Searched refs:entropy (Results 1 - 44 of 44) sorted by relevance

/linux-4.1.27/include/uapi/linux/
H A Drandom.h16 /* Get the entropy count. */
19 /* Add to (or subtract from) the entropy count. (Superuser only.) */
22 /* Get the contents of the entropy pool. (Superuser only.) */
26 * Write bytes into the entropy pool and add to the entropy count.
31 /* Clear entropy count to 0. (Superuser only.) */
34 /* Clear the entropy pool and associated counters. (Superuser only.) */
/linux-4.1.27/drivers/char/
H A Drandom.c70 * added to an "entropy pool", which is mixed using a CRC-like function.
74 * As random bytes are mixed into the entropy pool, the routines keep
79 * hash of the contents of the "entropy pool". The SHA hash avoids
80 * exposing the internal state of the entropy pool. It is believed to
84 * returned from the generator is less than the inherent entropy in
87 * bits of "true randomness" are contained in the entropy pool as it
114 * contained in the entropy pool.
118 * requested without giving time for the entropy pool to recharge,
137 * read-out of the RTC. This does *not* add any actual entropy to the
139 * that might otherwise be identical and have very little entropy
146 * inputs to the entropy pool. Using the cycle counters and the irq source
151 * entropy pool. Note that high-speed solid state drives with very low
152 * seek times do not make for good sources of entropy, as their seek
166 * entropy pool below the value in entropy_count. In order to
168 * entropy pool across shut-downs and start-ups. To do this, put the
175 * # Load and then save the whole entropy pool
188 * # Save the whole entropy pool
200 * Effectively, these commands cause the contents of the entropy pool
201 * to be saved at shut-down time and reloaded into the entropy pool at
206 * of the entropy pool requires knowledge of the previous history of
226 * number generator, which speed up the mixing function of the entropy
300 * The minimum number of bits of entropy before we wake up a read on
306 * If the entropy count falls under this number of bits, then we
314 * do this to limit the amount of entropy that can be drained from the
340 * input entropy and done a good job. The fact that an intelligent
414 * OS independent entropy store. Here are the functions which handle
415 * storing entropy in an entropy pool.
480 * This function adds bytes into the entropy "pool". It does not
481 * update the entropy estimate. The caller should call
487 * the entropy is concentrated in the low-order bits.
593 * Credit (or debit) the entropy store with n bits of entropy.
614 * overwriting already present entropy. Even in the credit_entropy_bits()
615 * ideal case of pure Shannon entropy, new contributions credit_entropy_bits()
618 * entropy <- entropy + (pool_size - entropy) * credit_entropy_bits()
648 pr_warn("random: negative entropy/overflow: pool %s count %d\n", credit_entropy_bits()
681 * entropy to the two output pools, flipping back and credit_entropy_bits()
722 /* There is one of these per entropy source */
735 * None of this adds any entropy, it is meant to avoid the
760 * This function adds entropy to the entropy "pool" by using timing
762 * of how many bits of entropy this call has added to the pool.
817 * and limit entropy entimate to 12 bits. add_timer_randomness()
951 * This utility inline function is responsible for transferring entropy
998 * full, we can "spill over" some entropy to the output pools. That
999 * way the output pools can store some of the excess entropy instead
1014 * given pool, and also debits the entropy count accordingly.
1040 pr_warn("random: negative entropy count: pool %s count %d\n", account()
1125 * This function extracts randomness from the "entropy pool", and
1130 * reserved parameter indicates how much entropy we must leave in the
1184 * This function extracts randomness from the "entropy pool", and
1238 "with %d bits of entropy available\n", get_random_bytes()
1285 * This function clears the pool's entropy count and mixes some system
1287 * as that can only decrease the entropy in the pool.
