HomeSort by: relevance | last modified time | path
    Searched refs:entropy (Results 1 - 25 of 26) sorted by relevancy

1 2

  /src/etc/rc.d/
entropy 3 # $NetBSD: entropy,v 1.1 2021/01/10 23:24:25 riastradh Exp $
6 # PROVIDE: entropy
12 name="entropy"
18 case ${entropy-} in
20 check) echo -n "Checking for entropy..."
28 echo "not enough entropy available, aborting boot."
32 wait) echo -n "Waiting for entropy..."
sshd 24 if [ $( sysctl -n kern.entropy.needed ) -ne 0 ]; then
29 not enough entropy configured, so they may be predictable.
31 To fix, follow the "Adding entropy" section in the entropy(7)
32 man page. After this machine has enough entropy, re-generate
Makefile 23 entropy envsys \
  /src/sys/rump/dev/lib/libvirtio_viornd/
Makefile 9 COMMENT=VirtIO entropy driver
  /src/sbin/rndctl/
rndctl.c 155 /* Find how much entropy is in the pool. */
186 * Report an upper bound on the min-entropy of the seed data.
187 * We take the larger of the system entropy and the extra
188 * entropy -- the system state and the extra input may or may
195 rs.entropy = MIN(MAX(systementropy, extraentropy),
199 * Compute the checksum on the 32-bit entropy count, followed
203 SHA1Update(&s, (const uint8_t *)&rs.entropy, sizeof(rs.entropy));
258 if (sysctlbyname("kern.entropy.consolidate", NULL, NULL,
260 warn("consolidate entropy");
    [all...]
  /src/share/man/man7/
Makefile 10 MAN+= entropy.7
52 entropy.7 random.7
  /src/tests/kernel/
t_rnd.c 63 rd.entropy = 1;
85 rd.entropy = 1;
  /src/usr.sbin/sysinst/
msg.entropy.en 1 /* $NetBSD: msg.entropy.en,v 1.4 2022/04/21 17:30:15 martin Exp $ */
29 message Configure_entropy {Set up entropy}
35 number generator. There is not enough entropy available to create secure
40 the entropy setup now!
50 message entropy_download_seed {Import a NetBSD entropy file}
97 * $0 = content of file NetBSD entropy seed file
103 * $0 = content of file NetBSD entropy seed file
106 {Since not enough entropy is available on this system, all crytographic
118 {NetBSD entropy seed file}
122 generator you can create an entropy snapshot like this:
    [all...]
msg.entropy.es 1 /* $NetBSD: msg.entropy.es,v 1.5 2022/04/21 17:30:15 martin Exp $ */
29 message Configure_entropy {Set up entropy}
35 number generator. There is not enough entropy available to create secure
40 the entropy setup now!
50 message entropy_download_seed {Import a NetBSD entropy file}
97 * $0 = content of file NetBSD entropy seed file
103 * $0 = content of file NetBSD entropy seed file
106 {Since not enough entropy is available on this system, all crytographic
118 {NetBSD entropy seed file}
122 generator you can create an entropy snapshot like this:
    [all...]
msg.entropy.fr 1 /* $NetBSD: msg.entropy.fr,v 1.5 2022/04/21 17:30:15 martin Exp $ */
29 message Configure_entropy {Set up entropy}
35 number generator. There is not enough entropy available to create secure
40 the entropy setup now!
50 message entropy_download_seed {Import a NetBSD entropy file}
97 * $0 = content of file NetBSD entropy seed file
103 * $0 = content of file NetBSD entropy seed file
106 {Since not enough entropy is available on this system, all crytographic
118 {NetBSD entropy seed file}
122 generator you can create an entropy snapshot like this:
    [all...]
msg.entropy.pl 1 /* $NetBSD: msg.entropy.pl,v 1.5 2022/04/21 17:30:15 martin Exp $ */
29 message Configure_entropy {Set up entropy}
35 number generator. There is not enough entropy available to create secure
40 the entropy setup now!
50 message entropy_download_seed {Import a NetBSD entropy file}
97 * $0 = content of file NetBSD entropy seed file
103 * $0 = content of file NetBSD entropy seed file
106 {Since not enough entropy is available on this system, all crytographic
118 {NetBSD entropy seed file}
122 generator you can create an entropy snapshot like this:
    [all...]
  /src/etc/defaults/
security.conf 51 random_file=/var/db/entropy-file
rc.conf 387 # Entropy load/save to/from /dev/random at startup/shutdown
391 # Set to `check' to abort multi-user boot if not enough entropy, or
392 # `wait' to wait until enough entropy, or `' (empty) to boot without
395 entropy="wait" key
  /src/sys/sys/
