/openssl-master/crypto/rand/ |
A D | rand_pool.c | 37 if (pool->alloc_len > pool->max_len) in ossl_rand_pool_new() 38 pool->alloc_len = pool->max_len; in ossl_rand_pool_new() 85 pool->min_len = pool->max_len = pool->alloc_len = pool->len; in ossl_rand_pool_attach() 185 if (pool->len < pool->min_len) in ossl_rand_pool_entropy_available() 212 if (pool->attached || len > pool->max_len - pool->len) { in rand_pool_grow() 229 memcpy(p, pool->buffer, pool->len); in rand_pool_grow() 264 if (pool->len < pool->min_len && in ossl_rand_pool_bytes_needed() 283 pool->max_len = pool->len = 0; in ossl_rand_pool_bytes_needed() 293 return pool->max_len - pool->len; in ossl_rand_pool_bytes_remaining() 327 if (pool->alloc_len > pool->len && pool->buffer + pool->len == buffer) { in ossl_rand_pool_add() [all …]
|
A D | prov_seed.c | 21 RAND_POOL *pool; in ossl_rand_get_entropy() local 24 if (pool == NULL) { in ossl_rand_get_entropy() 33 ret = ossl_rand_pool_length(pool); in ossl_rand_get_entropy() 34 *pout = ossl_rand_pool_detach(pool); in ossl_rand_get_entropy() 37 ossl_rand_pool_free(pool); in ossl_rand_get_entropy() 52 RAND_POOL *pool; in ossl_rand_get_nonce() local 55 if (pool == NULL) { in ossl_rand_get_nonce() 60 if (!ossl_pool_add_nonce_data(pool)) in ossl_rand_get_nonce() 65 ret = ossl_rand_pool_length(pool); in ossl_rand_get_nonce() 66 *pout = ossl_rand_pool_detach(pool); in ossl_rand_get_nonce() [all …]
|
A D | rand_lib.c | 131 RAND_POOL *pool = ossl_rand_pool_new(RAND_DRBG_STRENGTH, 1, in RAND_poll() local 135 if (pool == NULL) in RAND_poll() 138 if (ossl_pool_acquire_entropy(pool) == 0) in RAND_poll() 142 || meth->add(ossl_rand_pool_buffer(pool), in RAND_poll() 143 ossl_rand_pool_length(pool), in RAND_poll() 144 (ossl_rand_pool_entropy(pool) / 8.0)) == 0) in RAND_poll() 149 ossl_rand_pool_free(pool); in RAND_poll()
|
/openssl-master/providers/implementations/rands/seeding/ |
A D | rand_win.c | 45 size_t ossl_pool_acquire_entropy(RAND_POOL *pool) in ossl_pool_acquire_entropy() argument 56 entropy_available = ossl_prov_acquire_entropy_from_tsc(pool); in ossl_pool_acquire_entropy() 69 buffer = ossl_rand_pool_add_begin(pool, bytes_needed); in ossl_pool_acquire_entropy() 76 ossl_rand_pool_add_end(pool, bytes, 8 * bytes); in ossl_pool_acquire_entropy() 83 buffer = ossl_rand_pool_add_begin(pool, bytes_needed); in ossl_pool_acquire_entropy() 95 ossl_rand_pool_add_end(pool, bytes, 8 * bytes); in ossl_pool_acquire_entropy() 102 buffer = ossl_rand_pool_add_begin(pool, bytes_needed); in ossl_pool_acquire_entropy() 114 ossl_rand_pool_add_end(pool, bytes, 8 * bytes); in ossl_pool_acquire_entropy() 121 return ossl_rand_pool_entropy_available(pool); in ossl_pool_acquire_entropy() 125 int ossl_pool_add_nonce_data(RAND_POOL *pool) in ossl_pool_add_nonce_data() argument [all …]
|
A D | rand_vxworks.c | 79 int ossl_rand_pool_add_additional_data(RAND_POOL *pool) in ossl_rand_pool_add_additional_data() argument 96 return ossl_rand_pool_add(pool, (unsigned char *)&data, sizeof(data), 0); in ossl_rand_pool_add_additional_data() 99 int ossl_pool_add_nonce_data(RAND_POOL *pool) in ossl_pool_add_nonce_data() argument 118 return ossl_rand_pool_add(pool, (unsigned char *)&data, sizeof(data), 0); in ossl_pool_add_nonce_data() 121 size_t ossl_pool_acquire_entropy(RAND_POOL *pool) in ossl_pool_acquire_entropy() argument 127 bytes_needed = ossl_rand_pool_bytes_needed(pool, 1 /*entropy_factor*/); in ossl_pool_acquire_entropy() 134 buffer = ossl_rand_pool_add_begin(pool, bytes_needed); in ossl_pool_acquire_entropy() 142 ossl_rand_pool_add_end(pool, bytes_needed, 8 * bytes_needed); in ossl_pool_acquire_entropy() 159 return ossl_rand_pool_entropy_available(pool); in ossl_pool_acquire_entropy() 165 return ossl_rand_pool_entropy_available(pool); in ossl_pool_acquire_entropy()