1331 * If kzalloc returns null, we just won't use that entropy rand_initialize_disk()
1386 "with %d bits of entropy available\n", urandom_read()
1487 * Clear the entropy pool counters. We no longer clear random_ioctl()
1488 * the entropy pool, as that's silly. random_ioctl()
1618 * Return entropy available scaled to integral bits
1719 * with the goal of minimal entropy pool depletion. As a result, the random
1721 * depleting entropy is too high
1767 size_t entropy) add_hwgenerator_randomness()
1778 credit_entropy_bits(poolp, entropy); add_hwgenerator_randomness()
1766 add_hwgenerator_randomness(const char *buffer, size_t count, size_t entropy) add_hwgenerator_randomness() argument
/linux-4.1.27/include/uapi/linux/netfilter_bridge/
H A Debt_among.h27 * fact that entropy of 3 last bytes of address is larger than entropy
/linux-4.1.27/drivers/misc/eeprom/
H A Dsunxi_sid.c109 u8 *entropy; sunxi_sid_probe() local
133 entropy = kzalloc(sizeof(u8) * sid_data->keysize, GFP_KERNEL); sunxi_sid_probe()
135 entropy[i] = sunxi_sid_read_byte(sid_data, i); sunxi_sid_probe()
136 add_device_randomness(entropy, sid_data->keysize); sunxi_sid_probe()
137 kfree(entropy); sunxi_sid_probe()
/linux-4.1.27/lib/
H A Drandom32.c172 * prandom_seed - add entropy to pseudo random number generator
177 void prandom_seed(u32 entropy) prandom_seed() argument
187 state->s1 = __seed(state->s1 ^ entropy, 2U); for_each_possible_cpu()
221 u32 entropy; __prandom_timer() local
224 get_random_bytes(&entropy, sizeof(entropy)); __prandom_timer()
225 prandom_seed(entropy); __prandom_timer()
/linux-4.1.27/drivers/char/hw_random/
H A Dn2rng.h17 #define RNG_CTL_ES3 0x0000000000000004ULL /* Enable entropy source 3 */
18 #define RNG_CTL_ES2 0x0000000000000002ULL /* Enable entropy source 2 */
19 #define RNG_CTL_ES1 0x0000000000000001ULL /* Enable entropy source 1 */
H A Dn2-drv.c40 * The entropy source consists of raw entropy sources, each
44 * The oscillator in each of the three raw entropy sources run at
49 * Some time is necessary for all the necessary entropy to build up
50 * such that a full 64-bits of entropy are available in the register.
52 * an interlock which blocks register reads until sufficient entropy
57 * entropy sources has an enable bit (RNG_CTL_ES{1,2,3}). Also
63 * all three entropy sources enabled, and the interlock time set
76 * values are used to setup the desired RNG_CTL_VCO for each entropy
567 * XXX of words using each entropy source combined XXX n2rng_control_configure_units()
H A Docteon-rng.c34 ctl.s.ent_en = 1; /* Enable the entropy source. */ octeon_rng_init()
H A Dcore.c68 "current hwrng entropy estimation per mill");
71 "default entropy content of hwrng per mill");
/linux-4.1.27/include/linux/
H A Dhw_random.h34 * @quality: Estimation of true entropy in RNG's bitstream
62 extern void add_hwgenerator_randomness(const char *buffer, size_t count, size_t entropy);
H A Dtimex.h70 * in order to extract entropy via the relative unpredictability of
/linux-4.1.27/arch/mips/include/asm/
H A Dtimex.h82 * use c0_random in an attempt to get at least a little bit of entropy.
85 * That leaves no entropy source in the CPU itself.
