Lines Matching full:random
35 #include <linux/random.h>
101 MODULE_PARM_DESC(ratelimit_disable, "Disable random ratelimit suppression");
105 * to supply cryptographically secure random numbers. This applies to: the
128 * cryptographically secure random numbers. This applies to: the /dev/urandom
176 * RNG described at <https://blog.cr.yp.to/20170723-random.html>.
190 * These interfaces will return the requested number of random bytes
193 * functions may be higher performance for one-off random integers,
298 * half of the block containing 32 bytes of random data that may
328 * random data. It also returns up to 32 bytes on its own of random data
381 * some random data and a ChaCha state for the caller. All other in crng_make_state()
422 * This returns random bytes in arbitrary quantities. The quality of the
423 * random bytes is as good as /dev/urandom. In order to ensure that the
444 * Immediately overwrite the ChaCha key at index 4 with random in get_random_bytes_user()
485 * Batched entropy returns random integers. The quality of the random
787 * command line option 'random.trust_bootloader' is set.
793 * add_interrupt_randomness() uses the interrupt timing as random
823 early_param("random.trust_cpu", parse_trust_cpu);
824 early_param("random.trust_bootloader", parse_trust_bootloader);
946 * may produce endless random bits, so this function will sleep for
964 * Handle random seed passed by bootloader, and credit it depending
965 * on the command line option 'random.trust_bootloader'.
1226 if (!disk || !disk->random) in add_disk_randomness()
1229 add_timer_randomness(disk->random, 0x100 + disk_devt(disk)); in add_disk_randomness()
1244 disk->random = state; in rand_initialize_disk()
1363 * Reading from /dev/random has the same functionality as calling
1372 * Writing to either /dev/random or /dev/urandom adds entropy to
1375 * Polling on /dev/random indicates when the RNG is initialized, on
1378 * Both /dev/random and /dev/urandom have the same set of ioctls for
1589 * in /proc/sys/kernel/random/ and are as follows:
1593 * - uuid - a random UUID, different each time the file is read.
1602 * below which write polls to /dev/random will unblock, requesting
1623 * This function is used to return both the bootid UUID, and random
1712 register_sysctl_init("kernel/random", random_table); in random_sysctls_init()