Skip to content

Commit 3a5371f

Browse files
bryanbrattlofpraneethbajjuri
authored andcommitted
feat(linux): add section for building OPTEE with PRNG drivers
In certain highly specific use-cases the TRNG drivers in OPTEE could have unwanted affects to the overall system if the application cares more about deterministic latency over entropy. Provide a section to document how to easily switch from the true RNG drivers to pseudo RNG drivers. Signed-off-by: Bryan Brattlof <[email protected]>
1 parent 0c07e74 commit 3a5371f

File tree

1 file changed

+15
-0
lines changed

1 file changed

+15
-0
lines changed

source/linux/Foundational_Components_OPTEE.rst

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -61,6 +61,21 @@ Building the OP-TEE image with debug parameters
6161
6262
$ make CROSS_COMPILE="$CROSS_COMPILE_32" CROSS_COMPILE64="$CROSS_COMPILE_64" PLATFORM=|__OPTEE_PLATFORM_FLAVOR__| CFG_ARM64_core=y CFG_TEE_CORE_LOG_LEVEL=2 CFG_TEE_CORE_DEBUG=y
6363
64+
.. _building-optee-with-prng:
65+
66+
Building OP-TEE with Pseudo RNG drivers
67+
***************************************
68+
69+
In certain highly specific use-cases the true RNG drivers could have a
70+
detrimental effect to the overall system latency. Using the
71+
``CFG_WITH_SOFTWARE_PRNG`` flag to use OP-TEE's Pseudo RNG drivers as a source
72+
of entropy can work around these issues.
73+
74+
.. parsed-literal::
75+
76+
$ make CROSS_COMPILE="$CROSS_COMPILE_32" CROSS_COMPILE64="$CROSS_COMPILE_64" PLATFORM=k3-|__OPTEE_PLATFORM_FLAVOR__| CFG_ARM64_core=y CFG_WITH_SOFTWARE_PRNG=y
77+
78+
6479
Secure Storage with RPMB (For HS)
6580
*********************************
6681

0 commit comments

Comments
 (0)