Searched refs:entropy (Results 1 – 9 of 9) sorted by relevance
/hostap-latest/src/crypto/ |
D | random.c | 62 static unsigned int entropy = 0; variable 137 if (entropy > MIN_COLLECT_ENTROPY && (count & 0x3ff) != 0) { in random_add_randomness() 145 count, entropy); in random_add_randomness() 154 entropy++; in random_add_randomness() 166 (unsigned int) len, entropy); in random_get_bytes() 210 if (entropy < len) in random_get_bytes() 211 entropy = 0; in random_get_bytes() 213 entropy -= len; in random_get_bytes()
|
D | crypto_mbedtls_alt.c | 162 static mbedtls_entropy_context entropy; variable 186 mbedtls_entropy_init(&entropy); in ctr_drbg_init() 188 mbedtls_entropy_add_source(&entropy, wm_wrap_entropy_poll, NULL, ENTROPY_MIN_PLATFORM, in ctr_drbg_init() 191 …if (mbedtls_ctr_drbg_seed(&ctr_drbg, mbedtls_entropy_func, &entropy, custom_name, custom_name_len)) in ctr_drbg_init() 209 mbedtls_entropy_free(&entropy); in crypto_unload()
|
/hostap-latest/src/eap_common/ |
D | eap_pax_common.c | 32 const u8 *entropy, size_t entropy_len, in eap_pax_kdf() argument 51 addr[1] = entropy; in eap_pax_kdf()
|
D | eap_pax_common.h | 82 const u8 *entropy, size_t entropy_len,
|
/hostap-latest/wpa_supplicant/ |
D | android.config | 407 # works by reading /dev/urandom. It should be noted that the OS entropy pool 410 # number generator and may by default start up with minimal entropy available 414 # additional entropy for generating random data to mix in with the data fetched 418 # entropy either by using hardware assisted random number generator or by 421 # wpa_supplicant can be configured to maintain its own entropy store over 424 # reboot. This can be enabled with -e<entropy file> command line option. The 436 # entropy is maintained across reboots. Commit b410eb1913 'Initialize 437 # /dev/urandom earlier in boot' seeds /dev/urandom with that entropy before
|
D | defconfig | 469 # works by reading /dev/urandom. It should be noted that the OS entropy pool 472 # number generator and may by default start up with minimal entropy available 476 # additional entropy for generating random data to mix in with the data fetched 480 # entropy either by using hardware assisted random number generator or by 483 # wpa_supplicant can be configured to maintain its own entropy store over 486 # reboot. This can be enabled with -e<entropy file> command line option. The
|
/hostap-latest/hostapd/ |
D | defconfig | 238 # reading /dev/urandom. It should be noted that the OS entropy pool needs to be 241 # may by default start up with minimal entropy available for random number 245 # additional entropy for generating random data to mix in with the data 249 # with enough entropy either by using hardware assisted random number 252 # hostapd can be configured to maintain its own entropy store over restarts to 255 # This can be enabled with -e<entropy file> command line option. The specified
|
D | android.config | 206 # entropy is maintained across reboots. Commit b410eb1913 'Initialize 207 # /dev/urandom earlier in boot' seeds /dev/urandom with that entropy before
|
/hostap-latest/wpa_supplicant/doc/docbook/ |
D | wpa_supplicant.sgml | 382 <term>-e entropy file</term> 385 maintain its internal entropy store in over restarts.</para>
|