Home
last modified time | relevance | path

Searched refs:entropy (Results 1 – 7 of 7) sorted by relevance

/arch/x86/mm/
Dkaslr.c124 unsigned long entropy; in kernel_randomize_memory() local
130 entropy = remain_entropy / (ARRAY_SIZE(kaslr_regions) - i); in kernel_randomize_memory()
133 entropy = (rand % (entropy + 1)) & P4D_MASK; in kernel_randomize_memory()
135 entropy = (rand % (entropy + 1)) & PUD_MASK; in kernel_randomize_memory()
136 vaddr += entropy; in kernel_randomize_memory()
148 remain_entropy -= entropy; in kernel_randomize_memory()
/arch/s390/crypto/
Dprng.c165 __u64 entropy[4]; in prng_tdes_add_entropy() local
170 (char *) entropy, (char *) entropy, in prng_tdes_add_entropy()
171 sizeof(entropy)); in prng_tdes_add_entropy()
172 memcpy(prng_data->prngws.parm_block, entropy, sizeof(entropy)); in prng_tdes_add_entropy()
/arch/mips/kernel/
Drelocate.c204 unsigned long entropy = random_get_entropy(); in get_random_boot() local
211 hash = rotate_xor(hash, &entropy, sizeof(entropy)); in get_random_boot()
/arch/
DKconfig439 bool "Generate some entropy during boot and runtime"
443 extract some entropy from both original and artificially created
445 there is little 'natural' source of entropy normally. The cost
449 Note that entropy extracted this way is not cryptographically
/arch/x86/
DKconfig2103 of entropy). Note that this also reduces the memory space
2108 512MB (8 bits of entropy).
2112 the entropy pool as well. If neither RDRAND nor RDTSC are
2113 supported, then entropy is read from the i8254 timer. The
2114 usable entropy is limited by the kernel being built using
2116 minimum of 2MB. As a result, only 10 bits of entropy are
2181 for memory hotplug support but reduces the entropy available for
/arch/arm64/
DKconfig1062 It is the bootloader's job to provide entropy, by passing a
1066 EFI_RNG_PROTOCOL implementation (if available) to supply entropy
/arch/mips/
DKconfig1185 to allow access to command line and entropy sources.