/freebsd-10.1-release/usr.sbin/bsdinstall/scripts/ |
H A D | entropy | 29 dd if=/dev/random of=$BSDINSTALL_CHROOT/entropy bs=4096 count=1
|
H A D | Makefile | 3 SCRIPTS= auto adduser checksum config docsinstall entropy hostname jail \
|
H A D | jail | 125 bsdinstall entropy
|
H A D | script | 127 bsdinstall entropy
|
/freebsd-10.1-release/libexec/save-entropy/ |
H A D | Makefile | 3 SCRIPTS= save-entropy.sh
|
H A D | save-entropy.sh | 52 entropy_dir=${entropy_dir:-/var/db/entropy} 61 logger -is -t "$0" The entropy directory "${entropy_dir}" does \ 62 not exist, and cannot be created. Therefore no entropy can \ 67 logger -is -t "$0" Cannot cd to the entropy directory: "${entropy_dir}". \ 70 for f in saved-entropy.*; do 71 case "${f}" in saved-entropy.\*) continue ;; esac # No files match 72 [ ${f#saved-entropy\.} -ge ${entropy_save_num} ] && unlink ${f} 79 if [ -f "saved-entropy.${n}" ]; then 80 mv "saved-entropy.${n}" "saved-entropy [all...] |
/freebsd-10.1-release/etc/rc.d/ |
H A D | random | 29 # Reseed /dev/random with previously stored entropy. 34 entropy_dir=${entropy_dir:-/var/db/entropy} 51 feed_dev_random /var/db/entropy-file 59 # Write some entropy so when the machine reboots /dev/random 66 echo -n 'Writing entropy file:' 75 rm -f /var/db/entropy-file 2> /dev/null 76 if touch /var/db/entropy-file 2> /dev/null; then 77 entropy_file_confirmed=/var/db/entropy-file
|
H A D | postrandom | 30 entropy_dir=${entropy_dir:-/var/db/entropy}
|
/freebsd-10.1-release/contrib/ntp/lib/isc/include/isc/ |
H A D | hash.h | 66 * Its unpredictability relies on the quality of entropy to build the 85 isc_hash_ctxcreate(isc_mem_t *mctx, isc_entropy_t *entropy, unsigned int limit, 88 isc_hash_create(isc_mem_t *mctx, isc_entropy_t *entropy, size_t limit); 97 * 'entropy' must be NULL or a valid entropy object. If 'entropy' is NULL, 141 * source of entropy, which is typically from the entropy object specified 143 * initializing the entropy object with some good entropy source [all...] |
H A D | entropy.h | 18 /* $Id: entropy.h,v 1.35 2009/10/19 02:37:08 marka Exp $ */ 27 /*! \file isc/entropy.h 28 * \brief The entropy API 31 * The entropy object is locked internally. All callbacks into 34 * entropy API lock held. This means these functions are 35 * not permitted to call back into the entropy API. 41 * A buffer, used as an entropy pool. 44 * While this code is believed to implement good entropy gathering 47 * Since the added entropy is only as good as the sources used, 105 * Estimate the amount of entropy containe [all...] |
/freebsd-10.1-release/crypto/openssl/crypto/rand/ |
H A D | md_rand.c | 144 static double entropy = 0; variable 189 entropy = 0; 315 * counter). By XORing it we keep at least as much entropy as fits into 321 if (entropy < ENTROPY_NEEDED) /* stop counting when we have enough */ 322 entropy += add; 402 ok = (entropy >= ENTROPY_NEEDED); 407 * to decrease the entropy estimate. Once we've had enough initial 408 * seeding we don't bother to adjust the entropy count, though, 411 * we have enough entropy. Entropy should be collected in a separate 413 * entropy limi [all...] |
H A D | rand.h | 85 void (*add) (const void *buf, int num, double entropy); 104 void RAND_add(const void *buf, int num, double entropy);
|
H A D | rand_lib.c | 148 void RAND_add(const void *buf, int num, double entropy) argument 152 meth->add(buf, num, entropy); 188 * entropy internally through RAND_poll(). 192 int entropy, size_t min_len, size_t max_len) 236 double entropy) 238 RAND_SSLeay()->add(in, inlen, entropy); 191 drbg_get_entropy(DRBG_CTX *ctx, unsigned char **pout, int entropy, size_t min_len, size_t max_len) argument 235 drbg_rand_add(DRBG_CTX *ctx, const void *in, int inlen, double entropy) argument
|
/freebsd-10.1-release/contrib/ntp/lib/isc/ |
H A D | hash.c | 61 #include <isc/entropy.h> 96 isc_entropy_t *entropy; /*%< entropy source */ member in struct:isc_hash 142 isc_hash_ctxcreate(isc_mem_t *mctx, isc_entropy_t *entropy, argument 192 hctx->entropy = NULL; 198 if (entropy != NULL) 199 isc_entropy_attach(entropy, &hctx->entropy); 201 UNUSED(entropy); 223 isc_hash_create(isc_mem_t *mctx, isc_entropy_t *entropy, size_ argument [all...] |
