Searched refs:entropy (Results 1 – 7 of 7) sorted by relevance
124 unsigned long entropy; in kernel_randomize_memory() local130 entropy = remain_entropy / (ARRAY_SIZE(kaslr_regions) - i); in kernel_randomize_memory()133 entropy = (rand % (entropy + 1)) & P4D_MASK; in kernel_randomize_memory()135 entropy = (rand % (entropy + 1)) & PUD_MASK; in kernel_randomize_memory()136 vaddr += entropy; in kernel_randomize_memory()148 remain_entropy -= entropy; in kernel_randomize_memory()
165 __u64 entropy[4]; in prng_tdes_add_entropy() local170 (char *) entropy, (char *) entropy, in prng_tdes_add_entropy()171 sizeof(entropy)); in prng_tdes_add_entropy()172 memcpy(prng_data->prngws.parm_block, entropy, sizeof(entropy)); in prng_tdes_add_entropy()
204 unsigned long entropy = random_get_entropy(); in get_random_boot() local211 hash = rotate_xor(hash, &entropy, sizeof(entropy)); in get_random_boot()
439 bool "Generate some entropy during boot and runtime"443 extract some entropy from both original and artificially created445 there is little 'natural' source of entropy normally. The cost449 Note that entropy extracted this way is not cryptographically
2103 of entropy). Note that this also reduces the memory space2108 512MB (8 bits of entropy).2112 the entropy pool as well. If neither RDRAND nor RDTSC are2113 supported, then entropy is read from the i8254 timer. The2114 usable entropy is limited by the kernel being built using2116 minimum of 2MB. As a result, only 10 bits of entropy are2181 for memory hotplug support but reduces the entropy available for
1062 It is the bootloader's job to provide entropy, by passing a1066 EFI_RNG_PROTOCOL implementation (if available) to supply entropy
1185 to allow access to command line and entropy sources.