/freebsd-10.0-release/usr.sbin/bsdinstall/scripts/ |
H A D | entropy | 29 dd if=/dev/random of=$BSDINSTALL_CHROOT/entropy bs=4096 count=1
|
H A D | Makefile | 3 SCRIPTS= auto adduser checksum config docsinstall entropy hostname jail \
|
H A D | jail | 121 bsdinstall entropy
|
H A D | script | 123 bsdinstall entropy
|
/freebsd-10.0-release/libexec/save-entropy/ |
H A D | Makefile | 3 SCRIPTS= save-entropy.sh
|
H A D | save-entropy.sh | 50 entropy_dir=${entropy_dir:-/var/db/entropy} 59 logger -is -t "$0" The entropy directory "${entropy_dir}" does \ 60 not exist, and cannot be created. Therefore no entropy can \ 65 logger -is -t "$0" Cannot cd to the entropy directory: "${entropy_dir}". \ 68 for f in saved-entropy.*; do 69 case "${f}" in saved-entropy.\*) continue ;; esac # No files match 70 [ ${f#saved-entropy\.} -ge ${entropy_save_num} ] && unlink ${f} 77 if [ -f "saved-entropy.${n}" ]; then 78 mv "saved-entropy.${n}" "saved-entropy [all...] |
/freebsd-10.0-release/etc/rc.d/ |
H A D | random | 29 # Reseed /dev/random with previously stored entropy. 34 entropy_dir=${entropy_dir:-/var/db/entropy} 51 feed_dev_random /var/db/entropy-file 59 # Write some entropy so when the machine reboots /dev/random 66 echo -n 'Writing entropy file:' 75 rm -f /var/db/entropy-file 2> /dev/null 76 if touch /var/db/entropy-file 2> /dev/null; then 77 entropy_file_confirmed=/var/db/entropy-file
|
H A D | postrandom | 30 entropy_dir=${entropy_dir:-/var/db/entropy}
|
/freebsd-10.0-release/contrib/libc++/src/ |
H A D | random.cpp | 43 random_device::entropy() const _NOEXCEPT
|
/freebsd-10.0-release/crypto/openssl/crypto/rand/ |
H A D | md_rand.c | 143 static double entropy=0; variable 188 entropy=0; 317 * much entropy as fits into md. */ 322 if (entropy < ENTROPY_NEEDED) /* stop counting when we have enough */ 323 entropy += add; 403 ok = (entropy >= ENTROPY_NEEDED); 408 * state; thus we have to decrease the entropy estimate. 410 * adjust the entropy count, though, because we're not ambitious 414 * we have enough entropy. Entropy should be collected 416 * output pool only when the entropy limi [all...] |
H A D | rand.h | 86 void (*add)(const void *buf, int num, double entropy); 105 void RAND_add(const void *buf,int num,double entropy);
|
H A D | rand_lib.c | 154 void RAND_add(const void *buf, int num, double entropy) argument 158 meth->add(buf,num,entropy); 192 * entropy internally through RAND_poll(). 196 int entropy, size_t min_len, size_t max_len) 240 double entropy) 242 RAND_SSLeay()->add(in, inlen, entropy); 195 drbg_get_entropy(DRBG_CTX *ctx, unsigned char **pout, int entropy, size_t min_len, size_t max_len) argument 239 drbg_rand_add(DRBG_CTX *ctx, const void *in, int inlen, double entropy) argument
|
/freebsd-10.0-release/sys/dev/random/ |
H A D | randomdev_soft.h | 33 * and harvester-specific for the entropy processor 36 /* #define ENTROPYSOURCE nn entropy sources (actually classes) 45 #define HARVESTSIZE 16 /* max size of each harvested entropy unit */ 47 /* These are used to queue harvested packets of entropy. The entropy 52 uint8_t entropy[HARVESTSIZE]; /* the harvested entropy */ member in struct:harvest 53 u_int size, bits; /* stats about the entropy */ 54 enum esource source; /* origin of the entropy */
|
H A D | harvest.c | 50 /* Structure holding the desired entropy sources */ 82 * the entropy device. 89 random_harvest(void *entropy, u_int count, u_int bits, enum esource origin) argument 92 (*reap_func)(get_cyclecount(), entropy, count, bits, origin); 102 /* If the entropy device is not loaded, make a token effort to 113 log(LOG_WARNING, "random device not loaded; using insecure entropy\n");
