/netbsd-src/crypto/external/bsd/openssl/dist/crypto/rand/ |
H A D | rand_pool.c | 66 size_t entropy) in ossl_rand_pool_attach() argument 86 pool->entropy = entropy; in ossl_rand_pool_attach() 128 return pool->entropy; in ossl_rand_pool_entropy() 149 pool->entropy = 0; in ossl_rand_pool_detach() 182 if (pool->entropy < pool->entropy_requested) in ossl_rand_pool_entropy_available() 188 return pool->entropy; in ossl_rand_pool_entropy_available() 198 if (pool->entropy < pool->entropy_requested) in ossl_rand_pool_entropy_needed() 199 return pool->entropy_requested - pool->entropy; in ossl_rand_pool_entropy_needed() 306 const unsigned char *buffer, size_t len, size_t entropy) in ossl_rand_pool_add() argument 342 pool->entropy += entropy; in ossl_rand_pool_add() [all …]
|
/netbsd-src/sbin/rndctl/ |
H A D | rndctl.c | 195 rs.entropy = MIN(MAX(systementropy, extraentropy), in update_seed() 203 SHA1Update(&s, (const uint8_t *)&rs.entropy, sizeof(rs.entropy)); in update_seed() 335 SHA1Update(&s, (const uint8_t *)&rs.entropy, sizeof(rs.entropy)); in do_load() 346 rs.entropy = 0; in do_load() 354 if (howmany(rs.entropy, NBBY) > sizeof(rs.data)) { in do_load() 355 rs.entropy = bswap32(rs.entropy); in do_load() 356 if (howmany(rs.entropy, NBBY) > sizeof(rs.data)) { in do_load() 358 rs.entropy = 0; in do_load() 364 rs.entropy = 0; in do_load() 367 if (rs.entropy == 0) { in do_load() [all …]
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/crypto/rand/ |
H A D | rand_lib.c | 131 int entropy, size_t min_len, size_t max_len, in rand_drbg_get_entropy() argument 149 pool->entropy_requested = entropy; in rand_drbg_get_entropy() 151 pool = rand_pool_new(entropy, drbg->secure, min_len, max_len); in rand_drbg_get_entropy() 236 int entropy, size_t min_len, size_t max_len) in rand_drbg_get_nonce() argument 485 size_t entropy) in rand_pool_attach() argument 505 pool->entropy = entropy; in rand_pool_attach() 547 return pool->entropy; in rand_pool_entropy() 568 pool->entropy = 0; in rand_pool_detach() 601 if (pool->entropy < pool->entropy_requested) in rand_pool_entropy_available() 607 return pool->entropy; in rand_pool_entropy_available() [all …]
|
H A D | drbg_lib.c | 291 unsigned char *nonce = NULL, *entropy = NULL; in RAND_DRBG_instantiate() local 331 entropylen = drbg->get_entropy(drbg, &entropy, min_entropy, in RAND_DRBG_instantiate() 348 if (!drbg->meth->instantiate(drbg, entropy, entropylen, in RAND_DRBG_instantiate() 361 if (entropy != NULL && drbg->cleanup_entropy != NULL) in RAND_DRBG_instantiate() 362 drbg->cleanup_entropy(drbg, entropy, entropylen); in RAND_DRBG_instantiate() 405 unsigned char *entropy = NULL; in RAND_DRBG_reseed() local 426 entropylen = drbg->get_entropy(drbg, &entropy, drbg->strength, in RAND_DRBG_reseed() 436 if (!drbg->meth->reseed(drbg, entropy, entropylen, adin, adinlen)) in RAND_DRBG_reseed() 446 if (entropy != NULL && drbg->cleanup_entropy != NULL) in RAND_DRBG_reseed() 447 drbg->cleanup_entropy(drbg, entropy, entropylen); in RAND_DRBG_reseed() [all …]
|
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man7/ |
H A D | EVP_RAND.pod | 20 systems's entropy sources and providing access to deterministic random 49 You need to integrate a previously unsupported entropy source. 63 An EVP_RAND instance can be used as the entropy source of another 64 EVP_RAND instance, provided it has itself access to a valid entropy source. 65 The EVP_RAND instance which acts as entropy source is called the I<parent>, 67 it does not make sense for the child to be an entropy source. 73 a live entropy source may ignore and not use its parent. 89 either from os entropy sources or by consuming randomness which was added 121 thread. Using the <primary> DRBG as entropy source for multiple DRBG 131 | os entropy sources | [all …]
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/test/ |
H A D | drbg_cavs_test.c | 26 const unsigned char *entropy; member 35 int entropy, size_t min_len, size_t max_len, in kat_entropy() argument 41 *pout = (unsigned char *)t->entropy; in kat_entropy() 46 int entropy, size_t min_len, size_t max_len) in kat_nonce() argument 86 t.entropy = data->entropyin; in single_kat_no_reseed() 145 t.entropy = data->entropyin; in single_kat_pr_false() 158 t.entropy = data->entropyinreseed; in single_kat_pr_false() 211 t.entropy = data->entropyin; in single_kat_pr_true() 222 t.entropy = data->entropyinpr1; in single_kat_pr_true() 229 t.entropy = data->entropyinpr2; in single_kat_pr_true()
