/src/etc/rc.d/ |
entropy | 3 # $NetBSD: entropy,v 1.1 2021/01/10 23:24:25 riastradh Exp $ 6 # PROVIDE: entropy 12 name="entropy" 18 case ${entropy-} in 20 check) echo -n "Checking for entropy..." 28 echo "not enough entropy available, aborting boot." 32 wait) echo -n "Waiting for entropy..."
|
sshd | 24 if [ $( sysctl -n kern.entropy.needed ) -ne 0 ]; then 29 not enough entropy configured, so they may be predictable. 31 To fix, follow the "Adding entropy" section in the entropy(7) 32 man page. After this machine has enough entropy, re-generate
|
Makefile | 23 entropy envsys \
|
/src/sys/rump/dev/lib/libvirtio_viornd/ |
Makefile | 9 COMMENT=VirtIO entropy driver
|
/src/sbin/rndctl/ |
rndctl.c | 155 /* Find how much entropy is in the pool. */ 186 * Report an upper bound on the min-entropy of the seed data. 187 * We take the larger of the system entropy and the extra 188 * entropy -- the system state and the extra input may or may 195 rs.entropy = MIN(MAX(systementropy, extraentropy), 199 * Compute the checksum on the 32-bit entropy count, followed 203 SHA1Update(&s, (const uint8_t *)&rs.entropy, sizeof(rs.entropy)); 258 if (sysctlbyname("kern.entropy.consolidate", NULL, NULL, 260 warn("consolidate entropy"); [all...] |
/src/share/man/man7/ |
Makefile | 10 MAN+= entropy.7 52 entropy.7 random.7
|
/src/tests/kernel/ |
t_rnd.c | 63 rd.entropy = 1; 85 rd.entropy = 1;
|
/src/usr.sbin/sysinst/ |
msg.entropy.en | 1 /* $NetBSD: msg.entropy.en,v 1.4 2022/04/21 17:30:15 martin Exp $ */ 29 message Configure_entropy {Set up entropy} 35 number generator. There is not enough entropy available to create secure 40 the entropy setup now! 50 message entropy_download_seed {Import a NetBSD entropy file} 97 * $0 = content of file NetBSD entropy seed file 103 * $0 = content of file NetBSD entropy seed file 106 {Since not enough entropy is available on this system, all crytographic 118 {NetBSD entropy seed file} 122 generator you can create an entropy snapshot like this: [all...] |
msg.entropy.es | 1 /* $NetBSD: msg.entropy.es,v 1.5 2022/04/21 17:30:15 martin Exp $ */ 29 message Configure_entropy {Set up entropy} 35 number generator. There is not enough entropy available to create secure 40 the entropy setup now! 50 message entropy_download_seed {Import a NetBSD entropy file} 97 * $0 = content of file NetBSD entropy seed file 103 * $0 = content of file NetBSD entropy seed file 106 {Since not enough entropy is available on this system, all crytographic 118 {NetBSD entropy seed file} 122 generator you can create an entropy snapshot like this: [all...] |
msg.entropy.fr | 1 /* $NetBSD: msg.entropy.fr,v 1.5 2022/04/21 17:30:15 martin Exp $ */ 29 message Configure_entropy {Set up entropy} 35 number generator. There is not enough entropy available to create secure 40 the entropy setup now! 50 message entropy_download_seed {Import a NetBSD entropy file} 97 * $0 = content of file NetBSD entropy seed file 103 * $0 = content of file NetBSD entropy seed file 106 {Since not enough entropy is available on this system, all crytographic 118 {NetBSD entropy seed file} 122 generator you can create an entropy snapshot like this: [all...] |
msg.entropy.pl | 1 /* $NetBSD: msg.entropy.pl,v 1.5 2022/04/21 17:30:15 martin Exp $ */ 29 message Configure_entropy {Set up entropy} 35 number generator. There is not enough entropy available to create secure 40 the entropy setup now! 50 message entropy_download_seed {Import a NetBSD entropy file} 97 * $0 = content of file NetBSD entropy seed file 103 * $0 = content of file NetBSD entropy seed file 106 {Since not enough entropy is available on this system, all crytographic 118 {NetBSD entropy seed file} 122 generator you can create an entropy snapshot like this: [all...] |
/src/etc/defaults/ |
security.conf | 51 random_file=/var/db/entropy-file
|
rc.conf | 387 # Entropy load/save to/from /dev/random at startup/shutdown 391 # Set to `check' to abort multi-user boot if not enough entropy, or 392 # `wait' to wait until enough entropy, or `' (empty) to boot without 395 entropy="wait" key
|
/src/sys/sys/ |
