The SwiftRNG Software Kit contains a Linux kernel module swrandom that can be used for distributing the random byte stream generated by a SwiftRNG device to any application in user space that is capable to read from a file. The random byte stream generated can be concurrently accessed by consumer applications using device /dev/swrandom (Fig. 4).

After swrandom module is loaded (using one of the methods described on this page) and a SwiftRNG device is plugged in, an application can open /dev/swrandom as a file (using binary read mode) in user space and read random bytes produced by the device. Each application can read up to 100,000 bytes from the /dev/swrandom device with a single read operation at a time.
A loaded swrandom module, when in use, will search for connected SwiftRNG devices and will use the first device available after locking it for exclusive use.
swrandom module depends on the ACM USB driver which should be loaded in the kernel for communication to succeed. Some of the kernel builds, like those that are custom built for ARM embedded platforms, may not have the ACM USB driver available by default.
swrandom module also relies on the udev component to detect SwiftRNG devices. While udev is typically included in standard Linux installations, you might need to manually add it to your system if it’s absent.
Manually building and loading swrandom Kernel Module in development environments
The swrandom make project is available in the following SDK location:
linux/swrandom
Alternatively, the project can be downloaded with git using the following command:
git clone https://github.com/tectrolabs/swiftrng.git
We strongly recommend performing the following steps before building the swrandom module on Ubuntu:
sudo apt-get update
sudo apt-get upgrade
sudo apt-get install make
sudo apt-get install gcc
When used with older versions of Ubuntu, you may also need to perform the following step:
sudo apt-get install libelf-dev
We recommend performing the following steps before building the swrandom module on CentOS and Red Hat:
sudo yum install make
sudo yum install gcc
sudo yum install kernel-devel
The swrandom module can be built with make:
cd swiftrng/linux/swrandom
make
Note: You will need to rebuild the module each time a new version of the kernel is installed on the system.
Once the module is successfully built with make, it can be loaded into the kernel by running the
ins-swrandom.sh script:
sudo ./ins-swrandom.sh
After the swrandom module is successfully loaded by the kernel, the random bytes will be available for download on the following device:
/dev/swrandom
You can download random bytes to a file using the following command:
sudo dd if=/dev/swrandom of=download.bin bs=100 count=100000
The current version of swrandom module can only use one SwiftRNG device at a time.
swrandom module can be unloaded from the kernel by running the following command:
sudo rmmod swrandom
Auto-Build swrandom Kernel Module with DKMS in development environments
Dynamic Kernel Module Support (DKMS) is a framework that allows external kernel modules to be dynamically built and installed for each kernel in the system. With DKMS it is possible to automatically re-build kernel modules into the current kernel tree when the kernel version gets upgraded.
The following will demonstrate how to auto-build swrandom kernel module with DKMS on Linux.
Step 1
Install DKMS package with the following command:
When using Ubuntu or Debian:
sudo apt-get install dkms
Step 2
Download the SwiftRNG SDK which also contains the swrandom driver source code:
git clone https://github.com/tectrolabs/swiftrng.git
cd swiftrng
Step 3
Install the source code of the swrandom driver under /usr/src directory:
sudo cp -R linux/swrandom /usr/src/swrandom-2.2.0
Step 4
Create new dkms.conf file in the new source directory and add config data:
sudo vi /usr/src/swrandom-2.2.0/dkms.conf
PACKAGE_NAME="swrandom"
PACKAGE_VERSION="2.2.0"
BUILT_MODULE_NAME[0]="swrandom"
DEST_MODULE_LOCATION[0]="/kernel/drivers/char/swrandom/"
AUTOINSTALL="yes"
Step 5
Add swrandom module to the kernel tree:
sudo dkms add -m swrandom -v 2.2.0
Step 6
Build swrandom module against the currently running kernel:
sudo dkms build -m swrandom -v 2.2.0
Step 7
Install swrandom module under the current kernel tree:
sudo dkms install -m swrandom -v 2.2.0
Step 8
Check the status of the swrandom module:
dkms status | grep swrandom
Step 9
Verify that swrandom module can be loaded successfully:
sudo modprobe swrandom
Verify that /dev/swrandom device path exists:
ls /dev/swrandom
Step 10
To make swrandom module to load when the system boots, update `/etc/modules’ file:
sudo vi /etc/modules
Append the following content:
swrandom
Step 11
Connect a SwiftRNG device to one of the USB ports available and enter the following from command line to verify that swrandom module is working:
sudo dd if=/dev/swrandom of=/dev/null bs=100000 count=10
You should get a report similar to this ones:
10+0 records in
10+0 records out
1000000 bytes (1.0 MB, 977 KiB) copied, 0.0421225 s, 23.7 MB/s
Adding swrandom driver source to the Linux kernel source code
We recommend using this solution on platforms such as Ubuntu, CentOS, RH in production environments.
swrandom driver code can be added to an existing Linux source code so it can be included as part of a kernel build.
