmHno8x/4FAl3VmPYACgkQlfZmHno8 x/747ggAscLDM0fF7tOoTWdcO+lp+zKBM4o38uVkOwes/laW6msQMiAvB0qW7j4V 8FRmDLDFt34e1Ta9NKZW3GloAUkVkrS/iPX9msSCy7qlodRjRYdkgF5rbSH4YSIK K/9p8MXknOsXsJ9kQCiexooNiiKspt2XLl1lwtLuhHVdtNEVVw1phdlPhfU37BAW tV1n45JjdagGkNS8JrjvXNPbCRkSk8SStb/IjldltTO1Rvp//I5Whj0CWXnNzM0t HDhXrZiO7+5NB30WU9gP+o3NU8b0KiyAdoe5RgRzTCqlnZsK2rdhJ4eDQKzVpvWR /Ra8OIJmgCp4aezFVms92D0KO2dB6w== =VuSq -----END PGP SIGNATURE----- --=-iQqSDeLkAUWuKqj/9yXJ--