rndio.h | 41 * Exposed "size" of entropy pool, for convenience in load/save 47 uint32_t entropy; member in struct:__anon55e960fb0108 68 uint32_t total; /* entropy from this source */ 76 uint32_t dt_total; /* time-delta entropy estimate */ 78 uint32_t dv_total; /* value-delta entropy estimate */ 90 #define RND_FLAG_ESTIMATE_TIME 0x00004000 /* estimate entropy on time */ 91 #define RND_FLAG_ESTIMATE_VALUE 0x00008000 /* estimate entropy on value */ 155 * Add entropy to the pool. len is the data length, in bytes. 156 * entropy is the number of bits of estimated entropy in the data 160 uint32_t entropy; member in struct:__anon55e960fb0a08 [all...] |
/src/sys/arch/amd64/stand/prekern/ |
prng.c | 46 uint32_t entropy; member in struct:__anon3e15344a0108 103 "size mismatch in entropy file"); 110 SHA1Update(&sig, (uint8_t *)&rndsave->entropy, 111 sizeof(rndsave->entropy)); 116 "bad SHA1 checksum in entropy file"); 124 print_state(STATE_WARNING, "No entropy file could be loaded"); 176 print_state(STATE_WARNING, "No CPU entropy feature detected");
|
/src/sys/kern/ |
kern_entropy.c | 33 * Entropy subsystem 35 * * Each CPU maintains a per-CPU entropy pool so that gathering 36 * entropy requires no interprocessor synchronization, except 37 * early at boot when we may be scrambling to gather entropy as 40 * - entropy_enter gathers entropy and never drops it on the 43 * - entropy_enter_intr gathers entropy or drops it on the 48 * can transition to full entropy in one swell foop. Otherwise, 49 * it defers to a housekeeping thread that consolidates entropy, 50 * but only when the CPUs collectively have full entropy, in 53 * * The entropy housekeeping thread continues to consolidat [all...] |
sys_getrandom.c | 44 #include <sys/entropy.h> 88 * Try to get a seed from the entropy pool. Fail if we would 90 * is partial entropy; if !GRND_INSECURE, set ENTROPY_HARDFAIL 92 * anything from a partial pool if we can't get full entropy. 116 * Clamp /dev/random output to the entropy capacity and
|
subr_cprng.c | 35 * Per-CPU NIST Hash_DRBG, reseeded automatically from the entropy 36 * pool when we transition to full entropy, never blocking. This 61 #include <sys/entropy.h> 239 * defer reading from the entropy pool as long as possible. 275 * Drop everything to extract a fresh seed from the entropy 280 * big deal -- worst case, we rewind the entropy epoch here and 323 /* If the entropy epoch has changed, (re)seed. */
|
/src/sys/dev/ |
random.c | 37 * system has enough entropy. 40 * the global entropy pool, and draw from it. 45 * Reading from /dev/random may block until entropy is available. 57 #include <sys/entropy.h> 99 /* Entropy source for writes to /dev/random and /dev/urandom */ 196 * Generate data from a PRNG seeded from the entropy pool. 198 * - If /dev/random, block until we have full entropy, or fail 199 * with EWOULDBLOCK, and if `depleting' entropy, return at most 200 * the entropy pool's capacity at once. 203 * entropy pool now [all...] |
/src/sys/dev/acpi/ |
acpi_vmgenid.c | 50 #include <sys/entropy.h> 271 * Enter the new VM generation ID into the entropy pool. 296 * Reset the system entropy pool's measure of entropy (not the 298 * entropy), and gather more entropy from any synchronous 306 * Grab the current VM generation ID to put it into the entropy 308 * draws from the entropy pool and the entropy epoch advances.
|
/src/sys/crypto/cprng_fast/ |
cprng_fast.c | 40 #include <sys/entropy.h>
|
/src/sys/crypto/nist_hash_drbg/ |
nist_hash_drbg.c | 121 const secret void *entropy, size_t entropylen, 129 { .hv_base = entropy, .hv_len = entropylen }, 161 const secret void *entropy, size_t entropylen, 168 { .hv_base = entropy, .hv_len = entropylen },
|
/src/sys/external/isc/libsodium/dist/ |
configure.ac | 253 AX_CHECK_LINK_FLAG([-Wl,--high-entropy-va], [LDFLAGS="$LDFLAGS -Wl,--high-entropy-va"])
|
/src/sys/arch/powerpc/oea/ |
pmap.c | 1154 register_t entropy = MFTB(); local in function:pmap_pinit 1169 * entropy from the timebase register. This is to make the 1174 pmap_vsidcontext = (pmap_vsidcontext * 0x1105) + entropy; 1177 entropy += 0xbadf00d; 1186 entropy = hash ^ (hash >> 16);
|
/src/sys/net/ |
if_ethersubr.c | 88 #include <sys/entropy.h>
|