On Tue, 10 Mar 2020 08:26:02 -0400
Neil Horman wrote:
> Hey, just FYI, its still a bit nascent, but it works:
> https://github.com/nhorman/rng-tools
>
> Now has an rtlsdr entropy source, which can be used to feed the
> kernel entropy pool.
>
> I'll be tagging and releasing an updated
On Tue, Feb 25, 2020 at 12:48:08PM -0700, stan wrote:
> On Tue, 25 Feb 2020 14:24:10 -0500
> Neil Horman wrote:
>
> > On Tue, Feb 25, 2020 at 11:58:56AM -0700, stan wrote:
>
> > > Doesn't the elimination of the shadow pool, and the removal of
> > > push_to_pool end the ability to push entropy?
On Tue, 25 Feb 2020 14:24:10 -0500
Neil Horman wrote:
> On Tue, Feb 25, 2020 at 11:58:56AM -0700, stan wrote:
> > Doesn't the elimination of the shadow pool, and the removal of
> > push_to_pool end the ability to push entropy? I'm going to have to
> > bite the bullet and take the code apart
On Tue, Feb 25, 2020 at 11:58:56AM -0700, stan wrote:
> On Tue, 25 Feb 2020 13:13:16 -0500
> Neil Horman wrote:
>
> > Thats not my understanding. As I understand the changes, /dev/random
> > has been converted so that its no longer blocks (which is why the
> > removed the read_wakeup_threshold,
On Tue, 25 Feb 2020 13:13:16 -0500
Neil Horman wrote:
> Thats not my understanding. As I understand the changes, /dev/random
> has been converted so that its no longer blocks (which is why the
> removed the read_wakeup_threshold, since theres never a case where
> /dev/random will block
On Tue, Feb 25, 2020 at 09:27:07AM -0700, stan wrote:
> On Tue, 25 Feb 2020 08:17:37 -0500
> Neil Horman wrote:
>
> > Just out of curiosity, instead of patching the kernel to feed entropy
> > from your SDN directly into the kernel, have you considered just
> > adding this as an entropy source
On Tue, 25 Feb 2020 09:27:07 -0700
stan wrote:
> year, and it was still passing all the tests. I used the NSA tests
Correction: NIST, not NSA, though I am sure the NSA is aware of these
tests.
___
kernel mailing list --
On Tue, 25 Feb 2020 08:17:37 -0500
Neil Horman wrote:
> Just out of curiosity, instead of patching the kernel to feed entropy
> from your SDN directly into the kernel, have you considered just
> adding this as an entropy source to rngd? That would save you the
> trouble of having to patch the
On Mon, Feb 24, 2020 at 02:40:12PM -0500, Laura Abbott wrote:
>
>
> On 2/24/20 1:24 PM, stan wrote:
> > On Mon, 24 Feb 2020 17:29:07 +0100
> > Florian Weimer wrote:
> >
> > > * stan:
> > >
> > > > I built my first 5.6 custom kernel from the src.rpm yesterday in
> > > > F31. And my patch to
On Mon, 24 Feb 2020 14:40:12 -0500
Laura Abbott wrote:
>
> https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/drivers/char/random.c?id=c95ea0c69ffda19381c116db2be23c7e654dac98
>
> And the thread if you'd like to read
>
On 2/24/20 1:24 PM, stan wrote:
On Mon, 24 Feb 2020 17:29:07 +0100
Florian Weimer wrote:
* stan:
I built my first 5.6 custom kernel from the src.rpm yesterday in
F31. And my patch to enable the use of a daemon I run to gather
entropy from an rtl2832 (atmospheric) and put it into the
On Mon, 24 Feb 2020 17:29:07 +0100
Florian Weimer wrote:
> * stan:
>
> > I built my first 5.6 custom kernel from the src.rpm yesterday in
> > F31. And my patch to enable the use of a daemon I run to gather
> > entropy from an rtl2832 (atmospheric) and put it into the kernel to
> > keep the
I built my first 5.6 custom kernel from the src.rpm yesterday in F31.
And my patch to enable the use of a daemon I run to gather entropy from
an rtl2832 (atmospheric) and put it into the kernel to keep the entropy
pool full failed. This has happened in the past, that's why I have to
patch, but
* stan:
> I built my first 5.6 custom kernel from the src.rpm yesterday in F31.
> And my patch to enable the use of a daemon I run to gather entropy from
> an rtl2832 (atmospheric) and put it into the kernel to keep the entropy
> pool full failed. This has happened in the past, that's why I have
14 matches
Mail list logo