On Wed, Dec 14, 2016 at 7:49 PM, André Draszik <git(a)andred.net> wrote:
On Fri, 2016-12-09 at 19:07 +0530, Shrikant Bobade wrote:
> Further observed with less available entropy.. on the setup causing the
> delay. So continuing with v1.33.
> *:~# cat
> Getting connman waiting/stuck at
> *getrandom (_rnd_get_system_entropy_getrandom) (by default gnutls
> So tried to increase entropy with help of /dev/urandom & and with
> sufficient ~3k+ entropy count observed the getrandom call completed
> Is this know behaviour Or experienced by anyone.. ?
I think I have seen something similar here, but never investigated in
depth as of yet.
> reasons and not /dev/urandom ? thoughts if any for other ways to deal
> less/no entropy available with /dev/random?
> Any pointers or references will be a great help..
For me, the combination of removing GnuTLS usage in ConnMan (disable wispr)
as well as switching all applications to use OpenSSL rather than GnuTLS
(wpa-supplicant in particular) was sufficient to work around this for the
time being. Probably because OpenSSL handles /dev/random & /dev/urandom
differently than GnuTLS.
thanks for pointers..
but may be replacing gnutls may not be possible in short term
on my setup.
I had also considered adding timer-entropyd
but didn't need to in the end.
Thanks for the response.