| /src/etc/rc.d/ | 
| entropy | 3 # $NetBSD: entropy,v 1.1 2021/01/10 23:24:25 riastradh Exp $ 6 # PROVIDE: entropy
 12 name="entropy"
 18 	case ${entropy-} in
 20 	check)	echo -n "Checking for entropy..."
 28 			echo "not enough entropy available, aborting boot."
 32 	wait)	echo -n "Waiting for entropy..."
 
 | 
| sshd | 24 	if [ $( sysctl -n kern.entropy.needed ) -ne 0 ]; then 29 	not enough entropy configured, so they may be predictable.
 31 	To fix, follow the "Adding entropy" section in the entropy(7)
 32 	man page.  After this machine has enough entropy, re-generate
 
 | 
| Makefile | 23 		entropy envsys \ 
 | 
| /src/sys/rump/dev/lib/libvirtio_viornd/ | 
| Makefile | 9 COMMENT=VirtIO entropy driver 
 | 
| /src/sbin/rndctl/ | 
| rndctl.c | 155 	/* Find how much entropy is in the pool.  */ 186 	 * Report an upper bound on the min-entropy of the seed data.
 187 	 * We take the larger of the system entropy and the extra
 188 	 * entropy -- the system state and the extra input may or may
 195 	rs.entropy = MIN(MAX(systementropy, extraentropy),
 199 	 * Compute the checksum on the 32-bit entropy count, followed
 203 	SHA1Update(&s, (const uint8_t *)&rs.entropy, sizeof(rs.entropy));
 258 	if (sysctlbyname("kern.entropy.consolidate", NULL, NULL,
 260 		warn("consolidate entropy");
 [all...]
 | 
| /src/share/man/man7/ | 
| Makefile | 10 MAN+=	entropy.7 52 	entropy.7 random.7
 
 | 
| /src/tests/kernel/ | 
| t_rnd.c | 63 	rd.entropy = 1; 85 	rd.entropy = 1;
 
 | 
| /src/usr.sbin/sysinst/ | 
| msg.entropy.en | 1 /*      $NetBSD: msg.entropy.en,v 1.4 2022/04/21 17:30:15 martin Exp $  */ 29 message Configure_entropy	{Set up entropy}
 35 number generator. There is not enough entropy available to create secure
 40 the entropy setup now!
 50 message	entropy_download_seed		{Import a NetBSD entropy file}
 97  *  $0 = content of file		NetBSD entropy seed file
 103  *  $0 = content of file		NetBSD entropy seed file
 106 {Since not enough entropy is available on this system, all crytographic
 118 {NetBSD entropy seed file}
 122 generator you can create an entropy snapshot like this:
 [all...]
 | 
| msg.entropy.es | 1 /*      $NetBSD: msg.entropy.es,v 1.5 2022/04/21 17:30:15 martin Exp $  */ 29 message Configure_entropy	{Set up entropy}
 35 number generator. There is not enough entropy available to create secure
 40 the entropy setup now!
 50 message	entropy_download_seed		{Import a NetBSD entropy file}
 97  *  $0 = content of file		NetBSD entropy seed file
 103  *  $0 = content of file		NetBSD entropy seed file
 106 {Since not enough entropy is available on this system, all crytographic
 118 {NetBSD entropy seed file}
 122 generator you can create an entropy snapshot like this:
 [all...]
 | 
| msg.entropy.fr | 1 /*      $NetBSD: msg.entropy.fr,v 1.5 2022/04/21 17:30:15 martin Exp $  */ 29 message Configure_entropy	{Set up entropy}
 35 number generator. There is not enough entropy available to create secure
 40 the entropy setup now!
 50 message	entropy_download_seed		{Import a NetBSD entropy file}
 97  *  $0 = content of file		NetBSD entropy seed file
 103  *  $0 = content of file		NetBSD entropy seed file
 106 {Since not enough entropy is available on this system, all crytographic
 118 {NetBSD entropy seed file}
 122 generator you can create an entropy snapshot like this:
 [all...]
 | 
| msg.entropy.pl | 1 /*      $NetBSD: msg.entropy.pl,v 1.5 2022/04/21 17:30:15 martin Exp $  */ 29 message Configure_entropy	{Set up entropy}
 35 number generator. There is not enough entropy available to create secure
 40 the entropy setup now!
 50 message	entropy_download_seed		{Import a NetBSD entropy file}
 97  *  $0 = content of file		NetBSD entropy seed file
 103  *  $0 = content of file		NetBSD entropy seed file
 106 {Since not enough entropy is available on this system, all crytographic
 118 {NetBSD entropy seed file}
 122 generator you can create an entropy snapshot like this:
 [all...]
 | 
| /src/etc/defaults/ | 
| security.conf | 51 random_file=/var/db/entropy-file 
 | 
| rc.conf | 387 # Entropy load/save to/from /dev/random at startup/shutdown 391 # Set to `check' to abort multi-user boot if not enough entropy, or
 392 # `wait' to wait until enough entropy, or `' (empty) to boot without
 395 entropy="wait"  key
 
