Searched refs:entropy (Results 1 - 25 of 28) sorted by relevance

12

/freebsd-10.0-release/usr.sbin/bsdinstall/scripts/
H A Dentropy29 dd if=/dev/random of=$BSDINSTALL_CHROOT/entropy bs=4096 count=1
H A DMakefile3 SCRIPTS= auto adduser checksum config docsinstall entropy hostname jail \
H A Djail121 bsdinstall entropy
H A Dscript123 bsdinstall entropy
/freebsd-10.0-release/libexec/save-entropy/
H A DMakefile3 SCRIPTS= save-entropy.sh
H A Dsave-entropy.sh50 entropy_dir=${entropy_dir:-/var/db/entropy}
59 logger -is -t "$0" The entropy directory "${entropy_dir}" does \
60 not exist, and cannot be created. Therefore no entropy can \
65 logger -is -t "$0" Cannot cd to the entropy directory: "${entropy_dir}". \
68 for f in saved-entropy.*; do
69 case "${f}" in saved-entropy.\*) continue ;; esac # No files match
70 [ ${f#saved-entropy\.} -ge ${entropy_save_num} ] && unlink ${f}
77 if [ -f "saved-entropy.${n}" ]; then
78 mv "saved-entropy.${n}" "saved-entropy
[all...]
/freebsd-10.0-release/etc/rc.d/
H A Drandom29 # Reseed /dev/random with previously stored entropy.
34 entropy_dir=${entropy_dir:-/var/db/entropy}
51 feed_dev_random /var/db/entropy-file
59 # Write some entropy so when the machine reboots /dev/random
66 echo -n 'Writing entropy file:'
75 rm -f /var/db/entropy-file 2> /dev/null
76 if touch /var/db/entropy-file 2> /dev/null; then
77 entropy_file_confirmed=/var/db/entropy-file
H A Dpostrandom30 entropy_dir=${entropy_dir:-/var/db/entropy}
/freebsd-10.0-release/contrib/libc++/src/
H A Drandom.cpp43 random_device::entropy() const _NOEXCEPT
/freebsd-10.0-release/crypto/openssl/crypto/rand/
H A Dmd_rand.c143 static double entropy=0; variable
188 entropy=0;
317 * much entropy as fits into md. */
322 if (entropy < ENTROPY_NEEDED) /* stop counting when we have enough */
323 entropy += add;
403 ok = (entropy >= ENTROPY_NEEDED);
408 * state; thus we have to decrease the entropy estimate.
410 * adjust the entropy count, though, because we're not ambitious
414 * we have enough entropy. Entropy should be collected
416 * output pool only when the entropy limi
[all...]
H A Drand.h86 void (*add)(const void *buf, int num, double entropy);
105 void RAND_add(const void *buf,int num,double entropy);
H A Drand_lib.c154 void RAND_add(const void *buf, int num, double entropy) argument
158 meth->add(buf,num,entropy);
192 * entropy internally through RAND_poll().
196 int entropy, size_t min_len, size_t max_len)
240 double entropy)
242 RAND_SSLeay()->add(in, inlen, entropy);
195 drbg_get_entropy(DRBG_CTX *ctx, unsigned char **pout, int entropy, size_t min_len, size_t max_len) argument
239 drbg_rand_add(DRBG_CTX *ctx, const void *in, int inlen, double entropy) argument
/freebsd-10.0-release/sys/dev/random/
H A Drandomdev_soft.h33 * and harvester-specific for the entropy processor
36 /* #define ENTROPYSOURCE nn entropy sources (actually classes)
45 #define HARVESTSIZE 16 /* max size of each harvested entropy unit */
47 /* These are used to queue harvested packets of entropy. The entropy
52 uint8_t entropy[HARVESTSIZE]; /* the harvested entropy */ member in struct:harvest
53 u_int size, bits; /* stats about the entropy */
54 enum esource source; /* origin of the entropy */
H A Dharvest.c50 /* Structure holding the desired entropy sources */
82 * the entropy device.
89 random_harvest(void *entropy, u_int count, u_int bits, enum esource origin) argument
92 (*reap_func)(get_cyclecount(), entropy, count, bits, origin);
102 /* If the entropy device is not loaded, make a token effort to
113 log(LOG_WARNING, "random device not loaded; using insecure entropy\n");
