9c3c133b1e
Some hardware platforms, the TS-7800[1] is one for example, can supply the kernel with an entropy source, albeit a slow one for TS-7800 users, by just reading a particular IO address. This source must not be read above a certain rate otherwise the quality suffers. The driver is then hooked into by calling platform_device_(register|add|del) passing a structure similar to: ------ static struct timeriomem_rng_data ts78xx_ts_rng_data = { .address = (u32 *__iomem) TS_RNG, .period = 1000000, /* one second */ }; static struct platform_device ts78xx_ts_rng_device = { .name = "timeriomem_rng", .id = -1, .dev = { .platform_data = &ts78xx_ts_rng_data, }, .num_resources = 0, }; ------ [1] http://www.embeddedarm.com/products/board-detail.php?product=TS-7800 Signed-off-by: Alexander Clouter <alex@digriz.org.uk> Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
17 lines
611 B
Makefile
17 lines
611 B
Makefile
#
|
|
# Makefile for HW Random Number Generator (RNG) device drivers.
|
|
#
|
|
|
|
obj-$(CONFIG_HW_RANDOM) += rng-core.o
|
|
rng-core-y := core.o
|
|
obj-$(CONFIG_HW_RANDOM_TIMERIOMEM) += timeriomem-rng.o
|
|
obj-$(CONFIG_HW_RANDOM_INTEL) += intel-rng.o
|
|
obj-$(CONFIG_HW_RANDOM_AMD) += amd-rng.o
|
|
obj-$(CONFIG_HW_RANDOM_GEODE) += geode-rng.o
|
|
obj-$(CONFIG_HW_RANDOM_N2RNG) += n2-rng.o
|
|
n2-rng-y := n2-drv.o n2-asm.o
|
|
obj-$(CONFIG_HW_RANDOM_VIA) += via-rng.o
|
|
obj-$(CONFIG_HW_RANDOM_IXP4XX) += ixp4xx-rng.o
|
|
obj-$(CONFIG_HW_RANDOM_OMAP) += omap-rng.o
|
|
obj-$(CONFIG_HW_RANDOM_PASEMI) += pasemi-rng.o
|
|
obj-$(CONFIG_HW_RANDOM_VIRTIO) += virtio-rng.o
|