• Home
  • Raw
  • Download

Lines Matching full:entropy

37 // entropy which is accessed via |CRYPTO_sysrand[_for_seed]|. (If the operating
38 // system entropy source fails, it's up to |CRYPTO_sysrand| to abort the
47 // (We assume that the OS entropy is safe from fork()ing and VM duplication.
175 // In passive entropy mode, entropy is supplied from outside of the module via
180 // bytes contains entropy suitable for seeding a DRBG.
187 // obtained via a method other than from the kernel. In these cases entropy
195 void RAND_load_entropy(const uint8_t *entropy, size_t entropy_len, in RAND_load_entropy() argument
205 OPENSSL_memcpy(&buffer->bytes[buffer->bytes_valid], entropy, entropy_len); in RAND_load_entropy()
240 // rand_get_seed fills |seed| with entropy and sets
241 // |*out_want_additional_input| to one if that entropy came directly from the
248 uint8_t *entropy = entropy_bytes; in rand_get_seed() local
252 // No need to fill |state->last_block| with entropy from the read. in rand_get_seed()
253 entropy += sizeof(state->last_block); in rand_get_seed()
257 get_seed_entropy(entropy, entropy_len, out_want_additional_input); in rand_get_seed()
260 OPENSSL_memcpy(state->last_block, entropy, sizeof(state->last_block)); in rand_get_seed()
261 entropy += sizeof(state->last_block); in rand_get_seed()
268 if (CRYPTO_memcmp(state->last_block, entropy, sizeof(state->last_block)) == in rand_get_seed()
276 if (CRYPTO_memcmp(entropy + i - CRNGT_BLOCK_SIZE, entropy + i, in rand_get_seed()
282 OPENSSL_memcpy(state->last_block, entropy + entropy_len - CRNGT_BLOCK_SIZE, in rand_get_seed()
286 OPENSSL_memcpy(seed, entropy, CTR_DRBG_ENTROPY_LEN); in rand_get_seed()
290 seed[j] ^= entropy[CTR_DRBG_ENTROPY_LEN * i + j]; in rand_get_seed()
297 // rand_get_seed fills |seed| with entropy and sets
298 // |*out_want_additional_input| to one if that entropy came directly from the
303 // If not in FIPS mode, we don't overread from the system entropy source and in rand_get_seed()
329 // entropy is used. This can be expensive (one read per |RAND_bytes| call) in RAND_bytes_with_additional_data()
335 // No alternative so block for OS entropy. in RAND_bytes_with_additional_data()
340 // RDRAND failed: block for OS entropy. in RAND_bytes_with_additional_data()
371 // If we used something other than system entropy then also in RAND_bytes_with_additional_data()
373 // hardware once the entropy pool has been initialized. in RAND_bytes_with_additional_data()
409 // avoid returning bad entropy if we race with in RAND_bytes_with_additional_data()