|
H A D | random_harvestq.c | 62 * The harvest mutex protects the consistency of the entropy fifos and 67 /* Lockable FIFO queue holding entropy buffers */ 73 /* Empty entropy buffers */ 76 /* Harvested entropy */ 86 "/entropy", 91 /* Deal with entropy cached externally if this is present. 107 keyfile = preload_search_by_type("/boot/entropy"); 118 printf("random: no preloaded entropy cache available\n"); 122 /* Read and attempt to overwrite the entropy cache files. 132 printf("random: entropy cach 282 random_harvestq_internal(u_int64_t somecounter, const void *entropy, u_int count, u_int bits, enum esource origin) argument [all...] |
H A D | live_entropy_sources.c | 136 * Run through all "live" sources reading entropy for the given 138 * of entropy accumulation pools in use; 2 for Yarrow and 32 156 * Walk over all of live entropy sources, and feed their output 163 * This should be quick, since it's a live entropy 174 memcpy(event.entropy, buf, n); 176 /* Do the actual entropy insertion */
|
H A D | yarrow.c | 71 u_int bits; /* estimated bits of entropy */ 74 struct randomdev_hash hash; /* accumulated entropy */ 126 printf("%02X", event->entropy[i]); 218 /* Initialise the fast and slow entropy pools */ 255 /* 1. Hash the accumulated entropy into v[0] */ 302 /* 5. Reset entropy estimate accumulators to zero */ 324 /* Internal function to return processed entropy from the PRNG */
|
/freebsd-10.0-release/contrib/wpa/src/crypto/ |
H A D | random.c | 8 * This random number generator is used to provide additional entropy to the 60 static unsigned int entropy = 0; variable 132 if (entropy > MIN_COLLECT_ENTROPY && (count & 0x3ff) != 0) { 134 * No need to add more entropy at this point, so save CPU and 139 wpa_printf(MSG_EXCESSIVE, "Add randomness: count=%u entropy=%u", 140 count, entropy); 149 entropy++; 160 wpa_printf(MSG_MSGDUMP, "Get randomness: len=%u entropy=%u", 161 (unsigned int) len, entropy); 168 /* Mix in additional entropy extracte [all...] |
/freebsd-10.0-release/contrib/wpa/src/eap_common/ |
H A D | eap_pax_common.c | 22 * @entropy: Exchanged entropy to seed the KDF (Z) 23 * @entropy_len: Length of the entropy in bytes 32 const u8 *entropy, size_t entropy_len, 51 addr[1] = entropy; 30 eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len, const char *identifier, const u8 *entropy, size_t entropy_len, size_t output_len, u8 *output) argument
|
H A D | eap_pax_common.h | 81 const u8 *entropy, size_t entropy_len,
|
/freebsd-10.0-release/libexec/ |
H A D | Makefile | 26 save-entropy \
|
/freebsd-10.0-release/sys/kern/ |
H A D | kern_intr.c | 201 /* Start off with no entropy and just the name of the event. */ 877 struct intr_entropy entropy; local 897 * sources of entropy, then gather some. 900 CTR3(KTR_INTR, "%s: pid %d (%s) gathering entropy", __func__, 902 entropy.event = (uintptr_t)ie; 903 entropy.td = ctd; 904 random_harvest(&entropy, sizeof(entropy), 2, 1034 struct intr_entropy entropy; local 1051 * sources of entropy, the 1138 struct intr_entropy entropy; local [all...] |
/freebsd-10.0-release/secure/lib/libssh/ |
H A D | Makefile | 17 msg.c progressmeter.c dns.c entropy.c umac.c umac128.c jpake.c \
|
/freebsd-10.0-release/contrib/apr/random/unix/ |
H A D | apr_random.c | 181 * XXX Note: the pid does not provide sufficient entropy to 230 const unsigned char *entropy = entropy_; local 245 p->pool[p->bytes++] = entropy[n];
|
/freebsd-10.0-release/crypto/openssl/engines/ |
H A D | e_sureware.c | 101 static void surewarehk_rand_add(const void *buf, int num, double entropy); 647 static void surewarehk_rand_add(const void *buf, int num, double entropy) argument
|