/freebsd-11-stable/libexec/save-entropy/ |
H A D | Makefile | 3 SCRIPTS= save-entropy.sh
|
H A D | save-entropy.sh | 27 # $FreeBSD: stable/11/libexec/save-entropy/save-entropy.sh 355749 2019-12-14 09:54:30Z delphij $ 52 entropy_dir=${entropy_dir:-/var/db/entropy} 61 logger -is -t "$0" The entropy directory "${entropy_dir}" does \ 62 not exist, and cannot be created. Therefore no entropy can \ 67 logger -is -t "$0" Cannot cd to the entropy directory: "${entropy_dir}". \ 70 for f in saved-entropy.*; do 71 case "${f}" in saved-entropy.\*) continue ;; esac # No files match 72 [ ${f#saved-entropy\.} -gt ${entropy_save_num} ] && unlink ${f} 84 save_file="saved-entropy [all...] |
/freebsd-11-stable/usr.sbin/bsdinstall/scripts/ |
H A D | entropy | 30 for i in /entropy /boot/entropy; do
|
H A D | Makefile | 3 SCRIPTS= auto adduser checksum config docsinstall entropy hardening hostname jail \
|
H A D | jail | 125 bsdinstall entropy
|
H A D | script | 140 bsdinstall entropy
|
/freebsd-11-stable/etc/rc.d/ |
H A D | random | 14 desc="Harvest and save entropy for random device" 26 debug "saving entropy to $f" 38 debug "entropy read from $f" 54 echo -n 'Feeding entropy: ' 61 # Reseed /dev/random with previously stored entropy. 62 case ${entropy_dir:=/var/db/entropy} in 72 case ${entropy_file:=/entropy} in 76 feed_dev_random "${entropy_file}" /var/db/entropy-file 81 case ${entropy_boot_file:=/boot/entropy} in 94 # Write some entropy s [all...] |
/freebsd-11-stable/contrib/ntp/lib/isc/include/isc/ |
H A D | hash.h | 66 * Its unpredictability relies on the quality of entropy to build the 85 isc_hash_ctxcreate(isc_mem_t *mctx, isc_entropy_t *entropy, unsigned int limit, 88 isc_hash_create(isc_mem_t *mctx, isc_entropy_t *entropy, size_t limit); 97 * 'entropy' must be NULL or a valid entropy object. If 'entropy' is NULL, 141 * source of entropy, which is typically from the entropy object specified 143 * initializing the entropy object with some good entropy source [all...] |
H A D | entropy.h | 18 /* $Id: entropy.h,v 1.35 2009/10/19 02:37:08 marka Exp $ */ 27 /*! \file isc/entropy.h 28 * \brief The entropy API 31 * The entropy object is locked internally. All callbacks into 34 * entropy API lock held. This means these functions are 35 * not permitted to call back into the entropy API. 41 * A buffer, used as an entropy pool. 44 * While this code is believed to implement good entropy gathering 47 * Since the added entropy is only as good as the sources used, 105 * Estimate the amount of entropy containe [all...] |
/freebsd-11-stable/crypto/openssl/crypto/rand/ |
H A D | rand_lib.c | 148 void RAND_add(const void *buf, int num, double entropy) argument 152 meth->add(buf, num, entropy); 188 * entropy internally through RAND_poll()). 192 int entropy, size_t min_len, size_t max_len) 210 int entropy, size_t min_len, size_t max_len) 254 double entropy) 256 RAND_SSLeay()->add(in, inlen, entropy); 191 drbg_get_entropy(DRBG_CTX *ctx, unsigned char **pout, int entropy, size_t min_len, size_t max_len) argument 209 drbg_get_nonce(DRBG_CTX *ctx, unsigned char **pout, int entropy, size_t min_len, size_t max_len) argument 253 drbg_rand_add(DRBG_CTX *ctx, const void *in, int inlen, double entropy) argument
|
H A D | rand.h | 85 void (*add) (const void *buf, int num, double entropy); 104 void RAND_add(const void *buf, int num, double entropy);
|
H A D | md_rand.c | 144 static double entropy = 0; variable 189 entropy = 0; 319 * counter). By XORing it we keep at least as much entropy as fits into 325 if (entropy < ENTROPY_NEEDED) /* stop counting when we have enough */ 326 entropy += add; 402 initialized = (entropy >= ENTROPY_NEEDED); 412 * to decrease the entropy estimate. Once we've had enough initial 413 * seeding we don't bother to adjust the entropy count, though, 416 * we have enough entropy. Entropy should be collected in a separate 418 * entropy limi [all...] |
/freebsd-11-stable/sys/dev/random/ |