|
A D | rand_unix.c | 141 size_t ossl_pool_acquire_entropy(RAND_POOL *pool) in ossl_pool_acquire_entropy() argument 179 ossl_rand_pool_add(pool, arg, &v, sizeof(v), 2); in ossl_pool_acquire_entropy() 181 return ossl_rand_pool_entropy_available(pool); in ossl_pool_acquire_entropy() 626 size_t ossl_pool_acquire_entropy(RAND_POOL *pool) in ossl_pool_acquire_entropy() argument 629 return ossl_rand_pool_entropy_available(pool); in ossl_pool_acquire_entropy() 648 ossl_rand_pool_add_end(pool, bytes, 8 * bytes); in ossl_pool_acquire_entropy() 656 entropy_available = ossl_rand_pool_entropy_available(pool); in ossl_pool_acquire_entropy() 737 ossl_rand_pool_add_end(pool, bytes, 8 * bytes); in ossl_pool_acquire_entropy() 746 return ossl_rand_pool_entropy_available(pool); in ossl_pool_acquire_entropy() 754 int ossl_pool_add_nonce_data(RAND_POOL *pool) in ossl_pool_add_nonce_data() argument [all …]
|
A D | rand_cpu_x86.c | 38 size_t ossl_prov_acquire_entropy_from_cpu(RAND_POOL *pool) in ossl_prov_acquire_entropy_from_cpu() argument 43 bytes_needed = ossl_rand_pool_bytes_needed(pool, 1 /*entropy_factor*/); in ossl_prov_acquire_entropy_from_cpu() 45 buffer = ossl_rand_pool_add_begin(pool, bytes_needed); in ossl_prov_acquire_entropy_from_cpu() 49 ossl_rand_pool_add_end(pool, bytes_needed, 8 * bytes_needed); in ossl_prov_acquire_entropy_from_cpu() 51 ossl_rand_pool_add_end(pool, 0, 0); in ossl_prov_acquire_entropy_from_cpu() 56 return ossl_rand_pool_entropy_available(pool); in ossl_prov_acquire_entropy_from_cpu()
|
A D | rand_vms.c | 344 size_t data_collect_method(RAND_POOL *pool) in data_collect_method() argument 366 size_t bytes_remaining = ossl_rand_pool_bytes_remaining(pool); in data_collect_method() 474 return ossl_rand_pool_entropy_available(pool); in data_collect_method() 477 int ossl_pool_add_nonce_data(RAND_POOL *pool) in ossl_pool_add_nonce_data() argument 528 size_t get_entropy_method(RAND_POOL *pool) in get_entropy_method() argument 539 for (bytes_needed = ossl_rand_pool_bytes_needed(pool, 1); in get_entropy_method() 561 return ossl_rand_pool_entropy_available(pool); in get_entropy_method() 571 size_t ossl_pool_acquire_entropy(RAND_POOL *pool) in ossl_pool_acquire_entropy() argument 574 return get_entropy_method(pool); in ossl_pool_acquire_entropy() 575 return data_collect_method(pool); in ossl_pool_acquire_entropy() [all …]
|
A D | rand_tsc.c | 33 size_t ossl_prov_acquire_entropy_from_tsc(RAND_POOL *pool) in ossl_prov_acquire_entropy_from_tsc() argument 41 ossl_rand_pool_add(pool, &c, 1, 4); in ossl_prov_acquire_entropy_from_tsc() 44 return ossl_rand_pool_entropy_available(pool); in ossl_prov_acquire_entropy_from_tsc()
|
/openssl-master/crypto/async/ |
A D | async.c | 106 async_pool *pool; in async_get_pool_job() local 109 if (pool == NULL) { in async_get_pool_job() 122 if ((pool->max_size != 0) && (pool->curr_size >= pool->max_size)) in async_get_pool_job() 138 async_pool *pool; in async_release_job() local 141 if (pool == NULL) { in async_release_job() 324 if (pool == NULL || pool->jobs == NULL) in async_empty_pool() 354 async_pool *pool; in ASYNC_init_thread() local 368 pool = OPENSSL_zalloc(sizeof(*pool)); in ASYNC_init_thread() 369 if (pool == NULL) { in ASYNC_init_thread() 409 OPENSSL_free(pool); in ASYNC_init_thread() [all …]
|
/openssl-master/include/crypto/ |