That can be done with the following steps:
Step 1
Download a copy of the SwiftRNG SDK using git and locate swrandom directory:
git clone https://github.com/tectrolabs/swiftrng.git
cd swiftrng/linux/swrandom
Step 2
Create drivers/char/swrandom directory in your Linux kernel source tree (kernel-source-tree as an example) and copy swrandom.c and swrandom.h files to the new directory:
mkdir kernel-source-tree/drivers/char/swrandom
cp swrandom.c kernel-source-tree/drivers/char/swrandom/
cp swrandom.h kernel-source-tree/drivers/char/swrandom/
Step 3
Create kernel-source-tree/drivers/char/swrandom/Makefile with the following content:
obj-$(CONFIG_RNG_SWRANDOM) += swrandom.o
Step 4
Create kernel-source-tree/drivers/char/swrandom/Kconfig with the following content:
config RNG_SWRANDOM
tristate "TectroLabs support for SwiftRNG devices"
select USB_ACM
depends on TTY
depends on USB
default y
help
  A module/driver that registers /dev/swrandom device for supplying true random bytes generated by SwiftRNG devices
Step 5
Edit kernel-source-tree/drivers/char/Makefile and append the following content:
obj-$(CONFIG_RNG_SWRANDOM)      += swrandom/
Step 6
Edit kernel-source-tree/drivers/char/Kconfig and append the following content before endmenu tag:
source "drivers/char/swrandom/Kconfig"
Step 7
Run make menuconfig in the kernel source tree directory and make sure that entry TectroLabs support for SwiftRNG devices is enabled in location Device Drivers ---> Character devices. Save the changes and exit.
Step 8
Build a new Kernel from sources. The exact command(s) will depend on OS or target platform. On Ubuntu that can be done, as part of deb files creation step, using the following command (parameter -j indicates how many CPU cores to use):
make -j4 deb-pkg 
Retrieving module real-time internal statistics
When loaded, swrandom module exposes some real-time information which is available through provided specific proc file system path.
Module internal real-time statistics can be retrieved with the following command:
cat /proc/swrandom/info
The output may look similar to the following:
SwiftRNG device model: SWRNGPRO
SwiftRNG device serial number: 123456789012345
SwiftRNG device version: 2.2 
SwiftRNG post processing method: disabled
SwiftRNG statistical tests: enabled
maximum RCT failures per block for device: 1
maximum APT failures per block for device: 1
total RCT failures for device: 3
total APT failures for device: 35
RCT status byte for device: 0
APT status byte for device: 0
last known device status byte: 0
number of requests handled by device: 694375
Non-root access on Linux
To enable a non-root user to access the /dev/swrandom device, simply copy the supplied 80-swiftrng-device-access.rules file to /etc/udev/rules.d/ location.
SwiftRNG device version compatibility
The latest version of swrandom module supports all SwiftRNG device versions and models.
Module configuration and memory optimization
By default, the maximum amount of random bytes that a user can retrieve at a time is limited to 100,000 which is defined by macro MAX_BYTES_USER_CAN_REQUEST (swrandom.h header file). When loading, the module allocates that amount of 100,000 bytes from the kernel memory heap. You can improve the memory footprint of the module by modifying MAX_BYTES_USER_CAN_REQUEST definition and setting it to a lower number. Alternatively, MAX_BYTES_USER_CAN_REQUEST value can be set to a higher than 100,000 number to increase the amount of bytes that the user can request at a time.
swrandom module, when in use, will detect model and version of the SwiftRNG device and will apply an appropriate default configuration as following:
Default module configuration for SwiftRNG Pro model:
| Post processing: | None | 
| Embedded correction mode: | None | 
| Power profile number: | Fixed profile | 
| Implemented continuous statistical tests: | Repetition Count, Adaptive Proportion | 
Default module configuration for SwiftRNG Z model:
| Post processing: | None | 
| Embedded correction mode: | Linear correction (P. Lacharme) | 
| Power profile number: | Fixed profile | 
| Implemented continuous statistical tests: | Repetition Count, Adaptive Proportion | 
Default module configuration for SwiftRNG device model:
| Post processing: | SHA-256 | 
| Embedded correction mode: | None | 
| Power profile number: | 9 | 
| Implemented continuous statistical tests: | Repetition Count, Adaptive Proportion | 
Default module configuration for SwiftRNG LE model:
| Post processing: | SHA-256 | 
| Embedded correction mode: | None | 
| Power profile number: | Fixed profile | 
| Implemented continuous statistical tests: | Repetition Count, Adaptive Proportion | 
Kernel version compatibility
The swrandom module/driver has been tested on Ubuntu and CentOS platforms with kernel versions 4.14, 4.19, 5.4, 5.10, 5.15, 6.1, 6.2
Configuring for rngd on Ubuntu
rngd is a daemon developed to check and feed random data from a hardware device to kernel entropy pool. More information about rngd daemon can be found at this address.
rngd daemon is part of rng-tools package and can be installed by running the following command:
sudo apt-get install rng-tools
The following steps explain how to configure swrandom module for use with rngd daemon on Ubuntu server or desktop:
Step 1
Build and install the swrandom module using one of the methods described above.
Step 2
Make sure the SwiftRNG device is plugged in and the module has been installed successfully.
Step 3
Execute the following test from command line to verify that swrandom module is working:
sudo dd if=/dev/swrandom of=/dev/null bs=100000 count=10
You should get a report similar to this ones:
10+0 records in
10+0 records out
1000000 bytes (1.0 MB, 977 KiB) copied, 0.0421225 s, 23.7 MB/s
Step 4
You can start the rngd daemon by running the following:
sudo rngd -r /dev/swrandom
The command will return to command line with no message if everything went well. The rngd daemon will use the entropy from /dev/swrandom to feed the /dev/random pool.
Step 5
Now you can test the /dev/random pool by running the following:
sudo dd if=/dev/random of=download.bin bs=1 count=100000
The output may look similar to this:
100000+0 records in
100000+0 records out
100000 bytes (100 kB) copied, 4.28862 s, 28.0 kB/s