Skip to content
Snippets Groups Projects
Select Git revision
  • 7b445a8e3a21055a5735585ca0890d14977032f0
  • master default protected
  • android-7.1.2_r28_klist
  • oreo-mr1-iot-release
  • sdk-release
  • pie-cts-dev
  • pie-cts-release
  • pie-vts-release
  • nougat-iot-release
  • pie-gsi
  • pie-platform-release
  • pie-r2-release
  • pie-r2-s1-release
  • pie-release
  • pie-dev
  • oreo-m4-s4-release
  • o-mr1-iot-preview-8
  • oreo-m2-s2-release
  • oreo-m2-s1-release
  • oreo-m6-s2-release
  • oreo-m6-s3-release
  • android-o-mr1-iot-release-1.0.4
  • android-9.0.0_r8
  • android-9.0.0_r7
  • android-9.0.0_r6
  • android-9.0.0_r5
  • android-8.1.0_r46
  • android-8.1.0_r45
  • android-n-iot-release-smart-display-r2
  • android-vts-8.1_r5
  • android-cts-8.1_r8
  • android-cts-8.0_r12
  • android-cts-7.1_r20
  • android-cts-7.0_r24
  • android-cts-6.0_r31
  • android-o-mr1-iot-release-1.0.3
  • android-cts-9.0_r1
  • android-8.1.0_r43
  • android-8.1.0_r42
  • android-n-iot-release-smart-display
  • android-p-preview-5
41 results

rootdir

  • Clone with SSH
  • Clone with HTTPS
  • user avatar
    Nick Kralevich authored
    It's a security best practice to carry entropy across reboots.
    (see "man 4 random"). Currently, entropy saving and mixing occur
    in the system_server, via the EntropyMixer code. Unfortunately, the
    EntropyMixer code runs fairly late in the boot process, which means
    early boot doesn't have high quality entropy. This has caused security
    problems in the past.
    
    Load entropy data as soon as we can in the early boot process, so that
    we can get /dev/random / /dev/urandom into a "random" state earlier.
    
    Bug: 9983133
    Change-Id: Id4a6f39e9060f30fe7497bd8f8085a9bec851e80
    b410eb19
    History
    Name Last commit Last update
    ..