/linux-4.1.27/arch/s390/crypto/
H A Dprng.c161 __u64 entropy[4]; prng_tdes_add_entropy() local
167 (char *)entropy, (char *)entropy, prng_tdes_add_entropy()
168 sizeof(entropy)); prng_tdes_add_entropy()
169 BUG_ON(ret < 0 || ret != sizeof(entropy)); prng_tdes_add_entropy()
170 memcpy(prng_data->prngws.parm_block, entropy, sizeof(entropy)); prng_tdes_add_entropy()
184 /* Add the entropy */ prng_tdes_seed()
215 /* initialize the PRNG, add 128 bits of entropy */ prng_tdes_instantiate()
390 /* generate initial seed bytestring, first 48 bytes of entropy */ prng_sha512_instantiate()
443 /* generate 32 bytes of fresh entropy */ prng_sha512_reseed()
/linux-4.1.27/drivers/staging/lustre/lustre/libcfs/
H A Dprng.c88 * @seed1 : (seed_x) should have the most entropy in the low bits of the word
89 * @seed2 : (seed_y) should have the most entropy in the high bits of the word
/linux-4.1.27/drivers/staging/lustre/lustre/llite/
H A Dsuper25.c143 /* Nodes with small feet have little entropy. The NID for this init_lustre_lite()
144 * node gives the most entropy in the low bits */ init_lustre_lite()
/linux-4.1.27/drivers/crypto/caam/
H A Dctrl.c171 * entropy being aquired.
313 * @ent_delay - Defines the length (in system clocks) of each entropy sample.
349 /* min. freq. count, equal to 1/4 of the entropy sample length */ kick_trng()
356 * select raw sampling in both entropy shifter kick_trng()
567 * (e.g. u-boot) then it is assumed that the entropy
583 * upper and lower limits of the entropy sampling
H A Dregs.h251 u32 entropy; /* RTSTENTROPYx - Test entropy */ member in struct:rngtst
275 both entropy shifter and
278 entropy shifter and
281 entropy shifter, raw data
/linux-4.1.27/crypto/
H A Ddrbg.c1059 unsigned char *entropy = NULL; drbg_seed() local
1074 pr_devel("DRBG: using test entropy\n"); drbg_seed()
1077 * Gather entropy equal to the security strength of the DRBG. drbg_seed()
1079 * to the entropy. A nonce must be at least 1/2 of the security drbg_seed()
1080 * strength of the DRBG in size. Thus, entropy * nonce is 3/2 drbg_seed()
1089 pr_devel("DRBG: (re)seeding with %zu bytes of entropy\n", drbg_seed()
1091 entropy = kzalloc(entropylen, GFP_KERNEL); drbg_seed()
1092 if (!entropy) drbg_seed()
1094 get_random_bytes(entropy, entropylen); drbg_seed()
1095 drbg_string_fill(&data1, entropy, entropylen); drbg_seed()
1100 * concatenation of entropy with personalization str / addtl input) drbg_seed()
1123 kzfree(entropy); drbg_seed()
1279 * the entropy is pulled by the DRBG internally unconditionally
1281 * the state in addition to the pulled entropy.
1467 * the entropy is pulled by the DRBG internally unconditionally
1469 * the state in addition to the pulled entropy.
H A Dtestmgr.c1745 drbg_string_fill(&testentropy, test->entropy, test->entropylen); drbg_cavs_test()
H A Dtestmgr.h96 unsigned char *entropy; member in struct:drbg_testvec
20812 .entropy = (unsigned char *)
20846 .entropy = (unsigned char *)
20886 .entropy = (unsigned char *)
20923 .entropy = (unsigned char *)
20970 .entropy = (unsigned char *)
21004 .entropy = (unsigned char *)
21044 .entropy = (unsigned char *)
21081 .entropy = (unsigned char *)
21128 .entropy = (unsigned char *)
21153 .entropy = (unsigned char *)
21182 .entropy = (unsigned char *)
21209 .entropy = (unsigned char *)
21252 .entropy = (unsigned char *)
21277 .entropy = (unsigned char *)
21308 .entropy = (unsigned char *)
21336 .entropy = (unsigned char *)
21374 .entropy = (unsigned char *)
21399 .entropy = (unsigned char *)
21430 .entropy = (unsigned char *)