|
H A D | drbgtest.c | 41 const unsigned char *entropy; member 124 const unsigned char *entropy; member 133 int entropy, size_t min_len, size_t max_len, in kat_entropy() argument 139 *pout = (unsigned char *)t->entropy; in kat_entropy() 144 int entropy, size_t min_len, size_t max_len) in kat_nonce() argument 183 t.entropy = td->entropy; in single_kat() 196 t.entropy = td->entropyreseed; in single_kat() 214 t.entropy = td->entropy_pr; in single_kat() 227 t.entropy = td->entropypr_pr; in single_kat() 237 t.entropy = td->entropyg_pr; in single_kat() [all …]
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man3/ |
H A D | RAND_DRBG_set_callbacks.pod | 29 int entropy, 40 int entropy, 51 RAND_DRBG_set_callbacks() sets the callbacks for obtaining fresh entropy and 64 B<min_len> <= size <= B<max_len> (in bytes) which contains at least B<entropy> 72 If the callback fails to acquire at least B<entropy> bits of randomness, 107 entropy from one of the approved entropy sources listed in section 5.5.2 of 110 to such an approved entropy source, a request for prediction resistance will 118 source has "full entropy", i.e., contains 8 bits of entropy per byte. 122 In this case the DRBG will automatically request an extra amount of entropy
|
H A D | RAND_DRBG_reseed.pod | 36 reseeds the given B<drbg>, obtaining entropy input from its entropy source 41 An immediate reseeding from a live entropy source can be requested by setting 84 Normally, the entropy input for seeding a DRBG is either obtained from a 85 trusted os entropy source or from a parent DRBG instance, which was seeded 86 (directly or indirectly) from a trusted os entropy source.
|
H A D | RAND_bytes.pod | 35 was able to seed itself from a trusted entropy source. 40 If the entropy source fails or is not available, the CSPRNG will enter an 45 On other platforms, there might not be a trusted entropy source available 46 or OpenSSL might have been explicitly configured to use different entropy sources. 47 If you are in doubt about the quality of the entropy source, don't hesitate to ask
|
H A D | RAND_DRBG_generate.pod | 37 generator but does not contribute to the entropy count. 44 which collects some additional data from low entropy sources 62 entropy from one of the approved entropy sources listed in section 5.5.2 of 65 entropy source, a request for prediction resistance will always fail.
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/doc/man7/ |
H A D | RAND_DRBG.pod | 22 systems's entropy sources and providing access to the DRBG's 48 You need to integrate a previously unsupported entropy source. 60 A DRBG instance can be used as the entropy source of another DRBG instance, 61 provided it has itself access to a valid entropy source. 62 The DRBG instance which acts as entropy source is called the I<parent> DRBG, 83 either from os entropy sources or by consuming randomness which was added 117 thread. Using the <master> DRBG as entropy source for multiple DRBG 127 | os entropy sources | 156 its entropy source. The entropy source can be either a trusted operating 157 system entropy source, or another DRBG with access to such a source. [all …]
|
/netbsd-src/usr.sbin/sysinst/ |
H A D | msg.entropy.en | 1 /* $NetBSD: msg.entropy.en,v 1.4 2022/04/21 17:30:15 martin Exp $ */ 29 message Configure_entropy {Set up entropy} 35 number generator. There is not enough entropy available to create secure 40 the entropy setup now! 50 message entropy_download_seed {Import a NetBSD entropy file} 97 * $0 = content of file NetBSD entropy seed file 103 * $0 = content of file NetBSD entropy seed file 106 {Since not enough entropy is available on this system, all crytographic 118 {NetBSD entropy seed file} 122 generator you can create an entropy snapshot like this:}
|
