Bug 2075978
Summary: | [RHEL-9.1] update jitterentropy to 3.4.0 | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 9 | Reporter: | Vladis Dronov <vdronov> |
Component: | jitterentropy | Assignee: | Vladis Dronov <vdronov> |
Status: | CLOSED ERRATA | QA Contact: | Vilém Maršík <vmarsik> |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | 9.1 | CC: | rparrazo, vmarsik |
Target Milestone: | rc | Keywords: | Rebase, Triaged |
Target Release: | 9.1 | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | jitterentropy-3.4.0-1.el9 | Doc Type: | If docs needed, set a value |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2022-11-15 11:16:12 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Vladis Dronov
2022-04-16 19:45:39 UTC
[CI] [GATING] [DONE] jitterentropy-3.4.0-1.el9 passed gating because all required tests passed koji: https://kojihub.stream.rdu2.redhat.com/koji/taskinfo?taskID=1091676 brew: https://brewweb.engineering.redhat.com/brew/taskinfo?taskID=44874227 osci: https://dashboard.osci.redhat.com/#/artifact/brew-build/aid/44874227 for a testing plan please see bz2075977#c4 and below. both jitterentropy (lib) and rng-tools (app) are tested together. (In reply to Vladis Dronov from comment #4) > for a testing plan please see bz2075977#c4 and below. > both jitterentropy (lib) and rng-tools (app) are tested together. Successfully tested in https://bugzilla.redhat.com/show_bug.cgi?id=2075977#c5 . Successfully tested another way: [root@intel-eaglestream-spr-04 hwrng]# rngd -l Entropy sources that are available but disabled 1: TPM RNG Device (tpm) 5: NIST Network Entropy Beacon (nist) Available and enabled entropy sources: 0: Hardware RNG Device (hwrng) 2: Intel RDRAND Instruction RNG (rdrand) 6: JITTER Entropy generator (jitter) Available entropy sources that failed initalization: [root@intel-eaglestream-spr-04 hwrng]# time rngd -x tpm -x nist -x hwrng -x rdrand -n jitter -f -o /dev/stdout > /tmp/entropy Disabling 1: TPM RNG Device (tpm) Disabling 5: NIST Network Entropy Beacon (nist) Disabling 0: Hardware RNG Device (hwrng) Disabling 2: Intel RDRAND Instruction RNG (rdrand) Enabling 6: JITTER Entropy generator (jitter) Initializing available sources [jitter]: Initializing AES buffer [jitter]: Enabling JITTER rng support [jitter]: Initialized ^C[jitter]: Shutting down real 1m13.994s user 5m57.460s sys 0m10.076s [root@intel-eaglestream-spr-04 hwrng]# ls -lh /tmp/entropy -rw-r--r--. 1 root root 1.3G Jun 13 17:13 /tmp/entropy [root@intel-eaglestream-spr-04 hwrng]# cat /tmp/entropy | rngtest rngtest 6.15 Copyright (c) 2004 by Henrique de Moraes Holschuh This is free software; see the source for copying conditions. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. rngtest: starting FIPS tests... rngtest: entropy source drained rngtest: bits received from input: 10441166848 rngtest: FIPS 140-2 successes: 521832 rngtest: FIPS 140-2 failures: 226 rngtest: FIPS 140-2(2001-10-10) Monobit: 41 rngtest: FIPS 140-2(2001-10-10) Poker: 46 rngtest: FIPS 140-2(2001-10-10) Runs: 141 rngtest: FIPS 140-2(2001-10-10) Long run: 0 rngtest: FIPS 140-2(2001-10-10) Continuous run: 0 rngtest: input channel speed: (min=1.096; avg=17.701; max=18.626)Gibits/s rngtest: FIPS tests speed: (min=134.320; avg=170.899; max=176.606)Mibits/s rngtest: Program run time: 58848512 microseconds [root@intel-eaglestream-spr-04 hwrng]# rpm -q jitterentropy jitterentropy-3.4.0-1.el9.x86_64 Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (jitterentropy bug fix and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2022:8309 |