For the RNG, you will need to modify the via-rng.c in order to bypass the "unnecessary sanity check", the RNG does work without this check.
Just comment it out and recompile the kernel module:
Code:
/* perhaps-unnecessary sanity check; remove after testing if
unneeded
rdmsr(MSR_VIA_RNG, lo, hi);
if ((lo & VIA_RNG_ENABLE) == 0) {
printk(KERN_ERR PFX "cannot enable VIA C3 RNG, aborting\n");
return -ENODEV;
}*/
But for amd64 you need to patch the kernel (>=2.6.29), as I described here: http://ubuntuforums.org/showpost.php...1&postcount=14
The modules padlock-aes and padlock-sha are only used by dm-crypt (cryptsetup). You may still need to modify and recompile Openssl if you want to use it with Openssh, Openvpn and many more.
You can follow my guide above. It still runs on i386. But I don't know if that is necessary for jaunty anymore.
But I now also managed to port the in official sha patch for Openssl to intrepid and amd64. Because it is dependend on my last patch you will need to apply them both.
For i386 you'll need to change inside eng_padlock.c:
Code:
typedef unsigned int uint32_t;
-> typedef unsigned long uint32_t;
Bookmarks