H A D | msg.entropy.es | 1 /* $NetBSD: msg.entropy.es,v 1.5 2022/04/21 17:30:15 martin Exp $ */ 29 message Configure_entropy {Set up entropy} 35 number generator. There is not enough entropy available to create secure 40 the entropy setup now! 50 message entropy_download_seed {Import a NetBSD entropy file} 97 * $0 = content of file NetBSD entropy seed file 103 * $0 = content of file NetBSD entropy seed file 106 {Since not enough entropy is available on this system, all crytographic 118 {NetBSD entropy seed file} 122 generator you can create an entropy snapshot like this:}
|
H A D | msg.entropy.fr | 1 /* $NetBSD: msg.entropy.fr,v 1.5 2022/04/21 17:30:15 martin Exp $ */ 29 message Configure_entropy {Set up entropy} 35 number generator. There is not enough entropy available to create secure 40 the entropy setup now! 50 message entropy_download_seed {Import a NetBSD entropy file} 97 * $0 = content of file NetBSD entropy seed file 103 * $0 = content of file NetBSD entropy seed file 106 {Since not enough entropy is available on this system, all crytographic 118 {NetBSD entropy seed file} 122 generator you can create an entropy snapshot like this:}
|
H A D | msg.entropy.pl | 29 message Configure_entropy {Set up entropy} 35 number generator. There is not enough entropy available to create secure 40 the entropy setup now! 50 message entropy_download_seed {Import a NetBSD entropy file} 106 {Since not enough entropy is available on this system, all crytographic 118 {NetBSD entropy seed file} 122 generator you can create an entropy snapshot like this:}
|
/netbsd-src/crypto/external/bsd/openssl.old/dist/include/crypto/ |
H A D | rand.h | 47 int entropy, size_t min_len, size_t max_len, 53 int entropy, size_t min_len, size_t max_len); 67 size_t entropy); 84 const unsigned char *buffer, size_t len, size_t entropy); 86 int rand_pool_add_end(RAND_POOL *pool, size_t len, size_t entropy);
|
/netbsd-src/external/bsd/libevent/dist/ |
H A D | arc4random.c | 257 unsigned char entropy[64]; in arc4_seed_proc_sys_kernel_random_uuid() local 267 memset(entropy, 0, sizeof(entropy)); in arc4_seed_proc_sys_kernel_random_uuid() 272 entropy[nybbles/2] |= nyb; in arc4_seed_proc_sys_kernel_random_uuid() 274 entropy[nybbles/2] |= nyb<<4; in arc4_seed_proc_sys_kernel_random_uuid() 281 arc4_addrandom(entropy, nybbles/2); in arc4_seed_proc_sys_kernel_random_uuid() 284 evutil_memclear_(entropy, sizeof(entropy)); in arc4_seed_proc_sys_kernel_random_uuid()
|
/netbsd-src/crypto/external/bsd/openssl/dist/include/crypto/ |
H A D | rand_pool.h | 81 size_t entropy; /* current entropy count in bits */ member 88 size_t entropy); 105 const unsigned char *buffer, size_t len, size_t entropy); 107 int ossl_rand_pool_add_end(RAND_POOL *pool, size_t len, size_t entropy);
|
/netbsd-src/crypto/external/bsd/openssl/dist/providers/implementations/rands/ |
H A D | test_rng.c | 45 unsigned char *entropy, *nonce; member 71 OPENSSL_free(t->entropy); in test_rng_free() 110 memcpy(out, t->entropy + t->entropy_pos, outlen); in test_rng_generate() 189 OPENSSL_free(t->entropy); in test_rng_set_ctx_params() 190 t->entropy = ptr; in test_rng_set_ctx_params() 231 int entropy, size_t min_len, size_t max_len, in test_rng_get_seed() argument 238 *pout = t->entropy; in test_rng_get_seed()
|
/netbsd-src/etc/rc.d/ |
H A D | sshd | 24 if [ $( sysctl -n kern.entropy.needed ) -ne 0 ]; then 29 not enough entropy configured, so they may be predictable. 31 To fix, follow the "Adding entropy" section in the entropy(7) 32 man page. After this machine has enough entropy, re-generate
|
/netbsd-src/crypto/external/bsd/openssl/dist/doc/man3/ |
H A D | RAND_bytes.pod | 52 was able to seed itself from a trusted entropy source. 57 If the entropy source fails or is not available, the CSPRNG will enter an 62 On other platforms, there might not be a trusted entropy source available 63 or OpenSSL might have been explicitly configured to use different entropy sources. 64 If you are in doubt about the quality of the entropy source, don't hesitate to ask
|
/netbsd-src/etc/etc.amd64/ |
H A D | boot.cfg | 1 menu=Boot normally:rndseed /var/db/entropy-file;boot 2 menu=Boot single user:rndseed /var/db/entropy-file;boot -s
|
/netbsd-src/etc/etc.i386/ |
H A D | boot.cfg | 1 menu=Boot normally:rndseed /var/db/entropy-file;boot 2 menu=Boot single user:rndseed /var/db/entropy-file;boot -s
|
/netbsd-src/distrib/utils/embedded/files/ |
H A D | boot.cfg | 1 menu=Boot normally:rndseed /var/db/entropy-file;boot 2 menu=Boot single user:rndseed /var/db/entropy-file;boot -s
|