/linux-4.1.27/include/uapi/linux/ |
H A D | random.h | 16 /* Get the entropy count. */ 19 /* Add to (or subtract from) the entropy count. (Superuser only.) */ 22 /* Get the contents of the entropy pool. (Superuser only.) */ 26 * Write bytes into the entropy pool and add to the entropy count. 31 /* Clear entropy count to 0. (Superuser only.) */ 34 /* Clear the entropy pool and associated counters. (Superuser only.) */
|
/linux-4.1.27/drivers/char/ |
H A D | random.c | 70 * added to an "entropy pool", which is mixed using a CRC-like function. 74 * As random bytes are mixed into the entropy pool, the routines keep 79 * hash of the contents of the "entropy pool". The SHA hash avoids 80 * exposing the internal state of the entropy pool. It is believed to 84 * returned from the generator is less than the inherent entropy in 87 * bits of "true randomness" are contained in the entropy pool as it 114 * contained in the entropy pool. 118 * requested without giving time for the entropy pool to recharge, 137 * read-out of the RTC. This does *not* add any actual entropy to the 139 * that might otherwise be identical and have very little entropy 146 * inputs to the entropy pool. Using the cycle counters and the irq source 151 * entropy pool. Note that high-speed solid state drives with very low 152 * seek times do not make for good sources of entropy, as their seek 166 * entropy pool below the value in entropy_count. In order to 168 * entropy pool across shut-downs and start-ups. To do this, put the 175 * # Load and then save the whole entropy pool 188 * # Save the whole entropy pool 200 * Effectively, these commands cause the contents of the entropy pool 201 * to be saved at shut-down time and reloaded into the entropy pool at 206 * of the entropy pool requires knowledge of the previous history of 226 * number generator, which speed up the mixing function of the entropy 300 * The minimum number of bits of entropy before we wake up a read on 306 * If the entropy count falls under this number of bits, then we 314 * do this to limit the amount of entropy that can be drained from the 340 * input entropy and done a good job. The fact that an intelligent 414 * OS independent entropy store. Here are the functions which handle 415 * storing entropy in an entropy pool. 480 * This function adds bytes into the entropy "pool". It does not 481 * update the entropy estimate. The caller should call 487 * the entropy is concentrated in the low-order bits. 593 * Credit (or debit) the entropy store with n bits of entropy. 614 * overwriting already present entropy. Even in the credit_entropy_bits() 615 * ideal case of pure Shannon entropy, new contributions credit_entropy_bits() 618 * entropy <- entropy + (pool_size - entropy) * credit_entropy_bits() 648 pr_warn("random: negative entropy/overflow: pool %s count %d\n", credit_entropy_bits() 681 * entropy to the two output pools, flipping back and credit_entropy_bits() 722 /* There is one of these per entropy source */ 735 * None of this adds any entropy, it is meant to avoid the 760 * This function adds entropy to the entropy "pool" by using timing 762 * of how many bits of entropy this call has added to the pool. 817 * and limit entropy entimate to 12 bits. add_timer_randomness() 951 * This utility inline function is responsible for transferring entropy 998 * full, we can "spill over" some entropy to the output pools. That 999 * way the output pools can store some of the excess entropy instead 1014 * given pool, and also debits the entropy count accordingly. 