H A Drandom_harvestq.c62 * The harvest mutex protects the consistency of the entropy fifos and
67 /* Lockable FIFO queue holding entropy buffers */
73 /* Empty entropy buffers */
76 /* Harvested entropy */
86 "/entropy",
91 /* Deal with entropy cached externally if this is present.
107 keyfile = preload_search_by_type("/boot/entropy");
118 printf("random: no preloaded entropy cache available\n");
122 /* Read and attempt to overwrite the entropy cache files.
132 printf("random: entropy cach
282 random_harvestq_internal(u_int64_t somecounter, const void *entropy, u_int count, u_int bits, enum esource origin) argument
[all...]
H A Dlive_entropy_sources.c136 * Run through all "live" sources reading entropy for the given
138 * of entropy accumulation pools in use; 2 for Yarrow and 32
156 * Walk over all of live entropy sources, and feed their output
163 * This should be quick, since it's a live entropy
174 memcpy(event.entropy, buf, n);
176 /* Do the actual entropy insertion */
H A Dyarrow.c71 u_int bits; /* estimated bits of entropy */
74 struct randomdev_hash hash; /* accumulated entropy */
126 printf("%02X", event->entropy[i]);
218 /* Initialise the fast and slow entropy pools */
255 /* 1. Hash the accumulated entropy into v[0] */
302 /* 5. Reset entropy estimate accumulators to zero */
324 /* Internal function to return processed entropy from the PRNG */
/freebsd-10.0-release/contrib/wpa/src/crypto/
H A Drandom.c8 * This random number generator is used to provide additional entropy to the
60 static unsigned int entropy = 0; variable
132 if (entropy > MIN_COLLECT_ENTROPY && (count & 0x3ff) != 0) {
134 * No need to add more entropy at this point, so save CPU and
139 wpa_printf(MSG_EXCESSIVE, "Add randomness: count=%u entropy=%u",
140 count, entropy);
149 entropy++;
160 wpa_printf(MSG_MSGDUMP, "Get randomness: len=%u entropy=%u",
161 (unsigned int) len, entropy);
168 /* Mix in additional entropy extracte
[all...]
/freebsd-10.0-release/contrib/wpa/src/eap_common/
H A Deap_pax_common.c22 * @entropy: Exchanged entropy to seed the KDF (Z)
23 * @entropy_len: Length of the entropy in bytes
32 const u8 *entropy, size_t entropy_len,
51 addr[1] = entropy;
30 eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len, const char *identifier, const u8 *entropy, size_t entropy_len, size_t output_len, u8 *output) argument
H A Deap_pax_common.h81 const u8 *entropy, size_t entropy_len,
/freebsd-10.0-release/libexec/
H A DMakefile26 save-entropy \
/freebsd-10.0-release/sys/kern/
H A Dkern_intr.c201 /* Start off with no entropy and just the name of the event. */
877 struct intr_entropy entropy; local
897 * sources of entropy, then gather some.
900 CTR3(KTR_INTR, "%s: pid %d (%s) gathering entropy", __func__,
902 entropy.event = (uintptr_t)ie;
903 entropy.td = ctd;
904 random_harvest(&entropy, sizeof(entropy), 2,
1034 struct intr_entropy entropy; local
1051 * sources of entropy, the
1138 struct intr_entropy entropy; local
[all...]
/freebsd-10.0-release/secure/lib/libssh/
H A DMakefile17 msg.c progressmeter.c dns.c entropy.c umac.c umac128.c jpake.c \
/freebsd-10.0-release/contrib/apr/random/unix/
H A Dapr_random.c181 * XXX Note: the pid does not provide sufficient entropy to
230 const unsigned char *entropy = entropy_; local
245 p->pool[p->bytes++] = entropy[n];
/freebsd-10.0-release/crypto/openssl/engines/
H A De_sureware.c101 static void surewarehk_rand_add(const void *buf, int num, double entropy);
647 static void surewarehk_rand_add(const void *buf, int num, double entropy) argument

Completed in 146 milliseconds

12