• Home
  • Raw
  • Download

Lines Matching full:random

35 #include <linux/random.h>
95 MODULE_PARM_DESC(ratelimit_disable, "Disable random ratelimit suppression");
99 * to supply cryptographically secure random numbers. This applies to: the
117 * cryptographically secure random numbers. This applies to: the /dev/urandom
186 printk_deferred(KERN_NOTICE "random: %s called from %pS with crng_init=%d\n", \
196 * RNG described at <https://blog.cr.yp.to/20170723-random.html>.
206 * These interfaces will return the requested number of random bytes
209 * functions may be higher performance for one-off random integers,
275 * half of the block containing 32 bytes of random data that may
327 * random data. It also returns up to 32 bytes on its own of random data
387 * some random data and a ChaCha state for the caller. All other in crng_make_state()
429 * number of good random numbers, suitable for key generation, seeding
430 * TCP sequence numbers, etc. It does not rely on the hardware random
431 * number generator. For random bytes direct from the hardware RNG
454 * Immediately overwrite the ChaCha key at index 4 with random in get_random_bytes_user()
494 * Batched entropy returns random integers. The quality of the random
576 * This function will use the architecture-specific hardware random
772 * add_interrupt_randomness() uses the interrupt timing as random
802 early_param("random.trust_cpu", parse_trust_cpu);
803 early_param("random.trust_bootloader", parse_trust_bootloader);
868 * Those devices may produce endless random bits and will be throttled
886 * Handle random seed passed by bootloader, and credit it if
1115 if (!disk || !disk->random) in add_disk_randomness()
1118 add_timer_randomness(disk->random, 0x100 + disk_devt(disk)); in add_disk_randomness()
1133 disk->random = state; in rand_initialize_disk()
1195 * Reading from /dev/random has the same functionality as calling
1204 * Writing to either /dev/random or /dev/urandom adds entropy to
1207 * Polling on /dev/random indicates when the RNG is initialized, on
1210 * Both /dev/random and /dev/urandom have the same set of ioctls for
1416 * in /proc/sys/kernel/random/ and are as follows:
1420 * - uuid - a random UUID, different each time the file is read.
1429 * below which write polls to /dev/random will unblock, requesting
1450 * This function is used to return both the bootid UUID, and random