2014-04-14 07:26:48 -07:00
|
|
|
{ config, lib, pkgs, ... }:
|
2012-11-21 23:07:25 -08:00
|
|
|
|
2014-04-14 07:26:48 -07:00
|
|
|
with lib;
|
2012-11-21 23:07:25 -08:00
|
|
|
|
|
|
|
{
|
|
|
|
options = {
|
|
|
|
security.rngd.enable = mkOption {
|
2013-10-30 09:37:45 -07:00
|
|
|
type = types.bool;
|
2012-11-26 05:45:23 -08:00
|
|
|
default = true;
|
2012-11-21 23:07:25 -08:00
|
|
|
description = ''
|
2012-11-22 01:41:54 -08:00
|
|
|
Whether to enable the rng daemon, which adds entropy from
|
2012-11-21 23:07:25 -08:00
|
|
|
hardware sources of randomness to the kernel entropy pool when
|
2012-11-22 07:14:41 -08:00
|
|
|
available.
|
2012-11-21 23:07:25 -08:00
|
|
|
'';
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
config = mkIf config.security.rngd.enable {
|
2012-11-26 05:45:23 -08:00
|
|
|
services.udev.extraRules = ''
|
|
|
|
KERNEL=="random", TAG+="systemd"
|
|
|
|
SUBSYSTEM=="cpu", ENV{MODALIAS}=="x86cpu:*feature:*009E*", TAG+="systemd", ENV{SYSTEMD_WANTS}+="rngd.service"
|
|
|
|
KERNEL=="hw_random", TAG+="systemd", ENV{SYSTEMD_WANTS}+="rngd.service"
|
2015-01-06 06:23:36 -08:00
|
|
|
${if config.services.tcsd.enable then "" else ''KERNEL=="tpm0", TAG+="systemd", ENV{SYSTEMD_WANTS}+="rngd.service"''}
|
2012-11-26 05:45:23 -08:00
|
|
|
'';
|
|
|
|
|
2013-01-16 03:33:18 -08:00
|
|
|
systemd.services.rngd = {
|
2012-11-26 05:45:23 -08:00
|
|
|
bindsTo = [ "dev-random.device" ];
|
|
|
|
|
|
|
|
after = [ "dev-random.device" ];
|
2012-11-21 23:07:25 -08:00
|
|
|
|
|
|
|
description = "Hardware RNG Entropy Gatherer Daemon";
|
|
|
|
|
2014-04-22 04:41:22 -07:00
|
|
|
serviceConfig.ExecStart = "${pkgs.rng_tools}/sbin/rngd -f -v" +
|
|
|
|
(if config.services.tcsd.enable then " --no-tpm=1" else "");
|
2012-11-21 23:07:25 -08:00
|
|
|
};
|
|
|
|
};
|
|
|
|
}
|