 | 
| /src/sys/sys/ | 
| rndio.h | 41  * Exposed "size" of entropy pool, for convenience in load/save 47 	uint32_t entropy;  member in struct:__anon55e960fb0108
 68 	uint32_t	total;		/* entropy from this source */
 76 	uint32_t	dt_total;	/* time-delta entropy estimate */
 78 	uint32_t	dv_total;	/* value-delta entropy estimate */
 90 #define RND_FLAG_ESTIMATE_TIME	0x00004000	/* estimate entropy on time */
 91 #define RND_FLAG_ESTIMATE_VALUE	0x00008000	/* estimate entropy on value */
 155  * Add entropy to the pool.  len is the data length, in bytes.
 156  * entropy is the number of bits of estimated entropy in the data
 160  uint32_t entropy;  member in struct:__anon55e960fb0a08
 [all...]
 | 
| /src/sys/arch/amd64/stand/prekern/ | 
| prng.c | 46 	uint32_t entropy;  member in struct:__anon3e15344a0108 103 					"size mismatch in entropy file");
 110 		SHA1Update(&sig, (uint8_t *)&rndsave->entropy,
 111 		    sizeof(rndsave->entropy));
 116 					"bad SHA1 checksum in entropy file");
 124 		print_state(STATE_WARNING, "No entropy file could be loaded");
 176 		print_state(STATE_WARNING, "No CPU entropy feature detected");
 
 | 
| /src/sys/kern/ | 
| kern_entropy.c | 33  * Entropy subsystem 35  *	* Each CPU maintains a per-CPU entropy pool so that gathering
 36  *	  entropy requires no interprocessor synchronization, except
 37  *	  early at boot when we may be scrambling to gather entropy as
 40  *	  - entropy_enter gathers entropy and never drops it on the
 43  *	  - entropy_enter_intr gathers entropy or drops it on the
 48  *	  can transition to full entropy in one swell foop.  Otherwise,
 49  *	  it defers to a housekeeping thread that consolidates entropy,
 50  *	  but only when the CPUs collectively have full entropy, in
 53  *	* The entropy housekeeping thread continues to consolidat
 [all...]
 | 
| sys_getrandom.c | 44 #include <sys/entropy.h> 88 	 * Try to get a seed from the entropy pool.  Fail if we would
 90 	 * is partial entropy; if !GRND_INSECURE, set ENTROPY_HARDFAIL
 92 	 * anything from a partial pool if we can't get full entropy.
 116 		 * Clamp /dev/random output to the entropy capacity and
 
 | 
| subr_cprng.c | 35  *	Per-CPU NIST Hash_DRBG, reseeded automatically from the entropy 36  *	pool when we transition to full entropy, never blocking.  This
 61 #include <sys/entropy.h>
 239 	 * defer reading from the entropy pool as long as possible.
 275 	 * Drop everything to extract a fresh seed from the entropy
 280 	 * big deal -- worst case, we rewind the entropy epoch here and
 323 	/* If the entropy epoch has changed, (re)seed.  */
 
 | 
| /src/sys/dev/ | 
| random.c | 37  *	system has enough entropy. 40  *	the global entropy pool, and draw from it.
 45  *	Reading from /dev/random may block until entropy is available.
 57 #include <sys/entropy.h>
 99 /* Entropy source for writes to /dev/random and /dev/urandom */
 196  *	Generate data from a PRNG seeded from the entropy pool.
 198  *	- If /dev/random, block until we have full entropy, or fail
 199  *	  with EWOULDBLOCK, and if `depleting' entropy, return at most
 200  *	  the entropy pool's capacity at once.
 203  *	  entropy pool now
 [all...]
 | 
| /src/sys/dev/acpi/ | 
| acpi_vmgenid.c | 50 #include <sys/entropy.h> 271 	 * Enter the new VM generation ID into the entropy pool.
 296 	 * Reset the system entropy pool's measure of entropy (not the
 298 	 * entropy), and gather more entropy from any synchronous
 306 	 * Grab the current VM generation ID to put it into the entropy
 308 	 * draws from the entropy pool and the entropy epoch advances.
 
 | 
| /src/sys/crypto/cprng_fast/ | 
| cprng_fast.c | 40 #include <sys/entropy.h> 
 | 
| /src/sys/crypto/nist_hash_drbg/ | 
| nist_hash_drbg.c | 121     const secret void *entropy, size_t entropylen, 129 		{ .hv_base = entropy, .hv_len = entropylen },
 161     const secret void *entropy, size_t entropylen,
 168 		{ .hv_base = entropy, .hv_len = entropylen },
 
 | 
| /src/sys/external/isc/libsodium/dist/ | 
| configure.ac | 253     AX_CHECK_LINK_FLAG([-Wl,--high-entropy-va], [LDFLAGS="$LDFLAGS -Wl,--high-entropy-va"]) 
 | 
| /src/sys/arch/powerpc/oea/ | 
| pmap.c | 1154 	register_t entropy = MFTB();  local in function:pmap_pinit 1169 		 * entropy from the timebase register.  This is to make the
 1174 		pmap_vsidcontext = (pmap_vsidcontext * 0x1105) + entropy;
 1177 			entropy += 0xbadf00d;
 1186 				entropy = hash ^ (hash >> 16);
 
 | 
| /src/sys/net/ | 
| if_ethersubr.c | 88 #include <sys/entropy.h> 
 |