Bug 2075978

Summary: [RHEL-9.1] update jitterentropy to 3.4.0
Product: Red Hat Enterprise Linux 9 Reporter: Vladis Dronov <vdronov>
Component: jitterentropyAssignee: Vladis Dronov <vdronov>
Status: CLOSED ERRATA QA Contact: Vilém Maršík <vmarsik>
Severity: medium Docs Contact:
Priority: medium    
Version: 9.1CC: rparrazo, vmarsik
Target Milestone: rcKeywords: Rebase, Triaged
Target Release: 9.1   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: jitterentropy-3.4.0-1.el9 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-11-15 11:16:12 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Vladis Dronov 2022-04-16 19:45:39 UTC
update jitterentropy lib to 3.4.0.

upstream: https://github.com/smuellerDD/jitterentropy-library/
fedora: https://src.fedoraproject.org/rpms/jitterentropy/

Comment 3 Vladis Dronov 2022-04-27 09:46:41 UTC
[CI] [GATING] [DONE] jitterentropy-3.4.0-1.el9 passed gating because all required tests passed
koji: https://kojihub.stream.rdu2.redhat.com/koji/taskinfo?taskID=1091676
brew: https://brewweb.engineering.redhat.com/brew/taskinfo?taskID=44874227
osci: https://dashboard.osci.redhat.com/#/artifact/brew-build/aid/44874227

Comment 4 Vladis Dronov 2022-05-09 09:45:42 UTC
for a testing plan please see bz2075977#c4 and below.
both jitterentropy (lib) and rng-tools (app) are tested together.

Comment 5 Vilém Maršík 2022-05-10 18:30:37 UTC
(In reply to Vladis Dronov from comment #4)
> for a testing plan please see bz2075977#c4 and below.
> both jitterentropy (lib) and rng-tools (app) are tested together.

Successfully tested in https://bugzilla.redhat.com/show_bug.cgi?id=2075977#c5 .

Comment 9 Vilém Maršík 2022-06-13 21:17:56 UTC
Successfully tested another way:

[root@intel-eaglestream-spr-04 hwrng]# rngd -l
Entropy sources that are available but disabled
1: TPM RNG Device (tpm)
5: NIST Network Entropy Beacon (nist)
Available and enabled entropy sources:
0: Hardware RNG Device (hwrng)
2: Intel RDRAND Instruction RNG (rdrand)
6: JITTER Entropy generator (jitter)
Available entropy sources that failed initalization:
[root@intel-eaglestream-spr-04 hwrng]# time rngd -x tpm -x nist -x hwrng -x rdrand -n jitter -f -o /dev/stdout > /tmp/entropy
Disabling 1: TPM RNG Device (tpm)
Disabling 5: NIST Network Entropy Beacon (nist)
Disabling 0: Hardware RNG Device (hwrng)
Disabling 2: Intel RDRAND Instruction RNG (rdrand)
Enabling 6: JITTER Entropy generator (jitter)
Initializing available sources
[jitter]: Initializing AES buffer
[jitter]: Enabling JITTER rng support
[jitter]: Initialized
^C[jitter]: Shutting down

real    1m13.994s
user    5m57.460s
sys     0m10.076s
[root@intel-eaglestream-spr-04 hwrng]# ls -lh /tmp/entropy
-rw-r--r--. 1 root root 1.3G Jun 13 17:13 /tmp/entropy
[root@intel-eaglestream-spr-04 hwrng]# cat /tmp/entropy | rngtest
rngtest 6.15
Copyright (c) 2004 by Henrique de Moraes Holschuh
This is free software; see the source for copying conditions.  There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

rngtest: starting FIPS tests...
rngtest: entropy source drained
rngtest: bits received from input: 10441166848
rngtest: FIPS 140-2 successes: 521832
rngtest: FIPS 140-2 failures: 226
rngtest: FIPS 140-2(2001-10-10) Monobit: 41
rngtest: FIPS 140-2(2001-10-10) Poker: 46
rngtest: FIPS 140-2(2001-10-10) Runs: 141
rngtest: FIPS 140-2(2001-10-10) Long run: 0
rngtest: FIPS 140-2(2001-10-10) Continuous run: 0
rngtest: input channel speed: (min=1.096; avg=17.701; max=18.626)Gibits/s
rngtest: FIPS tests speed: (min=134.320; avg=170.899; max=176.606)Mibits/s
rngtest: Program run time: 58848512 microseconds
[root@intel-eaglestream-spr-04 hwrng]# rpm -q jitterentropy
jitterentropy-3.4.0-1.el9.x86_64

Comment 11 errata-xmlrpc 2022-11-15 11:16:12 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (jitterentropy bug fix and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2022:8309