mirror of
https://git.in.rschanz.org/ryan77627/guix.git
synced 2024-11-16 19:57:39 -05:00
gnu: Add jitterentropy-rngd.
* gnu/packages/linux.scm (jitterentropy-rngd): New public variable.
This commit is contained in:
parent
0eacdd462e
commit
c23541112d
1 changed files with 48 additions and 1 deletions
|
@ -7,7 +7,7 @@
|
|||
;;; Copyright © 2015 Taylan Ulrich Bayırlı/Kammer <taylanbayirli@gmail.com>
|
||||
;;; Copyright © 2015, 2016, 2017, 2018, 2020 Efraim Flashner <efraim@flashner.co.il>
|
||||
;;; Copyright © 2016 Christopher Allan Webber <cwebber@dustycloud.org>
|
||||
;;; Copyright © 2016, 2017, 2018, 2019, 2020 Tobias Geerinckx-Rice <me@tobias.gr>
|
||||
;;; Copyright © 2016–2021 Tobias Geerinckx-Rice <me@tobias.gr>
|
||||
;;; Copyright © 2016, 2017 Alex Kost <alezost@gmail.com>
|
||||
;;; Copyright © 2016 Raymond Nicholson <rain1@openmailbox.org>
|
||||
;;; Copyright © 2016 Mathieu Lirzin <mthl@gnu.org>
|
||||
|
@ -2245,6 +2245,53 @@ (define-public iptables
|
|||
Both commands are targeted at system administrators.")
|
||||
(license license:gpl2+)))
|
||||
|
||||
(define-public jitterentropy-rngd
|
||||
(package
|
||||
(name "jitterentropy-rngd")
|
||||
(version "1.2.0")
|
||||
(source
|
||||
(origin
|
||||
(method git-fetch)
|
||||
(uri (git-reference
|
||||
(url "https://github.com/smuellerDD/jitterentropy-rngd")
|
||||
(commit (string-append "v" version))))
|
||||
(file-name (git-file-name name version))
|
||||
(sha256
|
||||
(base32 "1fb8zfwhwkl1d8n4cdn7rdv5rwd75qgc00d36pmkl7wgnj3c9xda"))))
|
||||
(build-system gnu-build-system)
|
||||
(arguments
|
||||
`(#:tests? #f ; no test suite
|
||||
#:make-flags
|
||||
(list (string-append "CC=" ,(cc-for-target))
|
||||
(string-append "PREFIX=" (assoc-ref %outputs "out"))
|
||||
"UNITDIR=$(PREFIX)/lib/systemd/system")
|
||||
#:phases
|
||||
(modify-phases %standard-phases
|
||||
(delete 'configure)))) ; no ./configure script
|
||||
(home-page "https://www.chronox.de/jent.html")
|
||||
(synopsis "CPU jitter random number generator daemon")
|
||||
(description
|
||||
"This simple daemon feeds entropy from the CPU Jitter @acronym{RNG, random
|
||||
number generator} core to the kernel Linux's entropy estimator. This prevents
|
||||
the @file{/dev/random} device from blocking and should benefit users of the
|
||||
preferred @file{/dev/urandom} and @code{getrandom()} interfaces too.
|
||||
|
||||
The CPU Jitter RNG itself is part of the kernel and claims to provide good
|
||||
entropy by collecting and magnifying differences in CPU execution time as
|
||||
measured by the high-resolution timer built into modern CPUs. It requires no
|
||||
additional hardware or external entropy source.
|
||||
|
||||
The random bit stream generated by @command{jitterentropy-rngd} is not processed
|
||||
by a cryptographically secure whitening function. Nonetheless, its authors
|
||||
believe it to be a suitable source of cryptographically secure key material or
|
||||
other cryptographically sensitive data.
|
||||
|
||||
If you agree with them, start this daemon as early as possible to provide
|
||||
properly seeded random numbers to services like SSH or those using TLS during
|
||||
early boot when entropy may be low, especially in virtualised environments.")
|
||||
(license (list license:bsd-3 ; or
|
||||
license:gpl2+))))
|
||||
|
||||
(define-public lsscsi
|
||||
(package
|
||||
(name "lsscsi")
|
||||
|
|
Loading…
Reference in a new issue