Am Mittwoch, 10. August 2016, 02:35:04 CEST schrieb Pan, Miaoqing: Hi Miaoqing, > Hi Stephan, > > For those less perfect noise source, can't pass the FIPS test. > > static int update_kernel_random(int random_step, > unsigned char *buf, fips_ctx_t *fipsctx_in) > { > unsigned char *p; > int fips; > > fips = fips_run_rng_test(fipsctx_in, buf); > if (fips) > return 1; > > for (p = buf; p + random_step <= &buf[FIPS_RNG_BUFFER_SIZE]; > p += random_step) { > random_add_entropy(p, random_step); > random_sleep(); > } > return 0; > } Not even the poor cheap AIS20 statistical tests from rngd pass? I guess the only sensible solution is what Ted suggested to use add_device_randomness. Ciao Stephan -- To unsubscribe from this list: send the line "unsubscribe linux-crypto" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html