Home
last modified time | relevance | path

Searched refs:entropy (Results 1 – 25 of 188) sorted by relevance

12345678

/netbsd-src/crypto/external/bsd/openssl/dist/crypto/rand/
H A Drand_pool.c66 size_t entropy) in ossl_rand_pool_attach() argument
86 pool->entropy = entropy; in ossl_rand_pool_attach()
128 return pool->entropy; in ossl_rand_pool_entropy()
149 pool->entropy = 0; in ossl_rand_pool_detach()
182 if (pool->entropy < pool->entropy_requested) in ossl_rand_pool_entropy_available()
188 return pool->entropy; in ossl_rand_pool_entropy_available()
198 if (pool->entropy < pool->entropy_requested) in ossl_rand_pool_entropy_needed()
199 return pool->entropy_requested - pool->entropy; in ossl_rand_pool_entropy_needed()
306 const unsigned char *buffer, size_t len, size_t entropy) in ossl_rand_pool_add() argument
342 pool->entropy += entropy; in ossl_rand_pool_add()
[all …]
/netbsd-src/sbin/rndctl/
H A Drndctl.c195 rs.entropy = MIN(MAX(systementropy, extraentropy), in update_seed()
203 SHA1Update(&s, (const uint8_t *)&rs.entropy, sizeof(rs.entropy)); in update_seed()
335 SHA1Update(&s, (const uint8_t *)&rs.entropy, sizeof(rs.entropy)); in do_load()
346 rs.entropy = 0; in do_load()
354 if (howmany(rs.entropy, NBBY) > sizeof(rs.data)) { in do_load()
355 rs.entropy = bswap32(rs.entropy); in do_load()
356 if (howmany(rs.entropy, NBBY) > sizeof(rs.data)) { in do_load()
358 rs.entropy = 0; in do_load()
364 rs.entropy = 0; in do_load()
367 if (rs.entropy == 0) { in do_load()
[all …]
/netbsd-src/crypto/external/bsd/openssl.old/dist/crypto/rand/
H A Drand_lib.c131 int entropy, size_t min_len, size_t max_len, in rand_drbg_get_entropy() argument
149 pool->entropy_requested = entropy; in rand_drbg_get_entropy()
151 pool = rand_pool_new(entropy, drbg->secure, min_len, max_len); in rand_drbg_get_entropy()
236 int entropy, size_t min_len, size_t max_len) in rand_drbg_get_nonce() argument
485 size_t entropy) in rand_pool_attach() argument
505 pool->entropy = entropy; in rand_pool_attach()
547 return pool->entropy; in rand_pool_entropy()
568 pool->entropy = 0; in rand_pool_detach()
601 if (pool->entropy < pool->entropy_requested) in rand_pool_entropy_available()
607 return pool->entropy; in rand_pool_entropy_available()
[all …]
H A Ddrbg_lib.c291 unsigned char *nonce = NULL, *entropy = NULL; in RAND_DRBG_instantiate() local
331 entropylen = drbg->get_entropy(drbg, &entropy, min_entropy, in RAND_DRBG_instantiate()
348 if (!drbg->meth->instantiate(drbg, entropy, entropylen, in RAND_DRBG_instantiate()
361 if (entropy != NULL && drbg->cleanup_entropy != NULL) in RAND_DRBG_instantiate()
362 drbg->cleanup_entropy(drbg, entropy, entropylen); in RAND_DRBG_instantiate()
405 unsigned char *entropy = NULL; in RAND_DRBG_reseed() local
426 entropylen = drbg->get_entropy(drbg, &entropy, drbg->strength, in RAND_DRBG_reseed()
436 if (!drbg->meth->reseed(drbg, entropy, entropylen, adin, adinlen)) in RAND_DRBG_reseed()
446 if (entropy != NULL && drbg->cleanup_entropy != NULL) in RAND_DRBG_reseed()
447 drbg->cleanup_entropy(drbg, entropy, entropylen); in RAND_DRBG_reseed()
[all …]
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man7/
H A DEVP_RAND.pod20 systems's entropy sources and providing access to deterministic random
49 You need to integrate a previously unsupported entropy source.
63 An EVP_RAND instance can be used as the entropy source of another
64 EVP_RAND instance, provided it has itself access to a valid entropy source.
65 The EVP_RAND instance which acts as entropy source is called the I<parent>,
67 it does not make sense for the child to be an entropy source.
73 a live entropy source may ignore and not use its parent.
