Hi Stephan, NIST SP 800-22-rev1a and NIST SP 800-90B are used together to evaluate the amount of min entropy the source provides, and not to decide if the source has passed the tests or failed. See
https://github.com/usnistgov/SP800-90B_EntropyAssessment The goal is often to make sure the input entropy is more than the entropy we expect from the output. Thanks, Miaoqing -----Original Message----- From: Stephan Mueller [mailto:smuel...@chronox.de] Sent: Wednesday, August 10, 2016 2:52 PM To: Pan, Miaoqing <miaoq...@qti.qualcomm.com> Cc: Herbert Xu <herb...@gondor.apana.org.au>; Matt Mackall <m...@selenic.com>; miaoq...@codeaurora.org; Valo, Kalle <kv...@qca.qualcomm.com>; linux-wirel...@vger.kernel.org; ath9k-devel <ath9k-de...@qca.qualcomm.com>; linux-crypto@vger.kernel.org; ja...@lakedaemon.net; Sepehrdad, Pouyan <pouy...@qti.qualcomm.com> Subject: Re: [PATCH 2/2] ath9k: disable RNG by default Am Mittwoch, 10. August 2016, 06:46:31 CEST schrieb Pan, Miaoqing: Hi Miaoqing, > Hi Stephan, > > Would you please provide a recent NIST document which asks the entropy > source to pass the NIST randomness tests ? See FIPS 140-2 IG 7.15 which explicitly references SP800-22. Ciao Stephan -- To unsubscribe from this list: send the line "unsubscribe linux-crypto" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html