On Oct 22, 2013, at 11:54 PM, Ted Unangst wrote:
> On Tue, Oct 22, 2013 at 22:05, William Orr wrote:
>
>>
>> I guess I misunderstood, as I thought that /dev/random dumped the entropy
>> pool, and that /dev/arandom put the random data through a stream cipher so
>> that grabbing random data woul
On Oct 23, 2013, at 4:38 AM, Paul Irofti wrote:
> Hi William,
>
> I have an almost identical diff in my tree for a driver for octeon's RNG. On
> which machines did you test this?
>
> I wrote mine for DSR-500. But I remember the reads had some hick-ups. Since
> why I did not commit the diff u
Hi William,
I have an almost identical diff in my tree for a driver for octeon's
RNG. On which machines did you test this?
I wrote mine for DSR-500. But I remember the reads had some hick-ups.
Since why I did not commit the diff until now.
On Tue, Oct 22, 2013 at 22:05, William Orr wrote:
>
> I guess I misunderstood, as I thought that /dev/random dumped the entropy
> pool, and that /dev/arandom put the random data through a stream cipher so
> that grabbing random data would never block.
That was true some time ago, but since at le
> I can do this again with time, but pulling data from /dev/random took
> significantly longer without my patch than with it.
That is not possible.
On Oct 22, 2013, at 9:06 PM, Ted Unangst wrote:
> On Tue, Oct 22, 2013 at 18:31, William Orr wrote:
>> You'll notice that there's no significant difference between the output
>> of the two rngs. However, with octrng the dd completed in under a minute
>> (more entropy in pool). Without, it took se
On Tue, Oct 22, 2013 at 18:31, William Orr wrote:
> You'll notice that there's no significant difference between the output
> of the two rngs. However, with octrng the dd completed in under a minute
> (more entropy in pool). Without, it took several minutes. If you want
> time output, I can add tha
Hi again tech@
This is my second attempt at a patch to add support for the octeon's
onboard rng. I've fixed all of the concerns (ISC license, wrong #define,
comment removal) and I've also come bearing statistics on the quality of
the entropy.
I dd'd 512M of /dev/random and ran the ent from
http:/