1040 pr_warn("random: negative entropy count: pool %s count %d\n", account() 1125 * This function extracts randomness from the "entropy pool", and 1130 * reserved parameter indicates how much entropy we must leave in the 1184 * This function extracts randomness from the "entropy pool", and 1238 "with %d bits of entropy available\n", get_random_bytes() 1285 * This function clears the pool's entropy count and mixes some system 1287 * as that can only decrease the entropy in the pool. 1331 * If kzalloc returns null, we just won't use that entropy rand_initialize_disk() 1386 "with %d bits of entropy available\n", urandom_read() 1487 * Clear the entropy pool counters. We no longer clear random_ioctl() 1488 * the entropy pool, as that's silly. random_ioctl() 1618 * Return entropy available scaled to integral bits 1719 * with the goal of minimal entropy pool depletion. As a result, the random 1721 * depleting entropy is too high 1767 size_t entropy) add_hwgenerator_randomness() 1778 credit_entropy_bits(poolp, entropy); add_hwgenerator_randomness() 1766 add_hwgenerator_randomness(const char *buffer, size_t count, size_t entropy) add_hwgenerator_randomness() argument
|
/linux-4.1.27/include/uapi/linux/netfilter_bridge/ |
H A D | ebt_among.h | 27 * fact that entropy of 3 last bytes of address is larger than entropy
|
/linux-4.1.27/drivers/misc/eeprom/ |
H A D | sunxi_sid.c | 109 u8 *entropy; sunxi_sid_probe() local 133 entropy = kzalloc(sizeof(u8) * sid_data->keysize, GFP_KERNEL); sunxi_sid_probe() 135 entropy[i] = sunxi_sid_read_byte(sid_data, i); sunxi_sid_probe() 136 add_device_randomness(entropy, sid_data->keysize); sunxi_sid_probe() 137 kfree(entropy); sunxi_sid_probe()
|
/linux-4.1.27/lib/ |
H A D | random32.c | 172 * prandom_seed - add entropy to pseudo random number generator 177 void prandom_seed(u32 entropy) prandom_seed() argument 187 state->s1 = __seed(state->s1 ^ entropy, 2U); for_each_possible_cpu() 221 u32 entropy; __prandom_timer() local 224 get_random_bytes(&entropy, sizeof(entropy)); __prandom_timer() 225 prandom_seed(entropy); __prandom_timer()
|
/linux-4.1.27/drivers/char/hw_random/ |
H A D | n2rng.h | 17 #define RNG_CTL_ES3 0x0000000000000004ULL /* Enable entropy source 3 */ 18 #define RNG_CTL_ES2 0x0000000000000002ULL /* Enable entropy source 2 */ 19 #define RNG_CTL_ES1 0x0000000000000001ULL /* Enable entropy source 1 */
|
H A D | n2-drv.c | 40 * The entropy source consists of raw entropy sources, each 44 * The oscillator in each of the three raw entropy sources run at 49 * Some time is necessary for all the necessary entropy to build up 50 * such that a full 64-bits of entropy are available in the register. 52 * an interlock which blocks register reads until sufficient entropy 57 * entropy sources has an enable bit (RNG_CTL_ES{1,2,3}). Also 63 * all three entropy sources enabled, and the interlock time set 76 * values are used to setup the desired RNG_CTL_VCO for each entropy 567 * XXX of words using each entropy source combined XXX n2rng_control_configure_units()
|
H A D | octeon-rng.c | 34 ctl.s.ent_en = 1; /* Enable the entropy source. */ octeon_rng_init()
|
H A D | core.c | 68 "current hwrng entropy estimation per mill"); 71 "default entropy content of hwrng per mill");
|
/linux-4.1.27/include/linux/ |
H A D | hw_random.h | 34 * @quality: Estimation of true entropy in RNG's bitstream 62 extern void add_hwgenerator_randomness(const char *buffer, size_t count, size_t entropy);
|
H A D | timex.h | 70 * in order to extract entropy via the relative unpredictability of
|
/linux-4.1.27/arch/mips/include/asm/ |
H A D | timex.h | 82 * use c0_random in an attempt to get at least a little bit of entropy. 85 * That leaves no entropy source in the CPU itself.
