• Home
  • Raw
  • Download

Lines Matching full:random

2  * random.c -- A strong random number generator
49 * and returns good random numbers, suitable for cryptographic use.
52 * desirable to have numbers which are not only random, but hard to
59 * to produce truly random numbers on a computer --- as opposed to
60 * pseudo-random numbers, which can easily generated by using a
62 * the sequence of pseudo-random number generators, and for some
66 * generate random numbers. In a Unix environment, this is best done
77 * As random bytes are mixed into the entropy pool, the routines keep
79 * the random number generator's internal state.
81 * When random bytes are desired, they are obtained by taking the SHA
91 * outputs random numbers.
94 * random numbers; however, an attacker may (at least in theory) be
109 * This interface will return the requested number of random bytes,
112 * The two other interfaces are two character devices /dev/random and
113 * /dev/urandom. /dev/random is suitable for use when very high
116 * bits of randomness (as estimated by the random number generator)
120 * as many bytes as are requested. As more and more random bytes are
122 * this will result in random numbers that are merely cryptographically
137 * add_device_randomness() is for adding data to the random pool that
148 * add_interrupt_randomness() uses the interrupt timing as random
175 * echo "Initializing random number generator..."
176 * random_seed=/var/run/random-seed
177 * # Carry a random seed from start-up to start-up
190 * # Carry a random seed from shut-down to start-up
192 * echo "Saving random seed..."
193 * random_seed=/var/run/random-seed
200 * /etc/rc.d/init.d/random. On older Linux systems, the correct script
206 * make sure that /etc/random-seed is different for every start-up,
212 * Configuring the /dev/random driver under Linux
215 * The /dev/random driver under Linux uses minor numbers 8 and 9 of
217 * /dev/random and /dev/urandom created already, they can be created
220 * mknod /dev/random c 1 8
226 * Ideas for constructing this random number generator were derived
227 * from Pretty Good Privacy's random number generator, and from private
228 * discussions with Phil Karn. Colin Plumb provided a faster random
248 #include <linux/random.h>
277 #include <trace/events/random.h>
306 * /dev/random. Should be enough to do a significant reseed.
313 * access to /dev/random.
336 * when fed "random" data of the sort we expect to see. As long as
450 MODULE_PARM_DESC(ratelimit_disable, "Disable random ratelimit suppression");
696 pr_warn("random: negative entropy/overflow: pool %s count %d\n", in credit_entropy_bits()
788 early_param("random.trust_cpu", parse_trust_cpu);
814 pr_notice("random: crng done (trusting CPU's manufacturer)\n"); in crng_initialize()
877 pr_notice("random: fast init done\n"); in crng_fast_load()
962 pr_notice("random: crng init done\n"); in crng_reseed()
964 pr_notice("random: %d get_random_xx warning(s) missed " in crng_reseed()
970 pr_notice("random: %d urandom warning(s) missed " in crng_reseed()
1305 if (!disk || !disk->random) in add_disk_randomness()
1308 add_timer_randomness(disk->random, 0x100 + disk_devt(disk)); in add_disk_randomness()
1397 pr_warn("random: negative entropy count: pool %s count %d\n", in account()
1438 * If we have an architectural hardware random number in extract_buf()
1613 pr_notice("random: %s called from %pS with crng_init=%d\n", in _warn_unseeded_randomness()
1619 * number of good random numbers, suitable for key generation, seeding
1620 * TCP sequence numbers, etc. It does not rely on the hardware random
1621 * number generator. For random bytes direct from the hardware RNG
1709 * cryptographically secure random numbers. This applies to: the /dev/urandom
1737 * to supply cryptographically secure random numbers. This applies to: the
1809 * This function will use the architecture-specific hardware random
1904 disk->random = state; in rand_initialize_disk()
1956 printk(KERN_NOTICE "random: %s: uninitialized " in urandom_read()
2146 * This function is used to return both the bootid UUID, and random
2283 * Get a random word for internal kernel use only. The quality of the random
2364 * randomize_page - Generate a random, page aligned address
2367 * random address must fall.
2397 * Those devices may produce endless random bits and will be throttled