H A D | entropy.c | 18 /* $Id: entropy.c,v 1.22 2010/08/10 23:48:19 tbox Exp $ */ 22 * This is the system independent part of the entropy module. It is 24 * \link unix/entropy.c unix/entropy.c \endlink or win32/entropy.c. 35 #include <isc/entropy.h> 62 * Size of entropy pool in 32-bit words. This _MUST_ be a power of 2. 94 isc_uint32_t entropy; /*%< current entropy estimate in bits */ member in struct:__anon63 144 isc_uint32_t total; /*%< entropy fro 227 add_entropy(isc_entropy_t *ent, isc_uint32_t entropy) argument 240 subtract_entropy(isc_entropy_t *ent, isc_uint32_t entropy) argument 312 entropypool_adddata(isc_entropy_t *ent, void *p, unsigned int len, isc_uint32_t entropy) argument 1028 unsigned int entropy; local 1066 isc_entropy_putdata(isc_entropy_t *ent, void *data, unsigned int length, isc_uint32_t entropy) argument [all...] |
/freebsd-10.1-release/contrib/libc++/src/ |
H A D | random.cpp | 71 random_device::entropy() const _NOEXCEPT
|
/freebsd-10.1-release/sys/dev/random/ |
H A D | randomdev_soft.h | 33 * and harvester-specific for the entropy processor 36 /* #define ENTROPYSOURCE nn entropy sources (actually classes) 45 #define HARVESTSIZE 16 /* max size of each harvested entropy unit */ 47 /* These are used to queue harvested packets of entropy. The entropy 52 uint8_t entropy[HARVESTSIZE]; /* the harvested entropy */ member in struct:harvest 53 u_int size, bits; /* stats about the entropy */ 54 enum esource source; /* origin of the entropy */
|
H A D | harvest.c | 50 /* Structure holding the desired entropy sources */ 82 * the entropy device. 89 random_harvest(void *entropy, u_int count, u_int bits, enum esource origin) argument 92 (*reap_func)(get_cyclecount(), entropy, count, bits, origin); 102 /* If the entropy device is not loaded, make a token effort to 113 log(LOG_WARNING, "random device not loaded; using insecure entropy\n");
|
H A D | random_harvestq.c | 62 * The harvest mutex protects the consistency of the entropy fifos and 67 /* Lockable FIFO queue holding entropy buffers */ 73 /* Empty entropy buffers */ 76 /* Harvested entropy */ 86 "/entropy", 91 /* Deal with entropy cached externally if this is present. 107 keyfile = preload_search_by_type("/boot/entropy"); 118 printf("random: no preloaded entropy cache available\n"); 122 /* Read and attempt to overwrite the entropy cache files. 132 printf("random: entropy cach 282 random_harvestq_internal(u_int64_t somecounter, const void *entropy, u_int count, u_int bits, enum esource origin) argument [all...] |
/freebsd-10.1-release/contrib/ntp/lib/isc/tests/ |
H A D | isctest.h | 24 #include <isc/entropy.h>
|
/freebsd-10.1-release/contrib/wpa/src/crypto/ |
H A D | random.c | 8 * This random number generator is used to provide additional entropy to the 60 static unsigned int entropy = 0; variable 132 if (entropy > MIN_COLLECT_ENTROPY && (count & 0x3ff) != 0) { 134 * No need to add more entropy at this point, so save CPU and 139 wpa_printf(MSG_EXCESSIVE, "Add randomness: count=%u entropy=%u", 140 count, entropy); 149 entropy++; 160 wpa_printf(MSG_MSGDUMP, "Get randomness: len=%u entropy=%u", 161 (unsigned int) len, entropy); 168 /* Mix in additional entropy extracte [all...] |
/freebsd-10.1-release/contrib/ntp/sntp/libevent/ |
H A D | arc4random.c | 71 /* Add platform entropy 32 bytes (256 bits) at a time. */ 178 * RANDOM_UUID sysctl to get entropy from the kernel. This can work 215 * tries to use the KERN_ARND syscall to get entropy from the kernel. 261 unsigned char entropy[64]; local 271 memset(entropy, 0, sizeof(entropy)); 276 entropy[nybbles/2] |= nyb; 278 entropy[nybbles/2] |= nyb<<4; 285 arc4_addrandom(entropy, nybbles/2); 288 evutil_memclear_(entropy, sizeo [all...] |
/freebsd-10.1-release/contrib/wpa/src/eap_common/ |
H A D | eap_pax_common.c | 22 * @entropy: Exchanged entropy to seed the KDF (Z) 23 * @entropy_len: Length of the entropy in bytes 32 const u8 *entropy, size_t entropy_len, 51 addr[1] = entropy; 30 eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len, const char *identifier, const u8 *entropy, size_t entropy_len, size_t output_len, u8 *output) argument
|
H A D | eap_pax_common.h | 81 const u8 *entropy, size_t entropy_len,
|
/freebsd-10.1-release/libexec/ |
H A D | Makefile | 27 save-entropy \
|