Received: by 2002:a25:23cc:0:0:0:0:0 with SMTP id j195csp5913ybj; Fri, 8 May 2020 05:18:22 -0700 (PDT) X-Google-Smtp-Source: APiQypIDBzCpH7Z1UsS4pS/as/HClW1mNTRTs7TLeTecFT+Ly7Rw5EYR+vKc9R6m6oRX8WnwIRBP X-Received: by 2002:a17:906:138c:: with SMTP id f12mr1676579ejc.35.1588940302428; Fri, 08 May 2020 05:18:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588940302; cv=none; d=google.com; s=arc-20160816; b=WEMlNNO99/usVYKkuyvqjX0WyKihQH66y2st+MOKbfaNPc576hhoS4E7jUqvdAOd2I m2MLHi5rDl4CtPyA1lcGAJnU50lRaAyT0S7AChThJ/MsPVRSm8Y0pJCHrFQwEbp6eRQj zcsRtdjZjZMEN/3d7TIsv2PDzoiIIl/Bfx+e+6d0SMoZf7IDtVPargSKzjTzw5U+bCjs kXmVTDq4fVVhr+xrLjifhsuKjow4hgi6nWl4dhGqDHYvWAVtkzeYrJzL/I/28k03i6dl wmQy6Dt5hrThJlrqogDCuiyDqhmHHBc48yUn6TAcAAFtfphkhqNpMETamJlEs7vucBtx 9Dog== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:references :in-reply-to:message-id:date:subject:cc:to:from; bh=CP5d8TICuRsUkn60KyCHzkzzTXTJumoEG3fuuPtPpVk=; b=nRNV+DkMYTPeNTuzYiEatggSC3v0jEvPBpxroFZ+d+g9bcpeNsmBHekrN26/3bqWuK HdIpYuONdKA4/Swtqif0vQUmm7216wKbR+0pqCuE6eYamOTOYDkr56d+1Kg8LlZs53Yc /5Kv+lc8E8EA/LagUEvlCv1C/X1YQ8yabpqx+p7Xy/8eNRMmiiHsUPcpACQDRSTCnhok Sp3TU8Nfb8wcG7N2KHJ6mYQGotyX/ZBp5Hgj/m+t4c9H8mAu2qLDyIqBGIO5qKIyuOjK o5IJRtomAFidu2Akt5h2Wcmobi9OuwlEO3MvLsZyqd11I4LQx7AmPCi8VjY8ihmpKbAr ENMg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o59si984966eda.39.2020.05.08.05.17.39; Fri, 08 May 2020 05:18:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726636AbgEHMRf (ORCPT + 99 others); Fri, 8 May 2020 08:17:35 -0400 Received: from mail.thorsis.com ([92.198.35.195]:60190 "EHLO mail.thorsis.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726627AbgEHMRf (ORCPT ); Fri, 8 May 2020 08:17:35 -0400 Received: from localhost (localhost [127.0.0.1]) by mail.thorsis.com (Postfix) with ESMTP id 125A71FC7 for ; Fri, 8 May 2020 14:17:33 +0200 (CEST) X-Virus-Scanned: Debian amavisd-new at mail.thorsis.com Received: from mail.thorsis.com ([127.0.0.1]) by localhost (mail.thorsis.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7o0xgFGndeQp for ; Fri, 8 May 2020 14:17:28 +0200 (CEST) Received: by mail.thorsis.com (Postfix, from userid 109) id D2DFD2A4F; Fri, 8 May 2020 14:17:28 +0200 (CEST) X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,NO_RECEIVED, NO_RELAYS autolearn=unavailable autolearn_force=no version=3.4.2 From: Alexander Dahl To: linux-crypto@vger.kernel.org Cc: Stephan Mueller Subject: Re: jitterentropy_rng on armv5 embedded target Date: Fri, 08 May 2020 14:17:25 +0200 Message-ID: <2049720.SxWqT2AVQ6@ada> In-Reply-To: <6309135.Bj5FvMsAKG@tauon.chronox.de> References: <2567555.LKkejuagh6@ada> <6309135.Bj5FvMsAKG@tauon.chronox.de> Content-Transfer-Encoding: 7Bit Content-Type: text/plain; charset="us-ascii" Sender: linux-crypto-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Hello, Stephan, Am Freitag, 8. Mai 2020, 13:58:14 CEST schrieb Stephan Mueller: > > (Although those daemons would solve my problem, I currently try > > to avoid them, because memory on my platform is very restricted and every > > additional running userspace process costs at least around 1 MB.) > > If you compile it and you also have AF_ALG for RNGs compiled, you can use it > through the AF_ALG interface (see [1] for a library). But IMHO if you are > space-constrained, you do not want that code. > > Rather use the jitterentropy-library from [2] and link it straight from your > application. That would be dropbear or openssl (and applications using libssl). While that would certainly be nice, I fear it's out of my scope. ;-) > > If so, then how is it supposed to be set up? > > It is intended for in-kernel purposes (namely to seed its DRBG). Okay and DRBG has nothing to do with /dev/random ? Then where do the random numbers for that come from (in the current or previous kernels without your new lrng)? Curious Alex