A D | rand_pool.h | 89 void ossl_rand_pool_free(RAND_POOL *pool); 91 const unsigned char *ossl_rand_pool_buffer(RAND_POOL *pool); 92 unsigned char *ossl_rand_pool_detach(RAND_POOL *pool); 93 void ossl_rand_pool_reattach(RAND_POOL *pool, unsigned char *buffer); 95 size_t ossl_rand_pool_entropy(RAND_POOL *pool); 96 size_t ossl_rand_pool_length(RAND_POOL *pool); 98 size_t ossl_rand_pool_entropy_available(RAND_POOL *pool); 99 size_t ossl_rand_pool_entropy_needed(RAND_POOL *pool); 102 size_t ossl_rand_pool_bytes_remaining(RAND_POOL *pool); 104 int ossl_rand_pool_add(RAND_POOL *pool, [all …]
|
A D | rand.h | 125 size_t ossl_pool_acquire_entropy(RAND_POOL *pool); 126 int ossl_pool_add_nonce_data(RAND_POOL *pool);
|
/openssl-master/crypto/bn/ |
A D | bn_ctx.c | 65 BN_POOL pool; member 85 BN_POOL_ITEM *item = ctx->pool.head; in ctxdbg() 127 BN_POOL_init(&ret->pool); in BN_CTX_new_ex() 162 BN_POOL_ITEM *pool = ctx->pool.head; in BN_CTX_free() local 165 ctx->stack.size, ctx->pool.size); in BN_CTX_free() 167 while (pool) { in BN_CTX_free() 170 BIO_printf(trc_out, "%02x ", pool->vals[loop++].dmax); in BN_CTX_free() 171 pool = pool->next; in BN_CTX_free() 177 BN_POOL_finish(&ctx->pool); in BN_CTX_free() 206 BN_POOL_release(&ctx->pool, ctx->used - fp); in BN_CTX_end() [all …]
|
/openssl-master/providers/implementations/rands/ |
A D | seed_src.c | 98 RAND_POOL *pool; in seed_src_generate() local 107 pool = ossl_rand_pool_new(strength, 1, outlen, outlen); in seed_src_generate() 108 if (pool == NULL) { in seed_src_generate() 114 entropy_available = ossl_pool_acquire_entropy(pool); in seed_src_generate() 117 memcpy(out, ossl_rand_pool_buffer(pool), ossl_rand_pool_length(pool)); in seed_src_generate() 119 ossl_rand_pool_free(pool); in seed_src_generate()
|
/openssl-master/providers/implementations/include/prov/ |
A D | seeding.h | 14 size_t ossl_prov_acquire_entropy_from_tsc(RAND_POOL *pool); 15 size_t ossl_prov_acquire_entropy_from_cpu(RAND_POOL *pool); 26 int ossl_rand_pool_add_additional_data(RAND_POOL *pool);
|
/openssl-master/doc/man3/ |
A D | ASYNC_start_job.pod | 37 are held in a pool until they are needed, at which point they are removed from 38 the pool, used, and then returned to the pool when the job completes. If the 48 the pool. If I<max_size> is set to 0 then no upper limit is set. When an 49 B<ASYNC_JOB> is needed but there are none available in the pool already then one 51 the pool does not exceed I<max_size>. When the pool is first initialised 53 is not called before the pool is first used then it will be called automatically 75 There are no jobs currently available in the pool. This call can be retried
|
A D | OPENSSL_fork_prepare.pod | 28 the entropy pool used to generate random numbers (and therefore encryption
|
A D | BN_CTX_new.pod | 45 locking is performed, and the internal pool allocator will not properly handle
|
A D | SSL_get_error.pod | 139 available in the pool (see ASYNC_init_thread(3)). This will only occur if the 141 L<SSL_set_mode(3)> and a maximum limit has been set on the async job pool
|
A D | SSL_want.pod | 86 available in the pool (see ASYNC_init_thread(3)). A call to L<SSL_get_error(3)>
|
/openssl-master/crypto/err/ |
A D | openssl.txt | 125 ASYNC_R_FAILED_TO_SET_POOL:101:failed to set pool 128 ASYNC_R_INVALID_POOL_SIZE:103:invalid pool size 1092 RAND_R_ERROR_ENTROPY_POOL_WAS_IGNORED:127:error entropy pool was ignored 1114 RAND_R_RANDOM_POOL_OVERFLOW:125:random pool overflow 1115 RAND_R_RANDOM_POOL_UNDERFLOW:134:random pool underflow
|
/openssl-master/ |
A D | CHANGES.md | 13257 The locations /var/run/egd-pool, /dev/egd-pool, /etc/egd-pool, and 15343 random pool through the RANDFILE configuration file option or 15452 * When generating bytes for the first time in md_rand.c, 'stir the pool' 15454 (The PRNG state consists of two parts, the large pool 'state' and 'md', 16374 pool implementations, or something else, which was previously hard
|