Home
last modified time | relevance | path

Searched refs:entropy (Results 1 – 16 of 16) sorted by relevance

/linux-4.4.14/lib/
Drandom32.c177 void prandom_seed(u32 entropy) in prandom_seed() argument
187 state->s1 = __seed(state->s1 ^ entropy, 2U); in prandom_seed()
221 u32 entropy; in __prandom_timer() local
224 get_random_bytes(&entropy, sizeof(entropy)); in __prandom_timer()
225 prandom_seed(entropy); in __prandom_timer()
/linux-4.4.14/arch/s390/crypto/
Dprng.c162 __u64 entropy[4]; in prng_tdes_add_entropy() local
168 (char *)entropy, (char *)entropy, in prng_tdes_add_entropy()
169 sizeof(entropy)); in prng_tdes_add_entropy()
170 BUG_ON(ret < 0 || ret != sizeof(entropy)); in prng_tdes_add_entropy()
171 memcpy(prng_data->prngws.parm_block, entropy, sizeof(entropy)); in prng_tdes_add_entropy()
/linux-4.4.14/crypto/
Ddrbg.c1069 unsigned char entropy[32]; in drbg_async_seed() local
1072 BUG_ON(entropylen > sizeof(entropy)); in drbg_async_seed()
1073 get_random_bytes(entropy, entropylen); in drbg_async_seed()
1075 drbg_string_fill(&data, entropy, entropylen); in drbg_async_seed()
1096 memzero_explicit(entropy, entropylen); in drbg_async_seed()
1114 unsigned char entropy[((32 + 16) * 2)]; in drbg_seed() local
1142 BUG_ON((entropylen * 2) > sizeof(entropy)); in drbg_seed()
1145 get_random_bytes(entropy, entropylen); in drbg_seed()
1148 drbg_string_fill(&data1, entropy, entropylen); in drbg_seed()
1154 entropy + entropylen, in drbg_seed()
[all …]
Dtestmgr.h115 unsigned char *entropy; member
23981 .entropy = (unsigned char *)
24015 .entropy = (unsigned char *)
24055 .entropy = (unsigned char *)
24092 .entropy = (unsigned char *)
24139 .entropy = (unsigned char *)
24173 .entropy = (unsigned char *)
24213 .entropy = (unsigned char *)
24250 .entropy = (unsigned char *)
24297 .entropy = (unsigned char *)
[all …]
Dtestmgr.c1777 drbg_string_fill(&testentropy, test->entropy, test->entropylen); in drbg_cavs_test()
/linux-4.4.14/include/linux/
Dhw_random.h62 extern void add_hwgenerator_randomness(const char *buffer, size_t count, size_t entropy);
/linux-4.4.14/drivers/crypto/caam/
DKconfig110 the hw_random API for suppying the kernel entropy pool.
Dregs.h295 u32 entropy; /* RTSTENTROPYx - Test entropy */ member
/linux-4.4.14/Documentation/
Dhw_random.txt17 Those tools use /dev/hwrng to fill the kernel entropy pool,
/linux-4.4.14/tools/lguest/
Dlguest.txt120 to provide entropy to the guest kernel's /dev/random.
/linux-4.4.14/drivers/usb/misc/
DKconfig265 number generator which hooks into the kernel entropy pool to
266 ensure a large supply of entropy for /dev/random and
/linux-4.4.14/Documentation/block/
Dqueue-sysfs.txt14 This file allows to turn off the disk entropy contribution. Default
/linux-4.4.14/drivers/char/hw_random/
DKconfig391 attaches itself to the host's /dev/random, supplying as much entropy
399 /dev/hwrng and injects the entropy into /dev/random.
/linux-4.4.14/drivers/char/
Drandom.c1845 size_t entropy) in add_hwgenerator_randomness() argument
1856 credit_entropy_bits(poolp, entropy); in add_hwgenerator_randomness()
/linux-4.4.14/arch/x86/
DKconfig1888 minimum of 2MiB, only 10 bits of entropy is theoretically
1890 9 bits of entropy and 32-bit uses 8 bits.
/linux-4.4.14/
DCREDITS1166 E: entropy@world.std.com