21458 .entropy = (unsigned char *)
21496 .entropy = (unsigned char *)
21520 .entropy = (unsigned char *)
21544 .entropy = (unsigned char *)
21562 .entropy = (unsigned char *)
21584 .entropy = (unsigned char *)
21604 .entropy = (unsigned char *)
/linux-4.1.27/arch/x86/boot/compressed/
H A Daslr.c13 /* Simplified build-specific string for starting entropy. */
52 /* Attempt to create a simple but unpredictable starting entropy. */ get_random_boot()
/linux-4.1.27/arch/x86/include/asm/
H A Dstackprotector.h70 * on during the bootup the random pool has true entropy too. boot_init_stack_canary()
/linux-4.1.27/arch/arm/mach-ux500/
H A Dcpu-db8500.c130 /* Throw these device-specific numbers into the entropy pool */ db8500_read_soc_id()
/linux-4.1.27/arch/x86/kernel/
H A Despfix_64.c108 * This is run before the entropy pools are initialized, init_espfix_random()
/linux-4.1.27/kernel/
H A DMakefile178 @echo "### background to keep the supply of entropy topped up. It"
/linux-4.1.27/drivers/rtc/
H A Drtc-wm831x.c107 * useful per-system source of entropy. wm831x_rtc_add_randomness()
/linux-4.1.27/include/crypto/
H A Ddrbg.h103 struct drbg_string *testentropy; /* TEST PARAMETER: test entropy */
/linux-4.1.27/drivers/media/platform/s5p-mfc/
H A Dregs-mfc.h115 /* entropy engine's neighbor info. */
H A Ds5p_mfc_opr_v5.c809 /* entropy coding mode */ s5p_mfc_set_enc_params_h264()
H A Ds5p_mfc_opr_v6.c913 /* entropy coding mode */ s5p_mfc_set_enc_params_h264()
/linux-4.1.27/drivers/crypto/ccp/
H A Dccp-dev.c273 * bad-entropy error is present. Assume an error if ccp_trng_read()
/linux-4.1.27/drivers/usb/misc/
H A Dchaoskey.c9 * entropy for /dev/random and other kernel activities. It also offers
/linux-4.1.27/include/scsi/
H A Dsg.h8 * Started: Aug 9 by Lawrence Foard (entropy@world.std.com), to allow user
/linux-4.1.27/arch/arm/mach-omap2/
H A Did.c143 /* Throw the die ID into the entropy pool at boot */ omap_feed_randpool()
/linux-4.1.27/drivers/staging/lustre/lnet/lnet/
H A Drouter.c260 /* Nodes with small feet have little entropy lnet_shuffle_seed()
261 * the NID for this node gives the most entropy in the low bits */ lnet_shuffle_seed()
/linux-4.1.27/drivers/clk/tegra/
H A Dclk-tegra-periph.c492 MUX8("entropy", mux_pllp_clkm1, CLK_SOURCE_ENTROPY, 149, 0, tegra_clk_entropy),
/linux-4.1.27/drivers/net/ethernet/sun/
H A Dcassini.c120 #undef USE_ENTROPY_DEV /* don't test for entropy device */
395 /* if we read back 0x0, we don't have an entropy device */ cas_entropy_reset()
3178 * also get the phy type and determine if there's an entropy generator.
3260 * 12 (strlen("entropy-dev") + 1) + cas_get_vpd_info()
3265 * -- property string == entropy-dev cas_get_vpd_info()
3310 cas_vpd_match(p + 5, "entropy-dev") && cas_get_vpd_info()
H A Dcassini.h2060 /* entropy device */
/linux-4.1.27/net/sched/
H A Dsch_netem.c166 * Use entropy source for initial seed.
/linux-4.1.27/drivers/md/
H A Ddm-table.c1528 * to the entropy pool, Only request-based targets use this. dm_table_set_restrictions()
/linux-4.1.27/net/netfilter/
H A Dnf_conntrack_core.c781 * Because there isn't enough entropy when system initializing, init_nf_conntrack_hash_rnd()
/linux-4.1.27/drivers/scsi/
H A Dsg.c3 * Started: Aug 9 by Lawrence Foard (entropy@world.std.com),
/linux-4.1.27/drivers/gpu/drm/radeon/
H A Dradeon.h1338 RADEON_VCE_LEVEL_DC_EE = 1, /* DC, entropy encoding */
/linux-4.1.27/drivers/block/
H A Dfloppy.c34 * by entropy@wintermute.wpi.edu (Lawrence Foard). Linus.

Completed in 1392 milliseconds