89 either from os entropy sources or by consuming randomness which was added
121 thread. Using the <primary> DRBG as entropy source for multiple DRBG
131 | os entropy sources |
[all …]
/netbsd-src/crypto/external/bsd/openssl.old/dist/test/
H A Ddrbg_cavs_test.c26 const unsigned char *entropy; member
35 int entropy, size_t min_len, size_t max_len, in kat_entropy() argument
41 *pout = (unsigned char *)t->entropy; in kat_entropy()
46 int entropy, size_t min_len, size_t max_len) in kat_nonce() argument
86 t.entropy = data->entropyin; in single_kat_no_reseed()
145 t.entropy = data->entropyin; in single_kat_pr_false()
158 t.entropy = data->entropyinreseed; in single_kat_pr_false()
211 t.entropy = data->entropyin; in single_kat_pr_true()
222 t.entropy = data->entropyinpr1; in single_kat_pr_true()
229 t.entropy = data->entropyinpr2; in single_kat_pr_true()
H A Ddrbgtest.c41 const unsigned char *entropy; member
124 const unsigned char *entropy; member
133 int entropy, size_t min_len, size_t max_len, in kat_entropy() argument
139 *pout = (unsigned char *)t->entropy; in kat_entropy()
144 int entropy, size_t min_len, size_t max_len) in kat_nonce() argument
183 t.entropy = td->entropy; in single_kat()
196 t.entropy = td->entropyreseed; in single_kat()
214 t.entropy = td->entropy_pr; in single_kat()
227 t.entropy = td->entropypr_pr; in single_kat()
237 t.entropy = td->entropyg_pr; in single_kat()
[all …]
/netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man3/
H A DRAND_DRBG_set_callbacks.pod29 int entropy,
40 int entropy,
51 RAND_DRBG_set_callbacks() sets the callbacks for obtaining fresh entropy and
64 B<min_len> <= size <= B<max_len> (in bytes) which contains at least B<entropy>
72 If the callback fails to acquire at least B<entropy> bits of randomness,
107 entropy from one of the approved entropy sources listed in section 5.5.2 of
110 to such an approved entropy source, a request for prediction resistance will
118 source has "full entropy", i.e., contains 8 bits of entropy per byte.
122 In this case the DRBG will automatically request an extra amount of entropy
H A DRAND_DRBG_reseed.pod36 reseeds the given B<drbg>, obtaining entropy input from its entropy source
41 An immediate reseeding from a live entropy source can be requested by setting
84 Normally, the entropy input for seeding a DRBG is either obtained from a
85 trusted os entropy source or from a parent DRBG instance, which was seeded
86 (directly or indirectly) from a trusted os entropy source.
H A DRAND_bytes.pod35 was able to seed itself from a trusted entropy source.
40 If the entropy source fails or is not available, the CSPRNG will enter an
45 On other platforms, there might not be a trusted entropy source available
46 or OpenSSL might have been explicitly configured to use different entropy sources.
47 If you are in doubt about the quality of the entropy source, don't hesitate to ask
H A DRAND_DRBG_generate.pod37 generator but does not contribute to the entropy count.
44 which collects some additional data from low entropy sources
62 entropy from one of the approved entropy sources listed in section 5.5.2 of
65 entropy source, a request for prediction resistance will always fail.
/netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man7/
H A DRAND_DRBG.pod22 systems's entropy sources and providing access to the DRBG's
48 You need to integrate a previously unsupported entropy source.
60 A DRBG instance can be used as the entropy source of another DRBG instance,
61 provided it has itself access to a valid entropy source.
62 The DRBG instance which acts as entropy source is called the I<parent> DRBG,
83 either from os entropy sources or by consuming randomness which was added
117 thread. Using the <master> DRBG as entropy source for multiple DRBG
127 | os entropy sources |
156 its entropy source. The entropy source can be either a trusted operating
157 system entropy source, or another DRBG with access to such a source.
[all …]
/netbsd-src/usr.sbin/sysinst/
H A Dmsg.entropy.en1 /* $NetBSD: msg.entropy.en,v 1.4 2022/04/21 17:30:15 martin Exp $ */
29 message Configure_entropy {Set up entropy}
35 number generator. There is not enough entropy available to create secure
40 the entropy setup now!
50 message entropy_download_seed {Import a NetBSD entropy file}
97 * $0 = content of file NetBSD entropy seed file
103 * $0 = content of file NetBSD entropy seed file
106 {Since not enough entropy is available on this system, all crytographic
118 {NetBSD entropy seed file}
122 generator you can create an entropy snapshot like this:}
H A Dmsg.entropy.es1 /* $NetBSD: msg.entropy.es,v 1.5 2022/04/21 17:30:15 martin Exp $ */
29 message Configure_entropy {Set up entropy}
35 number generator. There is not enough entropy available to create secure
40 the entropy setup now!
