Home | History | Annotate | Download | only in rand

Lines Matching refs:entropy

35 // entropy which is accessed via |CRYPTO_sysrand|. (If the operating system
36 // entropy source fails, it's up to |CRYPTO_sysrand| to abort the process?we
45 // (We assume that the OS entropy is safe from fork()ing and VM duplication.
189 uint8_t entropy[CTR_DRBG_ENTROPY_LEN * FIPS_OVERREAD];
191 if (!hwrand(entropy, sizeof(entropy))) {
192 CRYPTO_sysrand(entropy, sizeof(entropy));
198 if (CRYPTO_memcmp(state->last_block, entropy, CRNGT_BLOCK_SIZE) == 0) {
203 for (size_t i = CRNGT_BLOCK_SIZE; i < sizeof(entropy);
205 if (CRYPTO_memcmp(entropy + i - CRNGT_BLOCK_SIZE, entropy + i,
212 entropy + sizeof(entropy) - CRNGT_BLOCK_SIZE,
215 OPENSSL_memcpy(seed, entropy, CTR_DRBG_ENTROPY_LEN);
219 seed[j] ^= entropy[CTR_DRBG_ENTROPY_LEN * i + j];
228 // If not in FIPS mode, we don't overread from the system entropy source and
248 // entropy is used. This can be expensive (one read per |RAND_bytes| call)
304 // avoid returning bad entropy if we race with