rndio.h 41 * Exposed "size" of entropy pool, for convenience in load/save
47 uint32_t entropy; member in struct:__anon55e960fb0108
68 uint32_t total; /* entropy from this source */
76 uint32_t dt_total; /* time-delta entropy estimate */
78 uint32_t dv_total; /* value-delta entropy estimate */
90 #define RND_FLAG_ESTIMATE_TIME 0x00004000 /* estimate entropy on time */
91 #define RND_FLAG_ESTIMATE_VALUE 0x00008000 /* estimate entropy on value */
155 * Add entropy to the pool. len is the data length, in bytes.
156 * entropy is the number of bits of estimated entropy in the data
160 uint32_t entropy; member in struct:__anon55e960fb0a08
    [all...]
  /src/sys/arch/amd64/stand/prekern/
prng.c 46 uint32_t entropy; member in struct:__anon3e15344a0108
103 "size mismatch in entropy file");
110 SHA1Update(&sig, (uint8_t *)&rndsave->entropy,
111 sizeof(rndsave->entropy));
116 "bad SHA1 checksum in entropy file");
124 print_state(STATE_WARNING, "No entropy file could be loaded");
176 print_state(STATE_WARNING, "No CPU entropy feature detected");
  /src/sys/kern/
kern_entropy.c 33 * Entropy subsystem
35 * * Each CPU maintains a per-CPU entropy pool so that gathering
36 * entropy requires no interprocessor synchronization, except
37 * early at boot when we may be scrambling to gather entropy as
40 * - entropy_enter gathers entropy and never drops it on the
43 * - entropy_enter_intr gathers entropy or drops it on the
48 * can transition to full entropy in one swell foop. Otherwise,
49 * it defers to a housekeeping thread that consolidates entropy,
50 * but only when the CPUs collectively have full entropy, in
53 * * The entropy housekeeping thread continues to consolidat
    [all...]
sys_getrandom.c 44 #include <sys/entropy.h>
88 * Try to get a seed from the entropy pool. Fail if we would
90 * is partial entropy; if !GRND_INSECURE, set ENTROPY_HARDFAIL
92 * anything from a partial pool if we can't get full entropy.
116 * Clamp /dev/random output to the entropy capacity and
subr_cprng.c 35 * Per-CPU NIST Hash_DRBG, reseeded automatically from the entropy
36 * pool when we transition to full entropy, never blocking. This
61 #include <sys/entropy.h>
239 * defer reading from the entropy pool as long as possible.
275 * Drop everything to extract a fresh seed from the entropy
280 * big deal -- worst case, we rewind the entropy epoch here and
323 /* If the entropy epoch has changed, (re)seed. */
  /src/sys/dev/
random.c 37 * system has enough entropy.
40 * the global entropy pool, and draw from it.
45 * Reading from /dev/random may block until entropy is available.
57 #include <sys/entropy.h>
99 /* Entropy source for writes to /dev/random and /dev/urandom */
196 * Generate data from a PRNG seeded from the entropy pool.
198 * - If /dev/random, block until we have full entropy, or fail
199 * with EWOULDBLOCK, and if `depleting' entropy, return at most
200 * the entropy pool's capacity at once.
203 * entropy pool now
    [all...]
  /src/sys/dev/acpi/
acpi_vmgenid.c 50 #include <sys/entropy.h>
271 * Enter the new VM generation ID into the entropy pool.
296 * Reset the system entropy pool's measure of entropy (not the
298 * entropy), and gather more entropy from any synchronous
306 * Grab the current VM generation ID to put it into the entropy
308 * draws from the entropy pool and the entropy epoch advances.
  /src/sys/crypto/cprng_fast/
cprng_fast.c 40 #include <sys/entropy.h>
  /src/sys/crypto/nist_hash_drbg/
nist_hash_drbg.c 121 const secret void *entropy, size_t entropylen,
129 { .hv_base = entropy, .hv_len = entropylen },
161 const secret void *entropy, size_t entropylen,
168 { .hv_base = entropy, .hv_len = entropylen },
  /src/sys/external/isc/libsodium/dist/
configure.ac 253 AX_CHECK_LINK_FLAG([-Wl,--high-entropy-va], [LDFLAGS="$LDFLAGS -Wl,--high-entropy-va"])
  /src/sys/arch/powerpc/oea/
pmap.c 1154 register_t entropy = MFTB(); local in function:pmap_pinit
1169 * entropy from the timebase register. This is to make the
1174 pmap_vsidcontext = (pmap_vsidcontext * 0x1105) + entropy;
1177 entropy += 0xbadf00d;
1186 entropy = hash ^ (hash >> 16);
  /src/sys/net/
if_ethersubr.c 88 #include <sys/entropy.h>

Completed in 23 milliseconds

1 2