50 message entropy_download_seed {Import a NetBSD entropy file}
97 * $0 = content of file NetBSD entropy seed file
103 * $0 = content of file NetBSD entropy seed file
106 {Since not enough entropy is available on this system, all crytographic
118 {NetBSD entropy seed file}
122 generator you can create an entropy snapshot like this:}
H A Dmsg.entropy.fr1 /* $NetBSD: msg.entropy.fr,v 1.5 2022/04/21 17:30:15 martin Exp $ */
29 message Configure_entropy {Set up entropy}
35 number generator. There is not enough entropy available to create secure
40 the entropy setup now!
50 message entropy_download_seed {Import a NetBSD entropy file}
97 * $0 = content of file NetBSD entropy seed file
103 * $0 = content of file NetBSD entropy seed file
106 {Since not enough entropy is available on this system, all crytographic
118 {NetBSD entropy seed file}
122 generator you can create an entropy snapshot like this:}
H A Dmsg.entropy.pl29 message Configure_entropy {Set up entropy}
35 number generator. There is not enough entropy available to create secure
40 the entropy setup now!
50 message entropy_download_seed {Import a NetBSD entropy file}
106 {Since not enough entropy is available on this system, all crytographic
118 {NetBSD entropy seed file}
122 generator you can create an entropy snapshot like this:}
/netbsd-src/crypto/external/bsd/openssl.old/dist/include/crypto/
H A Drand.h47 int entropy, size_t min_len, size_t max_len,
53 int entropy, size_t min_len, size_t max_len);
67 size_t entropy);
84 const unsigned char *buffer, size_t len, size_t entropy);
86 int rand_pool_add_end(RAND_POOL *pool, size_t len, size_t entropy);
/netbsd-src/external/bsd/libevent/dist/
H A Darc4random.c257 unsigned char entropy[64]; in arc4_seed_proc_sys_kernel_random_uuid() local
267 memset(entropy, 0, sizeof(entropy)); in arc4_seed_proc_sys_kernel_random_uuid()
272 entropy[nybbles/2] |= nyb; in arc4_seed_proc_sys_kernel_random_uuid()
274 entropy[nybbles/2] |= nyb<<4; in arc4_seed_proc_sys_kernel_random_uuid()
281 arc4_addrandom(entropy, nybbles/2); in arc4_seed_proc_sys_kernel_random_uuid()
284 evutil_memclear_(entropy, sizeof(entropy)); in arc4_seed_proc_sys_kernel_random_uuid()
/netbsd-src/crypto/external/bsd/openssl/dist/include/crypto/
H A Drand_pool.h81 size_t entropy; /* current entropy count in bits */ member
88 size_t entropy);
105 const unsigned char *buffer, size_t len, size_t entropy);
107 int ossl_rand_pool_add_end(RAND_POOL *pool, size_t len, size_t entropy);
/netbsd-src/crypto/external/bsd/openssl/dist/providers/implementations/rands/
H A Dtest_rng.c45 unsigned char *entropy, *nonce; member
71 OPENSSL_free(t->entropy); in test_rng_free()
110 memcpy(out, t->entropy + t->entropy_pos, outlen); in test_rng_generate()
189 OPENSSL_free(t->entropy); in test_rng_set_ctx_params()
190 t->entropy = ptr; in test_rng_set_ctx_params()
231 int entropy, size_t min_len, size_t max_len, in test_rng_get_seed() argument
238 *pout = t->entropy; in test_rng_get_seed()
/netbsd-src/etc/rc.d/
H A Dsshd24 if [ $( sysctl -n kern.entropy.needed ) -ne 0 ]; then
29 not enough entropy configured, so they may be predictable.
31 To fix, follow the "Adding entropy" section in the entropy(7)
32 man page. After this machine has enough entropy, re-generate
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man3/
H A DRAND_bytes.pod52 was able to seed itself from a trusted entropy source.
57 If the entropy source fails or is not available, the CSPRNG will enter an
62 On other platforms, there might not be a trusted entropy source available
63 or OpenSSL might have been explicitly configured to use different entropy sources.
64 If you are in doubt about the quality of the entropy source, don't hesitate to ask
/netbsd-src/etc/etc.amd64/
H A Dboot.cfg1 menu=Boot normally:rndseed /var/db/entropy-file;boot
2 menu=Boot single user:rndseed /var/db/entropy-file;boot -s
/netbsd-src/etc/etc.i386/
H A Dboot.cfg1 menu=Boot normally:rndseed /var/db/entropy-file;boot
2 menu=Boot single user:rndseed /var/db/entropy-file;boot -s
/netbsd-src/distrib/utils/embedded/files/
H A Dboot.cfg1 menu=Boot normally:rndseed /var/db/entropy-file;boot
2 menu=Boot single user:rndseed /var/db/entropy-file;boot -s

12345678