|
/linux-4.1.27/arch/s390/crypto/ |
H A D | prng.c | 161 __u64 entropy[4]; prng_tdes_add_entropy() local 167 (char *)entropy, (char *)entropy, prng_tdes_add_entropy() 168 sizeof(entropy)); prng_tdes_add_entropy() 169 BUG_ON(ret < 0 || ret != sizeof(entropy)); prng_tdes_add_entropy() 170 memcpy(prng_data->prngws.parm_block, entropy, sizeof(entropy)); prng_tdes_add_entropy() 184 /* Add the entropy */ prng_tdes_seed() 215 /* initialize the PRNG, add 128 bits of entropy */ prng_tdes_instantiate() 390 /* generate initial seed bytestring, first 48 bytes of entropy */ prng_sha512_instantiate() 443 /* generate 32 bytes of fresh entropy */ prng_sha512_reseed()
|
/linux-4.1.27/drivers/staging/lustre/lustre/libcfs/ |
H A D | prng.c | 88 * @seed1 : (seed_x) should have the most entropy in the low bits of the word 89 * @seed2 : (seed_y) should have the most entropy in the high bits of the word
|
/linux-4.1.27/drivers/staging/lustre/lustre/llite/ |
H A D | super25.c | 143 /* Nodes with small feet have little entropy. The NID for this init_lustre_lite() 144 * node gives the most entropy in the low bits */ init_lustre_lite()
|
/linux-4.1.27/drivers/crypto/caam/ |
H A D | ctrl.c | 171 * entropy being aquired. 313 * @ent_delay - Defines the length (in system clocks) of each entropy sample. 349 /* min. freq. count, equal to 1/4 of the entropy sample length */ kick_trng() 356 * select raw sampling in both entropy shifter kick_trng() 567 * (e.g. u-boot) then it is assumed that the entropy 583 * upper and lower limits of the entropy sampling
|
H A D | regs.h | 251 u32 entropy; /* RTSTENTROPYx - Test entropy */ member in struct:rngtst 275 both entropy shifter and 278 entropy shifter and 281 entropy shifter, raw data
|
/linux-4.1.27/crypto/ |
H A D | drbg.c | 1059 unsigned char *entropy = NULL; drbg_seed() local 1074 pr_devel("DRBG: using test entropy\n"); drbg_seed() 1077 * Gather entropy equal to the security strength of the DRBG. drbg_seed() 1079 * to the entropy. A nonce must be at least 1/2 of the security drbg_seed() 1080 * strength of the DRBG in size. Thus, entropy * nonce is 3/2 drbg_seed() 1089 pr_devel("DRBG: (re)seeding with %zu bytes of entropy\n", drbg_seed() 1091 entropy = kzalloc(entropylen, GFP_KERNEL); drbg_seed() 1092 if (!entropy) drbg_seed() 1094 get_random_bytes(entropy, entropylen); drbg_seed() 1095 drbg_string_fill(&data1, entropy, entropylen); drbg_seed() 1100 * concatenation of entropy with personalization str / addtl input) drbg_seed() 1123 kzfree(entropy); drbg_seed() 1279 * the entropy is pulled by the DRBG internally unconditionally 1281 * the state in addition to the pulled entropy. 1467 * the entropy is pulled by the DRBG internally unconditionally 1469 * the state in addition to the pulled entropy.
|
H A D | testmgr.c | 1745 drbg_string_fill(&testentropy, test->entropy, test->entropylen); drbg_cavs_test()
|
H A D | testmgr.h | 96 unsigned char *entropy; member in struct:drbg_testvec 20812 .entropy = (unsigned char *) 20846 .entropy = (unsigned char *) 20886 .entropy = (unsigned char *) 20923 .entropy = (unsigned char *) 20970 .entropy = (unsigned char *) 21004 .entropy = (unsigned char *) 21044 .entropy = (unsigned char *) 21081 .entropy = (unsigned char *) 21128 .entropy = (unsigned char *) 21153 .entropy = (unsigned char *) 21182 .entropy = (unsigned char *) 21209 .entropy = (unsigned char *) 21252 .entropy = (unsigned char *) 21277 .entropy = (unsigned char *) 21308 .entropy = (unsigned char *) 21336 .entropy = (unsigned char *) 21374 .entropy = (unsigned char *) 21399 .entropy = (unsigned char *) 21430 .entropy = (unsigned char *) 21458 .entropy = (unsigned char *) 21496 .entropy = (unsigned char *) 21520 .entropy = (unsigned char *) 21544 .entropy = (unsigned char *) 21562 .entropy = (unsigned char *) 21584 .entropy = (unsigned char *) 21604 .entropy = (unsigned char *)
