/netbsd-current/external/bsd/ntp/dist/lib/isc/ |
H A D | lfsr.c | 38 isc_lfsrreseed_t reseed, void *arg) 48 lfsr->reseed = reseed; 51 if (count == 0 && reseed != NULL) 52 reseed(lfsr, arg); 68 * First, give the reseed function a crack at it. If the state is 72 if (lfsr->reseed != NULL) 73 lfsr->reseed(lfsr, lfsr->arg); 111 if (lfsr->count != 0 && lfsr->reseed != NULL) { 113 lfsr->reseed(lfs 36 isc_lfsr_init(isc_lfsr_t *lfsr, isc_uint32_t state, unsigned int bits, isc_uint32_t tap, unsigned int count, isc_lfsrreseed_t reseed, void *arg) argument [all...] |
H A D | entropy.c | 85 * The number of times we'll "reseed" for pseudorandom seeds. This is an 367 reseed(isc_entropy_t *ent) { function 608 reseed(ent);
|
/netbsd-current/external/mpl/dhcp/bind/dist/lib/isc/ |
H A D | lfsr.c | 30 unsigned int count, isc_lfsrreseed_t reseed, void *arg) { 39 lfsr->reseed = reseed; 42 if (count == 0 && reseed != NULL) { 43 reseed(lfsr, arg); 59 * First, give the reseed function a crack at it. If the state is 63 if (lfsr->reseed != NULL) { 64 lfsr->reseed(lfsr, lfsr->arg); 103 if (lfsr->count != 0 && lfsr->reseed != NULL) { 105 lfsr->reseed(lfs 29 isc_lfsr_init(isc_lfsr_t *lfsr, uint32_t state, unsigned int bits, uint32_t tap, unsigned int count, isc_lfsrreseed_t reseed, void *arg) argument [all...] |
/netbsd-current/external/bsd/ntp/dist/lib/isc/include/isc/ |
H A D | lfsr.h | 36 * It MUST set "count" to a new value or the lfsr will never reseed again. 38 * Also, a reseed will never occur in the middle of an extraction. This 51 unsigned int count; /*%< reseed count (in BITS!) */ 52 isc_lfsrreseed_t reseed; /*%< reseed function */ member in struct:isc_lfsr 53 void *arg; /*%< reseed function argument */ 62 isc_lfsrreseed_t reseed, void *arg);
|
/netbsd-current/external/mpl/dhcp/bind/dist/lib/isc/include/isc/ |
H A D | lfsr.h | 32 * It MUST set "count" to a new value or the lfsr will never reseed again. 34 * Also, a reseed will never occur in the middle of an extraction. This 47 unsigned int count; /*%< reseed count (in BITS!) */ 48 isc_lfsrreseed_t reseed; /*%< reseed function */ member in struct:isc_lfsr 49 void *arg; /*%< reseed function argument */ 56 unsigned int count, isc_lfsrreseed_t reseed, void *arg);
|
/netbsd-current/sys/kern/ |
H A D | subr_cprng.c | 90 struct evcnt reseed; member in struct:cprng_cpu::__anon16 248 evcnt_attach_dynamic(&cc->cc_evcnt->reseed, EVCNT_TYPE_MISC, NULL, 249 cpuname, "cprng_strong reseed"); 251 /* Set the epoch uninitialized so we reseed on first use. */ 260 evcnt_detach(&cc->cc_evcnt->reseed); 281 * cause the next caller to reseed again, and in the end we 282 * just reseed a couple more times than necessary. 290 (*ccp)->cc_evcnt->reseed.ev_count++; 328 /* Generate data. Failure here means it's time to reseed. */
|
/netbsd-current/crypto/external/bsd/openssl/dist/providers/implementations/rands/ |
H A D | drbg_local.h | 25 /* Maximum reseed intervals */ 29 /* Default reseed intervals */ 83 int (*reseed)(PROV_DRBG *drbg, const unsigned char *ent, size_t ent_len, member in struct:prov_drbg_st 103 * openssl_get_fork_id(). Used to provide fork-safety and reseed this 136 * Counts the number of generate requests since the last reseed 142 * Maximum number of generate requests until a reseed is required. 190 int (*reseed)(PROV_DRBG *drbg, const unsigned char *ent, size_t ent_len,
|
H A D | drbg.c | 563 if (!drbg->reseed(drbg, NULL, 0, ent, ent_len)) { 568 if (!drbg->reseed(drbg, ent, ent_len, adin, adinlen)) { 588 if (!drbg->reseed(drbg, entropy, entropylen, adin, adinlen)) 774 int (*reseed)(PROV_DRBG *drbg, const unsigned char *ent, size_t ent_len, 795 drbg->reseed = reseed;
|
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/hcrypto/ |
H A D | rand-fortuna.c | 85 /* for one big request, reseed after this many bytes */ 89 * Skip reseed if pool 0 has less than this many 90 * bytes added since last reseed. 211 * The time between reseed must be at least RESEED_INTERVAL 235 /* reseed will happen, update last_reseed_time */ 248 reseed(FState * st) function 259 * Both #0 and #1 reseed would use only pool 0. Just skip #0 then. 393 /* Should we reseed? */ 396 reseed(st); 402 /* If we forked, force a reseed agai [all...] |
/netbsd-current/crypto/external/bsd/openssl.old/dist/crypto/rand/ |
H A D | rand_local.h | 26 /* Maximum reseed intervals */ 30 /* Default reseed intervals */ 109 /* reseed */ 131 RAND_DRBG_reseed_fn reseed; member in struct:rand_drbg_method_st 193 * openssl_get_fork_id(). Used to provide fork-safety and reseed this 237 /* Counts the number of generate requests since the last reseed. */ 240 * Maximum number of generate requests until a reseed is required. 253 * Enables reseed propagation (see following comment)
|
H A D | drbg_lib.c | 436 if (!drbg->meth->reseed(drbg, entropy, entropylen, adin, adinlen)) 541 drbg->meth->reseed(drbg, adin, adinlen, NULL, 0); 705 * Set the reseed interval. 707 * The drbg will reseed automatically whenever the number of generate 708 * requests exceeds the given reseed interval. If the reseed interval 722 * Set the reseed time interval. 724 * The drbg will reseed automatically whenever the time elapsed since 725 * the last reseeding exceeds the given reseed time interval. For safety, 740 * Set the default values for reseed (tim [all...] |
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/evp/ |
H A D | evp_rand.c | 38 OSSL_FUNC_rand_reseed_fn *reseed; member in struct:evp_rand_st 170 if (rand->reseed != NULL) 172 rand->reseed = OSSL_FUNC_rand_reseed(fns); 590 if (ctx->meth->reseed != NULL) 591 return ctx->meth->reseed(ctx->algctx, prediction_resistance,
|
/netbsd-current/sys/crypto/nist_hash_drbg/ |
H A D | nist_hash_drbg.c | 212 * indication that a reseed is required. 475 bool reseed; 483 .reseed = false, 550 .reseed = false, 617 .reseed = false, 684 .reseed = false, 751 .reseed = true, 818 .reseed = true, 885 .reseed = true, 952 .reseed 466 bool reseed; member in struct:__anon1 [all...] |