H A D | random_harvestq.c | 96 /* The context of the kernel thread processing harvested entropy */ 99 * entropy types to harvest. 103 * Lockless ring buffer holding entropy events 107 * the buffer contains harvested entropy. 181 /* XXX: FIX!! This is a *great* place to pass hardware/live entropy to random(9) */ 194 * Run through all fast sources reading entropy for the given 196 * of entropy accumulation pools in use; 2 for Yarrow and 32 202 uint32_t entropy[HARVESTSIZE]; local 207 * Step over all of live entropy sources, and feed their output 222 n = rrs->rrs_source->rs_read(entropy, sizeo 420 random_harvest_queue(const void *entropy, u_int size, u_int bits, enum random_entropy_source origin) argument 458 random_harvest_fast(const void *entropy, u_int size, u_int bits, enum random_entropy_source origin) argument 478 random_harvest_direct(const void *entropy, u_int size, u_int bits, enum random_entropy_source origin) argument [all...] |
/freebsd-11-stable/contrib/netbsd-tests/kernel/ |
H A D | t_rnd.c | 62 rd.entropy = 1; 84 rd.entropy = 1;
|
/freebsd-11-stable/contrib/ntp/lib/isc/ |
H A D | hash.c | 61 #include <isc/entropy.h> 96 isc_entropy_t *entropy; /*%< entropy source */ member in struct:isc_hash 142 isc_hash_ctxcreate(isc_mem_t *mctx, isc_entropy_t *entropy, argument 192 hctx->entropy = NULL; 198 if (entropy != NULL) 199 isc_entropy_attach(entropy, &hctx->entropy); 201 UNUSED(entropy); 223 isc_hash_create(isc_mem_t *mctx, isc_entropy_t *entropy, size_ argument [all...] |
H A D | entropy.c | 18 /* $Id: entropy.c,v 1.22 2010/08/10 23:48:19 tbox Exp $ */ 22 * This is the system independent part of the entropy module. It is 24 * \link unix/entropy.c unix/entropy.c \endlink or win32/entropy.c. 35 #include <isc/entropy.h> 62 * Size of entropy pool in 32-bit words. This _MUST_ be a power of 2. 94 isc_uint32_t entropy; /*%< current entropy estimate in bits */ member in struct:__anon4814 144 isc_uint32_t total; /*%< entropy fro 227 add_entropy(isc_entropy_t *ent, isc_uint32_t entropy) argument 240 subtract_entropy(isc_entropy_t *ent, isc_uint32_t entropy) argument 312 entropypool_adddata(isc_entropy_t *ent, void *p, unsigned int len, isc_uint32_t entropy) argument 1028 unsigned int entropy; local 1066 isc_entropy_putdata(isc_entropy_t *ent, void *data, unsigned int length, isc_uint32_t entropy) argument [all...] |
/freebsd-11-stable/contrib/ntp/lib/isc/tests/ |
H A D | isctest.h | 24 #include <isc/entropy.h>
|
H A D | isctest.c | 27 #include <isc/entropy.h>
|
/freebsd-11-stable/contrib/ntp/sntp/libevent/ |
H A D | arc4random.c | 71 /* Add platform entropy 32 bytes (256 bits) at a time. */ 178 * RANDOM_UUID sysctl to get entropy from the kernel. This can work 215 * tries to use the KERN_ARND syscall to get entropy from the kernel. 261 unsigned char entropy[64]; local 271 memset(entropy, 0, sizeof(entropy)); 276 entropy[nybbles/2] |= nyb; 278 entropy[nybbles/2] |= nyb<<4; 285 arc4_addrandom(entropy, nybbles/2); 288 evutil_memclear_(entropy, sizeo [all...] |
/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | random.c | 8 * This random number generator is used to provide additional entropy to the 62 static unsigned int entropy = 0; variable 137 if (entropy > MIN_COLLECT_ENTROPY && (count & 0x3ff) != 0) { 139 * No need to add more entropy at this point, so save CPU and 144 wpa_printf(MSG_EXCESSIVE, "Add randomness: count=%u entropy=%u", 145 count, entropy); 154 entropy++; 165 wpa_printf(MSG_MSGDUMP, "Get randomness: len=%u entropy=%u", 166 (unsigned int) len, entropy); 173 /* Mix in additional entropy extracte [all...] |
/freebsd-11-stable/contrib/wpa/src/eap_common/ |
H A D | eap_pax_common.c | 22 * @entropy: Exchanged entropy to seed the KDF (Z) 23 * @entropy_len: Length of the entropy in bytes 32 const u8 *entropy, size_t entropy_len, 51 addr[1] = entropy; 30 eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len, const char *identifier, const u8 *entropy, size_t entropy_len, size_t output_len, u8 *output) argument
|
H A D | eap_pax_common.h | 82 const u8 *entropy, size_t entropy_len,
|
/freebsd-11-stable/targets/pseudo/userland/libexec/ |
H A D | Makefile.depend | 33 libexec/save-entropy \
|
/freebsd-11-stable/libexec/ |
H A D | Makefile | 26 save-entropy \
|
/freebsd-11-stable/sys/dev/tpm/ |
H A D | tpm20.c | 254 * into system entropy pool. 260 unsigned char entropy[TPM_HARVEST_SIZE]; local 290 memcpy(entropy, 297 random_harvest_queue(entropy, entropy_size,
|