<html>
  <head>
    <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    <br>
    <br>
    <div class="moz-cite-prefix">On 8/16/19 5:44 AM, Dr Paul Dale wrote:<br>
    </div>
    <blockquote type="cite"
      cite="mid:D1D0E1FB-A6E9-4CAA-B810-82D2DAEED884@oracle.com">
      <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
      I investigated HAVEGE fairly deeply a couple of years ago.  I am
      completely in agreement with the basis of this source, however the
      sticking point was the “expansion” phase.  Essentially, every bit
      of entropy gathered is turned into (just under) thirty two bits of
      “entropy”.  This is logically and physically impossible.  As a
      source, it appears reasonable to the usual tests (i.e. dieharder),
      although <a href="https://en.wikipedia.org/wiki/TestU01" class=""
        moz-do-not-send="true">TestU01</a> does pick up on it being less
      than ideal.
      <div class=""><br class="">
      </div>
      <div class="">I would, however, recommend Stephan Müller's <a
          href="https://www.chronox.de/jent/doc/CPU-Jitter-NPTRNG.html"
          class="" moz-do-not-send="true">CPU Jitter</a>.  The gathering
        is well researched and performed, no hidden tricks are present
        and the bits produces are equiprobable.<br class="">
      </div>
    </blockquote>
    <br>
    Thanks.  I will take a look at CPU Jitter.  Entropy can be an issue
    on some of my armv7 boards.  I run CentOS on them, so all I need to
    find are rpms for something to test it out...<br>
    <br>
    <blockquote type="cite"
      cite="mid:D1D0E1FB-A6E9-4CAA-B810-82D2DAEED884@oracle.com">
      <div class="">
        <div class="">
          <div class=""><br class="">
          </div>
          <div class=""><br class="">
          </div>
          <div class="">Pauli</div>
          <div class="">
            <div class="">
              <div dir="auto" style="word-wrap: break-word;
                -webkit-nbsp-mode: space; line-break:
                after-white-space;" class="">
                <div style="caret-color: rgb(0, 0, 0); color: rgb(0, 0,
                  0); font-family: Helvetica; font-size: 12px;
                  font-style: normal; font-variant-caps: normal;
                  font-weight: normal; letter-spacing: normal;
                  text-align: start; text-indent: 0px; text-transform:
                  none; white-space: normal; word-spacing: 0px;
                  -webkit-text-stroke-width: 0px; text-decoration:
                  none;">-- <br class="">
                  Dr Paul Dale | Distinguished Architect | Cryptographic
                  Foundations <br class="">
                  Phone +61 7 3031 7217<br class="">
                  Oracle Australia</div>
                <div style="caret-color: rgb(0, 0, 0); color: rgb(0, 0,
                  0); font-family: Helvetica; font-size: 12px;
                  font-style: normal; font-variant-caps: normal;
                  font-weight: normal; letter-spacing: normal;
                  text-align: start; text-indent: 0px; text-transform:
                  none; white-space: normal; word-spacing: 0px;
                  -webkit-text-stroke-width: 0px; text-decoration:
                  none;"><br class="">
                </div>
                <br class="Apple-interchange-newline">
              </div>
              <br class="Apple-interchange-newline">
            </div>
            <div><br class="">
              <blockquote type="cite" class="">
                <div class="">On 16 Aug 2019, at 7:31 pm, Robert
                  Moskowitz <<a href="mailto:rgm@htt-consult.com"
                    class="" moz-do-not-send="true">rgm@htt-consult.com</a>>
                  wrote:</div>
                <br class="Apple-interchange-newline">
                <div class="">
                  <meta http-equiv="Content-Type" content="text/html;
                    charset=UTF-8" class="">
                  <div text="#000000" bgcolor="#FFFFFF" class=""> <br
                      class="">
                    <br class="">
                    <div class="moz-cite-prefix">On 8/16/19 5:26 AM,
                      Chitrang Srivastava wrote:<br class="">
                    </div>
                    <blockquote type="cite"
cite="mid:CANPP3o0WJtxh7ZDoBq=SD=sr0w+ix9zWv2y+e-UB5w0msHNrmQ@mail.gmail.com"
                      class="">
                      <meta http-equiv="content-type"
                        content="text/html; charset=UTF-8" class="">
                      <div dir="ltr" class="">Hi,<br class="">
                        <div class=""><br class="">
                        </div>
                        <div class="">I am working on an embedded
                          platform and now ported openssl 1.1.1b</div>
                        <div class="">TLS 1.2/1.3 is working fine.</div>
                        <div class="">While analysing random number ,
                          Rand pool initialization calls where I am
                          returning like this , </div>
                        <div class="">size_t <b class="">rand_pool_acquire_entropy</b>(RAND_POOL
                          *pool)<br class="">
                          {<br class="">
                                  return
                          rand_pool_entropy_available(pool);<br class="">
                          }  <br class="">
                        </div>
                        <div class="">As noticed that <b class="">rand_unix.c</b>
                          has an implementation wcih samples 2 bits of
                          RTC, would that give enough entropy or any
                          other recommendation to have enough entropy
                          for embedded platforms?<br class="">
                        </div>
                      </div>
                    </blockquote>
                    <br class="">
                    <br class="">
                    Check out:    <a class="moz-txt-link-freetext"
                      href="https://issihosts.com/haveged"
                      moz-do-not-send="true">https://issihosts.com/haveged</a><br
                      class="">
                    <br class="">
                    I talk about it here:    <a
                      class="moz-txt-link-freetext"
                      href="http://www.htt-consult.com/CentOS7-armv7.html#RANDOMNESS"
                      moz-do-not-send="true">http://www.htt-consult.com/CentOS7-armv7.html#RANDOMNESS</a><br
                      class="">
                    <br class="">
                    <br class="">
                  </div>
                </div>
              </blockquote>
            </div>
            <br class="">
          </div>
        </div>
      </div>
    </blockquote>
    <br>
  </body>
</html>