|
/linux-4.1.27/arch/x86/boot/compressed/ |
H A D | aslr.c | 13 /* Simplified build-specific string for starting entropy. */ 52 /* Attempt to create a simple but unpredictable starting entropy. */ get_random_boot()
|
/linux-4.1.27/arch/x86/include/asm/ |
H A D | stackprotector.h | 70 * on during the bootup the random pool has true entropy too. boot_init_stack_canary()
|
/linux-4.1.27/arch/arm/mach-ux500/ |
H A D | cpu-db8500.c | 130 /* Throw these device-specific numbers into the entropy pool */ db8500_read_soc_id()
|
/linux-4.1.27/arch/x86/kernel/ |
H A D | espfix_64.c | 108 * This is run before the entropy pools are initialized, init_espfix_random()
|
/linux-4.1.27/kernel/ |
H A D | Makefile | 178 @echo "### background to keep the supply of entropy topped up. It"
|
/linux-4.1.27/drivers/rtc/ |
H A D | rtc-wm831x.c | 107 * useful per-system source of entropy. wm831x_rtc_add_randomness()
|
/linux-4.1.27/include/crypto/ |
H A D | drbg.h | 103 struct drbg_string *testentropy; /* TEST PARAMETER: test entropy */
|
/linux-4.1.27/drivers/media/platform/s5p-mfc/ |
H A D | regs-mfc.h | 115 /* entropy engine's neighbor info. */
|
H A D | s5p_mfc_opr_v5.c | 809 /* entropy coding mode */ s5p_mfc_set_enc_params_h264()
|
H A D | s5p_mfc_opr_v6.c | 913 /* entropy coding mode */ s5p_mfc_set_enc_params_h264()
|
/linux-4.1.27/drivers/crypto/ccp/ |
H A D | ccp-dev.c | 273 * bad-entropy error is present. Assume an error if ccp_trng_read()
|
/linux-4.1.27/drivers/usb/misc/ |
H A D | chaoskey.c | 9 * entropy for /dev/random and other kernel activities. It also offers
|
/linux-4.1.27/include/scsi/ |
H A D | sg.h | 8 * Started: Aug 9 by Lawrence Foard (entropy@world.std.com), to allow user
|
/linux-4.1.27/arch/arm/mach-omap2/ |
H A D | id.c | 143 /* Throw the die ID into the entropy pool at boot */ omap_feed_randpool()
|
/linux-4.1.27/drivers/staging/lustre/lnet/lnet/ |
H A D | router.c | 260 /* Nodes with small feet have little entropy lnet_shuffle_seed() 261 * the NID for this node gives the most entropy in the low bits */ lnet_shuffle_seed()
|
/linux-4.1.27/drivers/clk/tegra/ |
H A D | clk-tegra-periph.c | 492 MUX8("entropy", mux_pllp_clkm1, CLK_SOURCE_ENTROPY, 149, 0, tegra_clk_entropy),
|
/linux-4.1.27/drivers/net/ethernet/sun/ |
H A D | cassini.c | 120 #undef USE_ENTROPY_DEV /* don't test for entropy device */ 395 /* if we read back 0x0, we don't have an entropy device */ cas_entropy_reset() 3178 * also get the phy type and determine if there's an entropy generator. 3260 * 12 (strlen("entropy-dev") + 1) + cas_get_vpd_info() 3265 * -- property string == entropy-dev cas_get_vpd_info() 3310 cas_vpd_match(p + 5, "entropy-dev") && cas_get_vpd_info()
|
H A D | cassini.h | 2060 /* entropy device */
|
/linux-4.1.27/net/sched/ |
H A D | sch_netem.c | 166 * Use entropy source for initial seed.
|
/linux-4.1.27/drivers/md/ |
H A D | dm-table.c | 1528 * to the entropy pool, Only request-based targets use this. dm_table_set_restrictions()
|
/linux-4.1.27/net/netfilter/ |
H A D | nf_conntrack_core.c | 781 * Because there isn't enough entropy when system initializing, init_nf_conntrack_hash_rnd()
|
/linux-4.1.27/drivers/scsi/ |
H A D | sg.c | 3 * Started: Aug 9 by Lawrence Foard (entropy@world.std.com),
|
/linux-4.1.27/drivers/gpu/drm/radeon/ |
H A D | radeon.h | 1338 RADEON_VCE_LEVEL_DC_EE = 1, /* DC, entropy encoding */
|
/linux-4.1.27/drivers/block/ |
H A D | floppy.c | 34 * by entropy@wintermute.wpi.edu (Lawrence Foard). Linus.
|